Academia.eduAcademia.edu

Discrete Cosine Transforms

4,162 papers
4 followers
AI Powered
Discrete Cosine Transforms (DCT) are mathematical transformations used in signal processing and image compression that convert a signal or image from the spatial domain to the frequency domain. DCT separates the image into parts of differing importance, allowing for efficient data representation and compression, particularly in lossy formats.
Loops are an important source of optimization. In this paper, we propose a new technique for optimizing loops that contain kernels mapped on a reconfigurable fabric. We assume the Molen machine organization and programming paradigm as our... more
In this paper, we present a polymorphic processor paradigm incorporating both general purpose and custom computing processing. The proposal incorporates an arbitrary number of programmable units, exposes the hardware to the programmers/... more
This work compares the performances of two fast 3-D transforms and two adaptive Golomb entropy coders applied to a video codec system named FEVC (Fast Embedded Video Codec). The compared transforms are Hadamard (4x4x4 and 8x8x8) and... more
In modernistic days there is a fast growth in multimedia data like text, images and videos. Security is one of the most important aspects while transmitting the multimedia data specially images over cyberspace without any loss of... more
These days, with technological advancement, it is very easy for miscreants to produce illegal multimedia data copies. Various techniques of copyright protection of free data are being developed daily. Digital watermarking is one such... more
Reconfigurable Computing (RC) is one of the most intensively studied research areas nowadays due to its potential to dramatically increase application performance. RC combines a general purpose processor (GPP) and a Field Programmable... more
When compressing a video, the architecture is provided with the width and height of the frame along with the video as input. The multiple transform selection (MTS) techniques are used to compress video. Traditional discrete cosine... more
All digital system requires data storage and a controller to operate it. Generally hardware is used for computation with the memory. But these computations are permanently frozen by manufacturing process. So this kind of system can‘t... more
This paper proposes a blind method of copy move image forgery detection using dyadic wavelet transform (DyWT) and discrete cosine transform (DCT). An input image is decomposed using DyWT to approximation (LL) subbands and detail (HH)... more
Passive radio frequency (RF) sensing and monitoring of human daily activities in elderly care homes is an emerging topic. Micro-Doppler radars are an appealing solution considering their nonintrusiveness, deep penetration, and... more
We propose a perceptual video coding framework based on an SSIM-inspired divisive normalization scheme as an attempt to transform the DCT domain frame prediction residuals to a perceptually uniform space before coding. Based on the... more
This paper presents an image, then a video, compression scheme based on a restoration process applied to a transform domain. Most of the method relies on the ability to suppress, then automatically restore some transformed coefficients in... more
A new global operator defined over the generalized nets is introduced and its basic properties are studied. If two neighbouring transitions in a generalized net have more than one joint place (output for one of the transitions, and input... more
The goal of this paper is to design a statistical test for the camera model identification problem. The approach is based on a generalized noise model that is developed by following the image processing pipeline of the digital camera.... more
In multiple areas of image processing, such as Computed Tomography, in which data acquisition is based on counting particles that hit a detector surface, Poisson noise occurs. Using variance-stabilizing transformations, the Poisson noise... more
The problem of feature selection is fundamental in a number of different tasks like classification, data mining, image processing, conceptual learning, etc... In recent times, the growing inportance of knowledge discovery and data-mining... more
In industrial field, the automated visual inspection systems is applied effectively to identify the defects in various digital images. In this research work we have proposed a new defect detection algorithm based on local homogeneity and... more
Skin cancer, one of the most critical forms of cancer, required early detection and documentation for efficient treatment, especially as certain types are fatal. In this study, an artificial neural network (ANN) was utilized to discover... more
We study factorization techniques and performance of Discrete Cosine Transforms of various sizes (including nondyadic and odd numbers). In our construction we utilize an array of known techniques (such as Heideman's mapping between... more
Low power is an imperative requirement for portable multimedia devices employing various signal processing algorithms and architectures. In most multimedia applications, human beings can gather useful information from slightly erroneous... more
Iris recognition is known as an inherently reliable biometric technique for human identification. Feature extraction is a crucial step in iris recognition, and the trend nowadays is to reduce the size of the extracted features. Special... more
This paper describes an analog sampled data architecture, for computing either DCT or DST alternatively, using switched capacitor circuit and a resistor-string. The input samples are multiplied by all the DCT/DST coefficients concurrently... more
In this paper, we have used Least-Squares Support Vector Regression (LS-SVR) method, which is a reliable and robust method for regression analysis, for grayscale image watermarking in DCT domain. This method offers several advantages... more
Both watermark structure and embedding strategy affect robustness of image watermarks. Where should watermarks be embedded in discrete cosing transform (DCT) domain in order for the invisible image watermarks to be robust? Though many... more
The shape-adaptive DCT (SA-DCT) transform can be computed on a support of arbitrary shape, but retains a computational complexity comparable to that of the usual separable block-DCT (B-DCT). Despite the near-optimal decorrelation and... more
We present an algorithmically-aware, highlevel partitioning methodology for discrete cosine transforms (DCT) targeted to distributed hardware architectures. The methodology relies on the exploration of alternate DCT formulations as part... more
We investigate the use of overcomplete frame representations to correct errors occurring over burst-based transmission channels or channels leading to isolated errors. We show that when the overcomplete signal representation is based on a... more
As the primary concern in conventional steganography techniques is to make the algorithm immune to steganalysis, their primary focus is on imperceptibility. This paper discusses Zero-steganography, an imperceptible and undetectable data... more
One of the most important parameters in evaluating a watermarking algorithm is its capacity. In fact, capacity has a paradoxical relation with other two important parameters: image quality and robustness. Some works have been done on... more
In this paper, we first present an alternative way of generating oversampled linear phase perfect reconstruction filter banks (OSLP-PRFB). We show that this method provides the minimal factorization of a subset of existing OSLPPRFB. The... more
An innovative high throughput and scalable multitransform architecture for H.264/AVC is presented in this paper. This structure can be used as a hardware accelerator in modern embedded systems to efficiently compute the 4×4... more
Fingerprint image enhancement is a key aspect of an automated fingerprint identification system. This paper describes an effective algorithm based on a novel lighting compensation scheme. The scheme involves the use of adaptive... more
Fingerprint image enhancement is a key aspect of an automated fingerprint identification system. This paper describes an effective algorithm based on a novel lighting compensation scheme. The scheme involves the use of adaptive... more
In this paper we propose a new class of 2-parameter adjustable windows, namely Exponential window, based on the exponential function [1,2]. The Exponential window is derived in the same way as Kaiser window was derived, but our proposed... more
Discrete Cosine transform (DCT) and inverse DCT (IDCT) have been widely used in many image processing systems and real-time computation of nonlinear time series. In this paper, a novel lineararray of DCT and IDCT is derived from the data... more
In this note we consider two configurations of twelve lines with nineteen triple points (i.e., points where three lines meet). Both of them have the same combinatorial features. In both configurations nine of twelve lines have five triple... more
We present a new algorithm for resizing video frames in the discrete cosine transform (DCT) space. We demonstrate that a frame resizing operation can be represented as multiplication by fixed matrices and propose a computation scheme... more
We present a new algorithm for resizing video frames in the discrete cosine transform (DCT) space. We demonstrate that a frame resizing operation can be represented as multiplication by fixed matrices and propose a computation scheme... more
An innovative high throughput and scalable multitransform architecture for H.264/AVC is presented in this paper. This structure can be used as a hardware accelerator in modern embedded systems to efficiently compute the 4×4... more
In this paper, we introduce profile view (PV) lip reading, a scheme for speaker-dependent isolated word speech recognition. We provide historic motivation for PV from the importance of profile images in facial animation for lip reading,... more
One of the drawbacks of the Discrete Cosine Transform (DCT) is visible block boundaries due to coarse quantization of the coefficients. In this paper, an algorithm for the reduction of blocking artifacts is presented. The proposed method... more
Some speech recognition applications, like speaker verification, dialog recognition or speech to text transcription could require real time processing and a good precision. Other applications such as toys, automotive vehicles or portable... more