cosine transform
Recently Published Documents


TOTAL DOCUMENTS

1842
(FIVE YEARS 314)

H-INDEX

52
(FIVE YEARS 7)

2022 ◽  
Vol 15 (3) ◽  
pp. 1-25
Author(s):  
S. Rasoul Faraji ◽  
Pierre Abillama ◽  
Kia Bazargan

Multipliers are used in virtually all Digital Signal Processing (DSP) applications such as image and video processing. Multiplier efficiency has a direct impact on the overall performance of such applications, especially when real-time processing is needed, as in 4K video processing, or where hardware resources are limited, as in mobile and IoT devices. We propose a novel, low-cost, low energy, and high-speed approximate constant coefficient multiplier (CCM) using a hybrid binary-unary encoding method. The proposed method implements a CCM using simple routing networks with no logic gates in the unary domain, which results in more efficient multipliers compared to Xilinx LogiCORE IP CCMs and table-based KCM CCMs (Flopoco) on average. We evaluate the proposed multipliers on 2-D discrete cosine transform algorithm as a common DSP module. Post-routing FPGA results show that the proposed multipliers can improve the {area, area × delay, power consumption, and energy-delay product} of a 2-D discrete cosine transform on average by {30%, 33%, 30%, 31%}. Moreover, the throughput of the proposed 2-D discrete cosine transform is on average 5% more than that of the binary architecture implemented using table-based KCM CCMs. We will show that our method has fewer routability issues compared to binary implementations when implementing a DCT core.


2022 ◽  
Vol 17 ◽  
pp. 25-33
Author(s):  
Vivek Arya

The discrete fractional Fourier transform become paradigm in signal processing. This transform process the signal in joint time-frequency domain. The attractive and very important feature of DFrCT is an availability of extra degree of one free parameter that is provided by fractional orders and due to which optimization is possible. Less execution time and easy implementation are main advantages of proposed algorithm. The merit of effectiveness of proposed technique over existing technique is superior due to application of discrete fractional cosine transform by which higher compression ratio and PSNR are obtained without any artifacts in compressed images. The novelty of the proposed algorithm is no artifacts in compressed image along with good CR and PSNR. Compression ratio (CR) and peak signal to noise ratio (PSNR) are quality parameters for image compression with optimum fractional order.


Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 519-539
Author(s):  
Aqeel Mohsin Hamad

Cardiovascular disease (CADs) is considered the primary leading cause of death. Irregular activity of heart, these disease can be detected and classified by Electrocardiogram (ECG), which is constructed from using electrodes placed on human skin to record the electrical activity of the heart. Because QRS complex represents the basic part of the ECG signal, these components should be recognized in order to analysis the other characteristics of the signal. Different methods and algorithms are proposed to analysis and processing the ECG signal. In this paper, a new QRS complex recognition method are proposed based on discrete cosine transform (DCT) with variable adaptive threshold method, which is used to determine threshold based on characteristic of each ECG signal to detect upper and lower levels of threshold to detect the peak of the signal. At first, the DCT is applied to the ECG signal to isolate it into different coefficients and eliminate or reduce the noises of the signal based on processing of high frequency components of DCT coefficients, which have less information, then the ECG is reconstructed by cropping the most important coefficients to be used in threshold determination. The basic idea is that the reconstructed signal have high differences between the components of the signal, and this facilitates the process of calculating the threshold value, which is used later to find peaks of ECG signal. The proposed method is tested and its performance are determined based on three different datasets, which are MITBIH Arrhythmia dataset, (LTSTDB) and (EDB) and the performance are evaluated using different metrics, which are Detection rate, accuracy, specificity and sensitivity. The experimental results show that the proposed method is performed or outperformed other works, therefore it can be used in peak detection applications.


Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 25
Author(s):  
Jaehun Park ◽  
Kwangsu Kim

Face recognition, including emotion classification and face attribute classification, has seen tremendous progress during the last decade owing to the use of deep learning. Large-scale data collected from numerous users have been the driving force in this growth. However, face images containing the identities of the owner can potentially cause severe privacy leakage if linked to other sensitive biometric information. The novel discrete cosine transform (DCT) coefficient cutting method (DCC) proposed in this study combines DCT and pixelization to protect the privacy of the image. However, privacy is subjective, and it is not guaranteed that the transformed image will preserve privacy. To overcome this, a user study was conducted on whether DCC really preserves privacy. To this end, convolutional neural networks were trained for face recognition and face attribute classification tasks. Our survey and experiments demonstrate that a face recognition deep learning model can be trained with images that most people think preserve privacy at a manageable cost in classification accuracy.


Array ◽  
2021 ◽  
Vol 12 ◽  
pp. 100107
Author(s):  
Rafiul Kadir ◽  
Ritu Saha ◽  
Md. Mueid Akhter ◽  
Md. Abdul Awal ◽  
Mohammad Ismat Kadir

2021 ◽  
Vol 15 ◽  
pp. 84-88
Author(s):  
Siddeeq Y. Ameen ◽  
Muthana R. Al-Badrany

The paper presents two approaches for destroying steganogrphy content in an image. The first is the overwriting approach where a random data can be written again over steganographic images whereas the second approach is the denoising approach. With the second approach two kinds of destruction techniques have been adopted these are filtering and discrete wavelet techniques. These two approaches have been simulated and evaluated over two types of hiding techniques, Least Significant Bit LSB technique and Discrete Cosine Transform DCT technique. The results of the simulation show the capability of both approaches to destroy the hidden information without any alteration to the cover image except the denoising approach enhance the PSNR in any received image even without hidden information by an average of 4dB.


2021 ◽  
Author(s):  
Konrad Kania ◽  
Mariusz Mazurek ◽  
Tomasz Rymarczyk ◽  
Tomasz Cieplak ◽  
Grzegorz Kłosowski ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document