discrete cosine transform
Recently Published Documents


TOTAL DOCUMENTS

1622
(FIVE YEARS 303)

H-INDEX

47
(FIVE YEARS 6)

2022 ◽  
Vol 15 (3) ◽  
pp. 1-25
Author(s):  
S. Rasoul Faraji ◽  
Pierre Abillama ◽  
Kia Bazargan

Multipliers are used in virtually all Digital Signal Processing (DSP) applications such as image and video processing. Multiplier efficiency has a direct impact on the overall performance of such applications, especially when real-time processing is needed, as in 4K video processing, or where hardware resources are limited, as in mobile and IoT devices. We propose a novel, low-cost, low energy, and high-speed approximate constant coefficient multiplier (CCM) using a hybrid binary-unary encoding method. The proposed method implements a CCM using simple routing networks with no logic gates in the unary domain, which results in more efficient multipliers compared to Xilinx LogiCORE IP CCMs and table-based KCM CCMs (Flopoco) on average. We evaluate the proposed multipliers on 2-D discrete cosine transform algorithm as a common DSP module. Post-routing FPGA results show that the proposed multipliers can improve the {area, area × delay, power consumption, and energy-delay product} of a 2-D discrete cosine transform on average by {30%, 33%, 30%, 31%}. Moreover, the throughput of the proposed 2-D discrete cosine transform is on average 5% more than that of the binary architecture implemented using table-based KCM CCMs. We will show that our method has fewer routability issues compared to binary implementations when implementing a DCT core.


Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 519-539
Author(s):  
Aqeel Mohsin Hamad

Cardiovascular disease (CADs) is considered the primary leading cause of death. Irregular activity of heart, these disease can be detected and classified by Electrocardiogram (ECG), which is constructed from using electrodes placed on human skin to record the electrical activity of the heart. Because QRS complex represents the basic part of the ECG signal, these components should be recognized in order to analysis the other characteristics of the signal. Different methods and algorithms are proposed to analysis and processing the ECG signal. In this paper, a new QRS complex recognition method are proposed based on discrete cosine transform (DCT) with variable adaptive threshold method, which is used to determine threshold based on characteristic of each ECG signal to detect upper and lower levels of threshold to detect the peak of the signal. At first, the DCT is applied to the ECG signal to isolate it into different coefficients and eliminate or reduce the noises of the signal based on processing of high frequency components of DCT coefficients, which have less information, then the ECG is reconstructed by cropping the most important coefficients to be used in threshold determination. The basic idea is that the reconstructed signal have high differences between the components of the signal, and this facilitates the process of calculating the threshold value, which is used later to find peaks of ECG signal. The proposed method is tested and its performance are determined based on three different datasets, which are MITBIH Arrhythmia dataset, (LTSTDB) and (EDB) and the performance are evaluated using different metrics, which are Detection rate, accuracy, specificity and sensitivity. The experimental results show that the proposed method is performed or outperformed other works, therefore it can be used in peak detection applications.


Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 25
Author(s):  
Jaehun Park ◽  
Kwangsu Kim

Face recognition, including emotion classification and face attribute classification, has seen tremendous progress during the last decade owing to the use of deep learning. Large-scale data collected from numerous users have been the driving force in this growth. However, face images containing the identities of the owner can potentially cause severe privacy leakage if linked to other sensitive biometric information. The novel discrete cosine transform (DCT) coefficient cutting method (DCC) proposed in this study combines DCT and pixelization to protect the privacy of the image. However, privacy is subjective, and it is not guaranteed that the transformed image will preserve privacy. To overcome this, a user study was conducted on whether DCC really preserves privacy. To this end, convolutional neural networks were trained for face recognition and face attribute classification tasks. Our survey and experiments demonstrate that a face recognition deep learning model can be trained with images that most people think preserve privacy at a manageable cost in classification accuracy.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Yunzhao Yang ◽  
Xiaowei Yi ◽  
Xianfeng Zhao ◽  
Jinghong Zhang

MP3 appears in various social networking sites wildly, and it is very suitable to be applied for covert communication indeed. However, almost all social networking sites recompress the uploaded MP3 files, which leads to the ineffectiveness of the existing MP3 steganographic methods. In this paper, a robust MP3 steganographic algorithm is proposed with the ability of multiple compressions resistance. First, we discover a new embedding domain with strong robustness. The scalefactor bands of higher energy are applied as the embedding bands. The message bits are embedded by adjusting the position of the MDCT coefficients with the largest magnitude in the embedding bands. Besides, the embedding and extraction operations are realized in the process of MP3 decoding at the same time. Experimental results illustrate that our proposed method is of strong robustness against multiple MP3 compressions. The bit error rate is less than 1% at the MP3 bitrate of 320 kbps. It is worth mentioning that the proposed method is proved to be applicable to social networking sites, such as SoundCloud, for covert communication. Our method achieves a satisfactory level of embedding capacity, imperceptibility, and undetectability.


Array ◽  
2021 ◽  
Vol 12 ◽  
pp. 100107
Author(s):  
Rafiul Kadir ◽  
Ritu Saha ◽  
Md. Mueid Akhter ◽  
Md. Abdul Awal ◽  
Mohammad Ismat Kadir

2021 ◽  
Vol 15 ◽  
pp. 84-88
Author(s):  
Siddeeq Y. Ameen ◽  
Muthana R. Al-Badrany

The paper presents two approaches for destroying steganogrphy content in an image. The first is the overwriting approach where a random data can be written again over steganographic images whereas the second approach is the denoising approach. With the second approach two kinds of destruction techniques have been adopted these are filtering and discrete wavelet techniques. These two approaches have been simulated and evaluated over two types of hiding techniques, Least Significant Bit LSB technique and Discrete Cosine Transform DCT technique. The results of the simulation show the capability of both approaches to destroy the hidden information without any alteration to the cover image except the denoising approach enhance the PSNR in any received image even without hidden information by an average of 4dB.


2021 ◽  
Author(s):  
Konrad Kania ◽  
Mariusz Mazurek ◽  
Tomasz Rymarczyk ◽  
Tomasz Cieplak ◽  
Grzegorz Kłosowski ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document