bit stream
Recently Published Documents


TOTAL DOCUMENTS

313
(FIVE YEARS 44)

H-INDEX

19
(FIVE YEARS 2)

Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1937
Author(s):  
Ying Zhang ◽  
Yubin Zhu ◽  
Kaining Han ◽  
Junchao Wang ◽  
Jianhao Hu

Digital filter is an important fundamental component in digital signal processing (DSP) systems. Among the digital filters, the finite impulse response (FIR) filter is one of the most commonly used schemes. As a low-complexity hardware implementation technique, stochastic computing has been applied to overcome the huge hardware cost problem of high-order FIR filters. However, the stochastic FIR filter (SFIR) scheme suffers from long processing latency and accuracy degradation. In this paper, the bit stream representation noise is theoretically analyzed, and an adaptive scaling algorithm (ASA) is proposed to improve the accuracy of SFIR with the same bit stream length. Furthermore, a novel antithetic variables method is proposed to further improve the accuracy. According to the simulation results on a 64-tap FIR filter, the ASA and AV methods gain 17 dB and 6 dB on the signal-to-noise ratio (SNR), respectively. The hardware implementation results are also presented in this paper, which illustrates that the proposed ASA-AV-SFIR filter increases 4.6 times hardware efficiency with respect to the existing SFIR schemes.


2021 ◽  
Author(s):  
Ricardo de Queiroz ◽  
Andre Souto ◽  
Victor Figueiredo ◽  
Philip Chou

<div>We propose an embedded attribute encoding method for point clouds based on set partitioning in hierarchical trees (SPIHT) [1]. The encoder is used with the region-adaptive hierarchical transform [2] which has been a popular transform for point cloud coding, even included in the standard geometry-based point cloud coder (G-PCC) [3],[4]. The result is an encoder that is efficient, scalable, and embedded. That is, higher compression is achieved by trimming the full bit-stream. G-PCC’s RAHT coefficient prediction prevents the straightforward incorporation of SPIHT into G-PCC. However, our results over other RAHT based coders are promising, improving over the original, nonpredictive RAHT encoder, while providing the key functionality of being embedded.</div>


2021 ◽  
Author(s):  
Ricardo de Queiroz ◽  
Andre Souto ◽  
Victor Figueiredo ◽  
Philip Chou

<div>We propose an embedded attribute encoding method for point clouds based on set partitioning in hierarchical trees (SPIHT) [1]. The encoder is used with the region-adaptive hierarchical transform [2] which has been a popular transform for point cloud coding, even included in the standard geometry-based point cloud coder (G-PCC) [3],[4]. The result is an encoder that is efficient, scalable, and embedded. That is, higher compression is achieved by trimming the full bit-stream. G-PCC’s RAHT coefficient prediction prevents the straightforward incorporation of SPIHT into G-PCC. However, our results over other RAHT based coders are promising, improving over the original, nonpredictive RAHT encoder, while providing the key functionality of being embedded.</div>


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Mansoor Fateh ◽  
Mohsen Rezvani ◽  
Yasser Irani

LSB matching revisited is an LSB-based approach for image steganography. This method is a type of coding to increase the capacity of steganography. In this method, two bits of the secret message are hidden in two pixels with only one change. But this method provides no idea for hiding a message with a large number of bits. In other words, this method works only for n = 2 , where n is the number of bits in a block of the secret message. In this paper, we propose an improved version of the LSB matching revisited approach, which works for n > 2 . The proposed scheme contains two phases including embedding and extracting the message. In the embedding phase, we first convert the secret message into a bit-stream, and then the bit-stream is divided into a set of blocks including n bits in each block. Then we choose 2 n − 1 pixels for hiding such n bits of the secret message. In the next step, we choose the operations needed to generate such a message. Finally, we perform the obtained operations over the coefficients to hide the secret message. The proposed approach needs fewer changes than LSB MR when n > 2 . The capacity of the proposed approach is 2 n − 1 / 2 n − 1 − 1 × 100 % higher than the F5 method where this value for n > 2 is bigger than 75%. For example, the capacity of our scheme is 75% higher than the capacity of F5 for n = 3 . The proposed method can be used in the first step of every steganography method to reduce the change in the stego image. Therefore, this method is a new coding method for steganography. Our experimental results using steganalysis show that using our method provides around 10% higher detection error for SRNet over two steganography schemes.


Author(s):  
O.I. Bureneva ◽  
A.D. Milakin ◽  
S.E. Mironov ◽  
◽  
◽  
...  

2020 ◽  
Vol 28 (12) ◽  
pp. 2612-2622
Author(s):  
Hao-Yu Cheng ◽  
Chen-Wei Chen ◽  
Chung-An Shen ◽  
Yuan-Hao Huang

Sign in / Sign up

Export Citation Format

Share Document