Aim To present an ASIC design of DA based 2 D IDCT. Methods\ In the design of 1 D IDCT is utilized a Chen based fast IDCT algorithm, and multiplier accumulators based on distributed algorithm contributes in reduc...Aim To present an ASIC design of DA based 2 D IDCT. Methods\ In the design of 1 D IDCT is utilized a Chen based fast IDCT algorithm, and multiplier accumulators based on distributed algorithm contributes in reducing the hardware amount and in enhancing the speed performance. Results and Conclusion\ VHDL simulation, synthesis and layout design of system are implemented. This 2 D IDCT ASIC design owns best timing performance when compared with other better designs internationally. Results of design prove to be excellent.展开更多
Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavele...Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering.展开更多
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con...A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.展开更多
Iris recognition enjoys universality, high degree of uniqueness and moderate user co-operation. This makes iris recognition systems unavoidable in emerging security & authentication mechanisms. An iris recognition sy...Iris recognition enjoys universality, high degree of uniqueness and moderate user co-operation. This makes iris recognition systems unavoidable in emerging security & authentication mechanisms. An iris recognition system based on vector quantization (VQ) techniques is proposed and its performance is compared with the discrete cosine transform (DCT). The proposed system does not need any pre-processing and segmentation of the iris. We have tested Linde-Buzo- Gray (LBG), Kekre's proportionate error (KPE) algorithm and Kekre's fast codebook generation (KFCG) algorithm for the clustering purpose. Proposed vector quantization based method using KFCG requires 99.99% less computations as that of full 2-dimensional DCT. Further, the KFCG method gives better performance with the accuracy of 89.10% outperforming DCT that gives accuracy around 66.10%.展开更多
Essential characteristics for watermark registration and detection without data modification can be used in anaudio zero-watermarking scheme.In this paper,a novel audio zero-watermarking scheme based on discrete wavel...Essential characteristics for watermark registration and detection without data modification can be used in anaudio zero-watermarking scheme.In this paper,a novel audio zero-watermarking scheme based on discrete wavelet transform(DWT) and discrete cosine transform(DCT) is presented.Thewatermark is registered by comparing the mean absolute values of the adjacent frame coefficients after DWT and DCT.Simulation results show that the proposed scheme is stronglyrobusttocommon attacks such as AWGN,downsampling,low-pass filtering,requantization,and MP3 compression.A performance analysis of the proposed scheme shows that all bit error rates after attacks are zero.展开更多
Associated with ITU-T G.719,a post-processing method in frequency domain for enhancing the perceptual quality of the decoded transient audio is proposed only to the audio decoder with no side information from the enco...Associated with ITU-T G.719,a post-processing method in frequency domain for enhancing the perceptual quality of the decoded transient audio is proposed only to the audio decoder with no side information from the encoder.The proposed post-filter is used to filter the frequency coefficients of the decoded transient frame and consists of a short-term post-filter and a spectral tilt compensation filter which are derived from linear predictive coding(LPC) predictor based on the discrete cosine transform(DCT) coefficients of the decoded transient frame.As a result,the post-filter in frequency domain shapes the temporal noise in time domain and controls the pre-echo noise effectively while enhancing the transient perception.Listening test results show that the preferring ratio of the post-processed transient signal is higher than that of the original decoded signal at a low bit rate of 32 kbit/s in G.719 and the post-processing module brings a complexity of 12.399 WMOPS to the decoder.展开更多
文摘Aim To present an ASIC design of DA based 2 D IDCT. Methods\ In the design of 1 D IDCT is utilized a Chen based fast IDCT algorithm, and multiplier accumulators based on distributed algorithm contributes in reducing the hardware amount and in enhancing the speed performance. Results and Conclusion\ VHDL simulation, synthesis and layout design of system are implemented. This 2 D IDCT ASIC design owns best timing performance when compared with other better designs internationally. Results of design prove to be excellent.
基金supported by the Open Foundation of Jiangsu Engineering Center of Network Monitoring(Nanjing University of Information Science&Technology)(Grant No.KJR1509)the PAPD fundthe CICAEET fund
文摘Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62105004 and 52174141)the College Student Innovation and Entrepreneurship Fund Project(Grant No.202210361053)+1 种基金Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center,Anhui University of Science&Technology(Grant No.KSJD202304)the Anhui Province Digital Agricultural Engineering Technology Research Center Open Project(Grant No.AHSZNYGC-ZXKF021)。
文摘A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.
文摘Iris recognition enjoys universality, high degree of uniqueness and moderate user co-operation. This makes iris recognition systems unavoidable in emerging security & authentication mechanisms. An iris recognition system based on vector quantization (VQ) techniques is proposed and its performance is compared with the discrete cosine transform (DCT). The proposed system does not need any pre-processing and segmentation of the iris. We have tested Linde-Buzo- Gray (LBG), Kekre's proportionate error (KPE) algorithm and Kekre's fast codebook generation (KFCG) algorithm for the clustering purpose. Proposed vector quantization based method using KFCG requires 99.99% less computations as that of full 2-dimensional DCT. Further, the KFCG method gives better performance with the accuracy of 89.10% outperforming DCT that gives accuracy around 66.10%.
基金supported by the Open Foundation of Jiangsu Engineering Center of Network Monitoring(Nanjing University of Information Science&Technology)(Grant No.KJR1509)the PAPD fundthe CICAEET fund
文摘Essential characteristics for watermark registration and detection without data modification can be used in anaudio zero-watermarking scheme.In this paper,a novel audio zero-watermarking scheme based on discrete wavelet transform(DWT) and discrete cosine transform(DCT) is presented.Thewatermark is registered by comparing the mean absolute values of the adjacent frame coefficients after DWT and DCT.Simulation results show that the proposed scheme is stronglyrobusttocommon attacks such as AWGN,downsampling,low-pass filtering,requantization,and MP3 compression.A performance analysis of the proposed scheme shows that all bit error rates after attacks are zero.
基金Supported by the Cooperation Between BIT and Ericsson
文摘Associated with ITU-T G.719,a post-processing method in frequency domain for enhancing the perceptual quality of the decoded transient audio is proposed only to the audio decoder with no side information from the encoder.The proposed post-filter is used to filter the frequency coefficients of the decoded transient frame and consists of a short-term post-filter and a spectral tilt compensation filter which are derived from linear predictive coding(LPC) predictor based on the discrete cosine transform(DCT) coefficients of the decoded transient frame.As a result,the post-filter in frequency domain shapes the temporal noise in time domain and controls the pre-echo noise effectively while enhancing the transient perception.Listening test results show that the preferring ratio of the post-processed transient signal is higher than that of the original decoded signal at a low bit rate of 32 kbit/s in G.719 and the post-processing module brings a complexity of 12.399 WMOPS to the decoder.