We present a method to calculate the full gravity gradient tensors from pre-existing vertical gravity data using the cosine transform technique and discuss the calculated tensor accuracy when the gravity anomalies are...We present a method to calculate the full gravity gradient tensors from pre-existing vertical gravity data using the cosine transform technique and discuss the calculated tensor accuracy when the gravity anomalies are contaminated by noise. Gravity gradient tensors computation on 2D infinite horizontal cylinder and 3D "Y" type dyke models show that the results computed with the DCT technique are more accurate than the FFT technique regardless if the gravity anomalies are contaminated by noise or not. The DCT precision has increased 2 to 3 times from the standard deviation. In application, the gravity gradient tensors of the Hulin basin calculated by DCT and FFT show that the two results are consistent with each other. However, the DCT results are smoother than results computed with FFT. This shows that the proposed method is less affected by noise and can better reflect the fault distribution.展开更多
Aim To present an ASIC design of DA based 2 D IDCT. Methods\ In the design of 1 D IDCT is utilized a Chen based fast IDCT algorithm, and multiplier accumulators based on distributed algorithm contributes in reduc...Aim To present an ASIC design of DA based 2 D IDCT. Methods\ In the design of 1 D IDCT is utilized a Chen based fast IDCT algorithm, and multiplier accumulators based on distributed algorithm contributes in reducing the hardware amount and in enhancing the speed performance. Results and Conclusion\ VHDL simulation, synthesis and layout design of system are implemented. This 2 D IDCT ASIC design owns best timing performance when compared with other better designs internationally. Results of design prove to be excellent.展开更多
Aiming at the existing problems of discrete cosine transform(DCT) de-noising method, we introduce the idea of wavelet neighboring coefficients(WNC) de-noising method, and propose the cosine neighboring coefficients(CN...Aiming at the existing problems of discrete cosine transform(DCT) de-noising method, we introduce the idea of wavelet neighboring coefficients(WNC) de-noising method, and propose the cosine neighboring coefficients(CNC) de-noising method. Based on DCT, a novel method for the fault feature extraction of hydraulic pump is analyzed. The vibration signal of pump is de-noised with CNC de-noising method, and the fault feature is extracted by performing Hilbert-Huang transform(HHT) to the output signal. The analysis results of the simulation signal and the actual one demonstrate that the proposed CNC de-noising method and the fault feature extraction method have more superior ability than the traditional ones.展开更多
Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavele...Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering.展开更多
In doubly selective fading channels, the orthogonal frequency division multiplexing (OFDM) multicarrier system may fail. Chirp like basis (fractional Fourier transform-fractional cosine transform) may be used instead ...In doubly selective fading channels, the orthogonal frequency division multiplexing (OFDM) multicarrier system may fail. Chirp like basis (fractional Fourier transform-fractional cosine transform) may be used instead of complex exponential basis in this case to improve the system performance. However, in multicarrier transmission, the high peak to average power ratio (PAPR) of the transmitted signal is one of the difficult problems that face both the chirp and the exponential basis. In this paper, an evaluation for the PAPR performance of a multicarrier system based on the fractional cosine transform (FrCT) is introduced and then compared with DFrFT and FFT. Moreover, applying the SLAM technique over these systems is provided to understand the behaviour of these systems when applying SLAM. Simulations verify that this system obtains a better PAPR performance. Moreover, further PAPR reduction can be gained using the well-known PAPR reduction methods. Moreover, applying SLAM technique improves the performance of (dB) by 4 dB to 5 dB and all systems become as competitive to each other when SLAM is applied. Finally, BER performance comparison among OFDM, Discrete Cosine Transform MCM (DCT- MCM), Discrete Hartley Transform MCM (DHT-MCM), DFrFT-OCDM and DFrCT- OCDM MCM systems was done by means of simulation over 100,000 multicarrier blocks for each one and showed that our proposed scenario gave the best performance.展开更多
Multiple image watermarking is an advanced concept of singular watermarking techniques. The existing singular digital image watermarking techniques cannot obtain all the design goals, such as imperceptibility, robustn...Multiple image watermarking is an advanced concept of singular watermarking techniques. The existing singular digital image watermarking techniques cannot obtain all the design goals, such as imperceptibility, robustness, security, and capacity simultaneously with perfection. Hence, the multiple image watermarking technique is designed that embeds several watermarks into the same host image for conveying multiple information. This paper proposed a multiple image watermarking technique with Discrete Cosine Transform (DCT) for ensuring the low computational time for embedding, encryption, decryption as well as extraction of the watermark images. Here, DCT is used to ensure the visual quality of the host image, and a random binary matrix is used to improve the security of the digital image. We have given a basic framework for multiple image watermarking. Our experimental results show satisfactory performance.展开更多
In this paper, the peak-to-average power ratio(PAPR) of orthogonal frequency division multiplexing(OFDM) signal is reduced by combining the discrete cosine transform(DCT) with clipping in optical intensity-modulated d...In this paper, the peak-to-average power ratio(PAPR) of orthogonal frequency division multiplexing(OFDM) signal is reduced by combining the discrete cosine transform(DCT) with clipping in optical intensity-modulated direct-detection(IM/DD) OFDM systems. First, the data are transformed into new modified data by DCT. Second, the proposed scheme utilizes the clipping technique to further reduce the PAPR of OFDM signal. We experimentally demonstrate that the optical OFDM transmission system with this proposed scheme can achieve significant performance improvement in terms of PAPR and bit error rate(BER) compared with the original optical OFDM systems.展开更多
Fabric pattern contains many types of the available pattern elements, which not only can be used for the researchers, but also as the material for the designer. But existing method focus on the complete image retrieva...Fabric pattern contains many types of the available pattern elements, which not only can be used for the researchers, but also as the material for the designer. But existing method focus on the complete image retrieval, therefore lack methods of retrieving pattern elements. This article proposes a pattern elements retrieval algorithm based on cosine transform. Firstly, automatically segment the patterns according to size and location and filter the similar primary patterns, then, through cosine transform, analyze elements features in DCT domain, extract amplitude frequency and phase frequency. We employ 2-norm to measure the similarity, search 10 similar pattern elements in the sample library and save them in the design resources library. Experiment results indicate that this algorithm performs well while used in palace costume and carpet patterns, and got more than 75% of the average recall in 100 times experiments展开更多
A novel time-frequency domain interference excision technique is proposed. The technique is based on adaptive biorthogonal local discrete cosine trans form (BLDCT). It uses a redundant library of biorthogonal local d...A novel time-frequency domain interference excision technique is proposed. The technique is based on adaptive biorthogonal local discrete cosine trans form (BLDCT). It uses a redundant library of biorthogonal local discrete cosine bases and an efficient concave cost function to match the transform basis to the interfering signal. The main advantage of the algorithm over conventional trans form domain excision algorithms is that the basis functions are not fixed but ca n be adapted to the time-frequency structure of the interfering signal. It is w e ll suited to transform domain compression and suppression of various types of in terference. Compared to the discrete wavelet transform (DWT) that provides logar ithmic division of the frequency bands, the adaptive BLDCT can provide more flex ible frequency resolution. Thus it is more insensitive to variations of jamming frequency. Simulation results demonstrate the improved bit error rate (BER) perf ormance and the increased robustness of the receiver.展开更多
The Fourier transform is very important to numerous applications in science and engineering. However, its usefulness is hampered by its computational expense. In this paper, in an attempt to develop a faster method fo...The Fourier transform is very important to numerous applications in science and engineering. However, its usefulness is hampered by its computational expense. In this paper, in an attempt to develop a faster method for computing Fourier transforms, the authors present parallel implementations of two new algorithms developed for the type IV Discrete Cosine Transform (DCT-IV) which support the new interleaved fast Fourier transform method. The authors discuss the realizations of their implementations using two paradigms. The first involved commodity equipment and the Message-Passing Interface (MPI) library. The second utilized the RapidMind development platform and the Cell Broadband Engine (BE) processor. These experiments indicate that the authors' rotation-based algorithm is preferable to their lifting-based algorithm on the platforms tested, with increased efficiency demonstrated by their MPI implementation for large data sets. Finally, the authors outline future work by discussing an architecture-oriented method for computing DCT-IVs which promises further optimization. The results indicate a promising fresh direction in the search for efficient ways to compute Fourier transforms.展开更多
Discrete cosine transform (DCT) is frequently used in image and video signal processing due to its high energy compaction property. Humans are able to perceive and identify the information from slightly erroneous imag...Discrete cosine transform (DCT) is frequently used in image and video signal processing due to its high energy compaction property. Humans are able to perceive and identify the information from slightly erroneous images. It is enough to produce approximate outputs rather than absolute outputs which in turn reduce the circuit complexity. Numbers of applications like image and video processing need higher dimensional DCT algorithms. So the existing architectures of one dimensional (1D) approximate DCTs are reviewed and extended to two dimensional (2D) approximate DCTs. Approximate 2D multiplier-free DCT architectures are coded in Verilog, simulated in Modelsim to evaluate the correctness, synthesized to evaluate the performance and implemented in virtexE Field Programmable Gate Array (FPGA) kit. A comparative analysis of approximate 2D DCT architectures is carried out in terms of speed and area.展开更多
We consider complex-valued functions f ∈ L^1 (R^2+), where R+ := [0,∞), and prove sufficient conditions under which the double sine Fourier transform fss and the double cosine Fourier transform fcc belong to o...We consider complex-valued functions f ∈ L^1 (R^2+), where R+ := [0,∞), and prove sufficient conditions under which the double sine Fourier transform fss and the double cosine Fourier transform fcc belong to one of the two-dimensional Lipschitz classes Lip(a,β) for some 0 〈 α,β ≤ 1; or to one of the Zygmund classes Zyg(α,β) for some 0 〈 α,β ≤ 2. These sufficient conditions are best possible in the sense that they are also necessary for nonnegative-valued functions f ∈ L^1 (R^2+).展开更多
A new one-step four-quadrant spatial phase-shifting Fourier transform digital holography is presented for recording of cosine transform coefficients, because cosine transform is a real-even symmetric Fourier transform...A new one-step four-quadrant spatial phase-shifting Fourier transform digital holography is presented for recording of cosine transform coefficients, because cosine transform is a real-even symmetric Fourier transform. This approach implements four quadrant spatial phase shifting at a time using a special phase mask, which is located in the reference arm, and the phase distributions of its four-quadrants are 0, π/2, π, and 3π/2 respectively. The theoretical analysis and computer simulation results show that cosine transform coefficients of real-valued image can be calculated by capturing single four-quadrant spatial phase-shifting Fourier transform digital hologram.展开更多
This paper considers the problem of smoothing a non-stationary time series(having either deterministic and/or stochastic trends) using the discrete cosine transform(DCT).The DCT is a powerful tool which has found frui...This paper considers the problem of smoothing a non-stationary time series(having either deterministic and/or stochastic trends) using the discrete cosine transform(DCT).The DCT is a powerful tool which has found fruitful applications in filtering and smoothing as it can closely approximate the optimal Karhunen-Loeve transform(KLT).In fact,it is known that it almost corresponds to the KLT for first-order autoregressive processes with a root close to unity:This is the case with most economic and financial time series.A number of new results are derived in the paper:(a) The explicit form of the linear smoother based on the DCT,which is found to have time-varying weights and that uses all observations;(b) the extrapolation of the DCT-smoothed series;(c) the form of the average frequency response function,which is shown to approximate the frequency response of the ideal low pass filter;(d) the asymptotic distribution of the DCT coefficients under the assumptions of deterministic or stochastic trends;(e) two news method for selecting an appropriate degree of smoothing,in general and under the assumptions in(d).These findings are applied and illustrated using several real world economic and financial time series.The results indicate that the DCT-based smoother that is proposed can find many useful applications in economic and financial time series.展开更多
A new fast two-dimension 8×8 discrete cosine transform (2D 8×8 DCT) algorithm based on the characteristics of the basic images of 2D DCT is presented. The new algorithm computes each DCT coefficient in tur...A new fast two-dimension 8×8 discrete cosine transform (2D 8×8 DCT) algorithm based on the characteristics of the basic images of 2D DCT is presented. The new algorithm computes each DCT coefficient in turn more independently. Hence, the new algorithm is suitable for 2D DCT pruning algorithm of pruning away any number of high-frequency components of 2D DCT. The proposed pruning algorithm is more efficient than the existing pruning 2D DCT algorithms in terms of the number of arithmetic operations, especially the number of multiplications required in the computation.展开更多
In the H.263 video codec related systems, motion estimation and Discrete Cosine Transform (DCT) have the most computational requirements. In order to reduce complexity of the encoder to dedicate more resources to othe...In the H.263 video codec related systems, motion estimation and Discrete Cosine Transform (DCT) have the most computational requirements. In order to reduce complexity of the encoder to dedicate more resources to other functions, according to the study of existing methods, an Improved All Zero Block Finding (IAZBF) method based on the statistic characteristics of DCT coefficients is proposed. Compared with existing methods, IAZBF improves the detecting efficiency by about 50% without importing too much extra computation requirement. Being computed with additions and shifts instead of complicated multiplications, IAZBF is of low computation complexity, especially for low-end processors. In addition, IAZBF upholds picture fidelity and remains compatible with the H.263 bitstream standard.展开更多
A novel compression method for mechanical vibrating signals,binding with sub-band vector quantization(SVQ) by wavelet packet transformation(WPT) and discrete cosine transformation(DCT) is proposed.Firstly,the vibratin...A novel compression method for mechanical vibrating signals,binding with sub-band vector quantization(SVQ) by wavelet packet transformation(WPT) and discrete cosine transformation(DCT) is proposed.Firstly,the vibrating signal is decomposed into sub-bands by WPT.Then DCT and adaptive bit allocation are done per sub-band and SVQ is performed in each sub-band.It is noted that,after DCT,we only need to code the first components whose numbers are determined by the bits allocated to that sub-band.Through an actual signal,our algorithm is proven to improve the signal-to-noise ratio(SNR) of the reconstructed signal effectively,especially in the situation of lowrate transmission.展开更多
It is well known that a block discrete cosine transform compressed image exhibits visually annoying blocking artifacts at low-bit-rate. A new post-processing deblocking algorithm in wavelet domain is proposed. The alg...It is well known that a block discrete cosine transform compressed image exhibits visually annoying blocking artifacts at low-bit-rate. A new post-processing deblocking algorithm in wavelet domain is proposed. The algorithm exploits blocking-artifact features shown in wavelet domain. The energy of blocking artifacts is concentrated into some lines to form annoying visual effects after wavelet transform. The aim of reducing blocking artifacts is to capture excessive energy on the block boundary effectively and reduce it below the visual scope. Adaptive operators for different subbands are computed based on the wavelet coefficients. The operators are made adaptive to different images and characteristics of blocking artifacts. Experimental results show that the proposed method can significantly improve the visual quality and also increase the peak signal-noise-ratio(PSNR) in the output image.展开更多
For traditional JPEG image encryption,block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack.However,the numbers of non-zero coefficients in the 8×8 sub-block...For traditional JPEG image encryption,block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack.However,the numbers of non-zero coefficients in the 8×8 sub-blocks are unchanged using block position shuffle.For this defect,this paper proposes a fast attack algorithm for JPEG image encryption based on inter-block shuffle and non-zero quantization discrete cosine transformation coefficient attack.The algorithm analyzes the position mapping relationship before and after encryption of image blocks by detecting the pixel values of an image by the designed plaintext image.Then the preliminary attack result of the image blocks can be obtained from the inverse mapping relationship.Finally,the final attack result of the algorithm is generated according to the numbers of non-zero coefficients in each 8×8 block of the preliminary attack result.Every 8×8 block position is related with its number of non-zero discrete cosine transform coefficients in the designed plaintext.It is verified that the main content of the original image could be obtained without knowledge of the encryption algorithm and keys in a relatively short time.展开更多
Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorp...Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication.The system was tested against NIST SD4 and Anguli fingerprint datasets,wherein 10,000 watermarked fingerprints were employed for training.The designed approach recorded a tamper detection rate of 98.3%,performing 3–6%better than current DCT,SVD,and DWT-based watermarking approaches.The false positive rate(≤1.2%)and false negative rate(≤1.5%)were much lower compared to previous research,which maintained high reliability for template change detection.The system showed real-time performance,averaging 12–18 ms processing time per template,and is thus suitable for real-world biometric authentication scenarios.Quality analysis of fingerprints indicated that NFIQ scores were enhanced from 2.07 to 1.81,reflecting improved minutiae clarity and ridge structure preservation.The approach also exhibited strong resistance to compression and noise distortions,with the improvements in PSNR being 2 dB(JPEG compression Q=80)and the SSIM values rising by 3%–5%under noise attacks.Comparative assessment demonstrated that training with NIST SD4 data greatly improved the ridge continuity and quality of fingerprints,resulting in better match scores(260–295)when tested against Bozorth3.Smaller batch sizes(batch=2)also resulted in improved ridge clarity,whereas larger batch sizes(batch=8)resulted in distortions.The DCNN-based tamper detection model supported real-time classification,which greatly minimized template exposure to adversarial attacks and synthetic fingerprint forgeries.Results demonstrate that fragile watermarking with AI indeed greatly enhances fingerprint security,providing privacy-preserving biometric authentication with high robustness,accuracy,and computational efficiency.展开更多
基金supported by the Scientific Research Starting Foundation of HoHai University,China(2084/40801136)the Fundamental Research Funds for the Central Universities(No.2009B12514)
文摘We present a method to calculate the full gravity gradient tensors from pre-existing vertical gravity data using the cosine transform technique and discuss the calculated tensor accuracy when the gravity anomalies are contaminated by noise. Gravity gradient tensors computation on 2D infinite horizontal cylinder and 3D "Y" type dyke models show that the results computed with the DCT technique are more accurate than the FFT technique regardless if the gravity anomalies are contaminated by noise or not. The DCT precision has increased 2 to 3 times from the standard deviation. In application, the gravity gradient tensors of the Hulin basin calculated by DCT and FFT show that the two results are consistent with each other. However, the DCT results are smoother than results computed with FFT. This shows that the proposed method is less affected by noise and can better reflect the fault distribution.
文摘Aim To present an ASIC design of DA based 2 D IDCT. Methods\ In the design of 1 D IDCT is utilized a Chen based fast IDCT algorithm, and multiplier accumulators based on distributed algorithm contributes in reducing the hardware amount and in enhancing the speed performance. Results and Conclusion\ VHDL simulation, synthesis and layout design of system are implemented. This 2 D IDCT ASIC design owns best timing performance when compared with other better designs internationally. Results of design prove to be excellent.
基金the National Natural Science Foundation of China(No.51275524)the General Armaments Department Equipment Support Research Project
文摘Aiming at the existing problems of discrete cosine transform(DCT) de-noising method, we introduce the idea of wavelet neighboring coefficients(WNC) de-noising method, and propose the cosine neighboring coefficients(CNC) de-noising method. Based on DCT, a novel method for the fault feature extraction of hydraulic pump is analyzed. The vibration signal of pump is de-noised with CNC de-noising method, and the fault feature is extracted by performing Hilbert-Huang transform(HHT) to the output signal. The analysis results of the simulation signal and the actual one demonstrate that the proposed CNC de-noising method and the fault feature extraction method have more superior ability than the traditional ones.
基金supported by the Open Foundation of Jiangsu Engineering Center of Network Monitoring(Nanjing University of Information Science&Technology)(Grant No.KJR1509)the PAPD fundthe CICAEET fund
文摘Traditional watermark embedding schemes inevitably modify the data in a host audio signal and lead to the degradation of the host signal.In this paper,a novel audio zero-watermarking algorithm based on discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD) is presented.The watermark is registered by performing SVD on the coefficients generated through DWT and DCT to avoid data modification and host signal degradation.Simulation results show that the proposed zero-watermarking algorithm is strongly robust to common signal processing methods such as requantization,MP3 compression,resampling,addition of white Gaussian noise,and low-pass filtering.
文摘In doubly selective fading channels, the orthogonal frequency division multiplexing (OFDM) multicarrier system may fail. Chirp like basis (fractional Fourier transform-fractional cosine transform) may be used instead of complex exponential basis in this case to improve the system performance. However, in multicarrier transmission, the high peak to average power ratio (PAPR) of the transmitted signal is one of the difficult problems that face both the chirp and the exponential basis. In this paper, an evaluation for the PAPR performance of a multicarrier system based on the fractional cosine transform (FrCT) is introduced and then compared with DFrFT and FFT. Moreover, applying the SLAM technique over these systems is provided to understand the behaviour of these systems when applying SLAM. Simulations verify that this system obtains a better PAPR performance. Moreover, further PAPR reduction can be gained using the well-known PAPR reduction methods. Moreover, applying SLAM technique improves the performance of (dB) by 4 dB to 5 dB and all systems become as competitive to each other when SLAM is applied. Finally, BER performance comparison among OFDM, Discrete Cosine Transform MCM (DCT- MCM), Discrete Hartley Transform MCM (DHT-MCM), DFrFT-OCDM and DFrCT- OCDM MCM systems was done by means of simulation over 100,000 multicarrier blocks for each one and showed that our proposed scenario gave the best performance.
文摘Multiple image watermarking is an advanced concept of singular watermarking techniques. The existing singular digital image watermarking techniques cannot obtain all the design goals, such as imperceptibility, robustness, security, and capacity simultaneously with perfection. Hence, the multiple image watermarking technique is designed that embeds several watermarks into the same host image for conveying multiple information. This paper proposed a multiple image watermarking technique with Discrete Cosine Transform (DCT) for ensuring the low computational time for embedding, encryption, decryption as well as extraction of the watermark images. Here, DCT is used to ensure the visual quality of the host image, and a random binary matrix is used to improve the security of the digital image. We have given a basic framework for multiple image watermarking. Our experimental results show satisfactory performance.
基金supported by the National Natural Science Foundation of China(No.51376162)the Open Fund of the State Key Laboratory of Millimeter Waves(Southeast University,Ministry of Education,China)(No.K201214)+1 种基金the Zhejiang Provincial Natural Science Foundation of China(No.LY13F050005)the Key Industrial Project of Special Major Science and Technology of Zhejiang Province(No.2012C11016-2)
文摘In this paper, the peak-to-average power ratio(PAPR) of orthogonal frequency division multiplexing(OFDM) signal is reduced by combining the discrete cosine transform(DCT) with clipping in optical intensity-modulated direct-detection(IM/DD) OFDM systems. First, the data are transformed into new modified data by DCT. Second, the proposed scheme utilizes the clipping technique to further reduce the PAPR of OFDM signal. We experimentally demonstrate that the optical OFDM transmission system with this proposed scheme can achieve significant performance improvement in terms of PAPR and bit error rate(BER) compared with the original optical OFDM systems.
基金Supported by National Natural Science Foundation of China(61163044)Philosophy and Social Key Fund Project(12AZD120)+1 种基金Project ofBeijing Scientific Committee(Z141110004414074Z141100001914035)
文摘Fabric pattern contains many types of the available pattern elements, which not only can be used for the researchers, but also as the material for the designer. But existing method focus on the complete image retrieval, therefore lack methods of retrieving pattern elements. This article proposes a pattern elements retrieval algorithm based on cosine transform. Firstly, automatically segment the patterns according to size and location and filter the similar primary patterns, then, through cosine transform, analyze elements features in DCT domain, extract amplitude frequency and phase frequency. We employ 2-norm to measure the similarity, search 10 similar pattern elements in the sample library and save them in the design resources library. Experiment results indicate that this algorithm performs well while used in palace costume and carpet patterns, and got more than 75% of the average recall in 100 times experiments
基金Project supported by the National Natural Science Foundation of China(Grant No.6017201860372007)
文摘A novel time-frequency domain interference excision technique is proposed. The technique is based on adaptive biorthogonal local discrete cosine trans form (BLDCT). It uses a redundant library of biorthogonal local discrete cosine bases and an efficient concave cost function to match the transform basis to the interfering signal. The main advantage of the algorithm over conventional trans form domain excision algorithms is that the basis functions are not fixed but ca n be adapted to the time-frequency structure of the interfering signal. It is w e ll suited to transform domain compression and suppression of various types of in terference. Compared to the discrete wavelet transform (DWT) that provides logar ithmic division of the frequency bands, the adaptive BLDCT can provide more flex ible frequency resolution. Thus it is more insensitive to variations of jamming frequency. Simulation results demonstrate the improved bit error rate (BER) perf ormance and the increased robustness of the receiver.
文摘The Fourier transform is very important to numerous applications in science and engineering. However, its usefulness is hampered by its computational expense. In this paper, in an attempt to develop a faster method for computing Fourier transforms, the authors present parallel implementations of two new algorithms developed for the type IV Discrete Cosine Transform (DCT-IV) which support the new interleaved fast Fourier transform method. The authors discuss the realizations of their implementations using two paradigms. The first involved commodity equipment and the Message-Passing Interface (MPI) library. The second utilized the RapidMind development platform and the Cell Broadband Engine (BE) processor. These experiments indicate that the authors' rotation-based algorithm is preferable to their lifting-based algorithm on the platforms tested, with increased efficiency demonstrated by their MPI implementation for large data sets. Finally, the authors outline future work by discussing an architecture-oriented method for computing DCT-IVs which promises further optimization. The results indicate a promising fresh direction in the search for efficient ways to compute Fourier transforms.
文摘Discrete cosine transform (DCT) is frequently used in image and video signal processing due to its high energy compaction property. Humans are able to perceive and identify the information from slightly erroneous images. It is enough to produce approximate outputs rather than absolute outputs which in turn reduce the circuit complexity. Numbers of applications like image and video processing need higher dimensional DCT algorithms. So the existing architectures of one dimensional (1D) approximate DCTs are reviewed and extended to two dimensional (2D) approximate DCTs. Approximate 2D multiplier-free DCT architectures are coded in Verilog, simulated in Modelsim to evaluate the correctness, synthesized to evaluate the performance and implemented in virtexE Field Programmable Gate Array (FPGA) kit. A comparative analysis of approximate 2D DCT architectures is carried out in terms of speed and area.
基金Supported partially by the Program TMOP-4.2.2/08/1/2008-0008 of the Hungarian National Development Agency
文摘We consider complex-valued functions f ∈ L^1 (R^2+), where R+ := [0,∞), and prove sufficient conditions under which the double sine Fourier transform fss and the double cosine Fourier transform fcc belong to one of the two-dimensional Lipschitz classes Lip(a,β) for some 0 〈 α,β ≤ 1; or to one of the Zygmund classes Zyg(α,β) for some 0 〈 α,β ≤ 2. These sufficient conditions are best possible in the sense that they are also necessary for nonnegative-valued functions f ∈ L^1 (R^2+).
基金This work was supported by the Guangdong Natural Science Foundation of China (No. 021089).
文摘A new one-step four-quadrant spatial phase-shifting Fourier transform digital holography is presented for recording of cosine transform coefficients, because cosine transform is a real-even symmetric Fourier transform. This approach implements four quadrant spatial phase shifting at a time using a special phase mask, which is located in the reference arm, and the phase distributions of its four-quadrants are 0, π/2, π, and 3π/2 respectively. The theoretical analysis and computer simulation results show that cosine transform coefficients of real-valued image can be calculated by capturing single four-quadrant spatial phase-shifting Fourier transform digital hologram.
文摘This paper considers the problem of smoothing a non-stationary time series(having either deterministic and/or stochastic trends) using the discrete cosine transform(DCT).The DCT is a powerful tool which has found fruitful applications in filtering and smoothing as it can closely approximate the optimal Karhunen-Loeve transform(KLT).In fact,it is known that it almost corresponds to the KLT for first-order autoregressive processes with a root close to unity:This is the case with most economic and financial time series.A number of new results are derived in the paper:(a) The explicit form of the linear smoother based on the DCT,which is found to have time-varying weights and that uses all observations;(b) the extrapolation of the DCT-smoothed series;(c) the form of the average frequency response function,which is shown to approximate the frequency response of the ideal low pass filter;(d) the asymptotic distribution of the DCT coefficients under the assumptions of deterministic or stochastic trends;(e) two news method for selecting an appropriate degree of smoothing,in general and under the assumptions in(d).These findings are applied and illustrated using several real world economic and financial time series.The results indicate that the DCT-based smoother that is proposed can find many useful applications in economic and financial time series.
基金Supported by the National Basic Research Program of China (Grant No.2006CB303102)the National Natural Science Foundation of China(Grant Nos.60573114,60533030 and 60573181)
文摘A new fast two-dimension 8×8 discrete cosine transform (2D 8×8 DCT) algorithm based on the characteristics of the basic images of 2D DCT is presented. The new algorithm computes each DCT coefficient in turn more independently. Hence, the new algorithm is suitable for 2D DCT pruning algorithm of pruning away any number of high-frequency components of 2D DCT. The proposed pruning algorithm is more efficient than the existing pruning 2D DCT algorithms in terms of the number of arithmetic operations, especially the number of multiplications required in the computation.
基金Supported by the China Aviation Fund (No. 02153071)
文摘In the H.263 video codec related systems, motion estimation and Discrete Cosine Transform (DCT) have the most computational requirements. In order to reduce complexity of the encoder to dedicate more resources to other functions, according to the study of existing methods, an Improved All Zero Block Finding (IAZBF) method based on the statistic characteristics of DCT coefficients is proposed. Compared with existing methods, IAZBF improves the detecting efficiency by about 50% without importing too much extra computation requirement. Being computed with additions and shifts instead of complicated multiplications, IAZBF is of low computation complexity, especially for low-end processors. In addition, IAZBF upholds picture fidelity and remains compatible with the H.263 bitstream standard.
基金Supported by the National Natural Science Foundation of China(No.51135001)
文摘A novel compression method for mechanical vibrating signals,binding with sub-band vector quantization(SVQ) by wavelet packet transformation(WPT) and discrete cosine transformation(DCT) is proposed.Firstly,the vibrating signal is decomposed into sub-bands by WPT.Then DCT and adaptive bit allocation are done per sub-band and SVQ is performed in each sub-band.It is noted that,after DCT,we only need to code the first components whose numbers are determined by the bits allocated to that sub-band.Through an actual signal,our algorithm is proven to improve the signal-to-noise ratio(SNR) of the reconstructed signal effectively,especially in the situation of lowrate transmission.
基金Science and Technology Project of Guangdong Province(2006A10201003)2005 Startup Project of Jinan University(51205067)Soft Science Project of Guangdong Province(2006B70103011)
文摘It is well known that a block discrete cosine transform compressed image exhibits visually annoying blocking artifacts at low-bit-rate. A new post-processing deblocking algorithm in wavelet domain is proposed. The algorithm exploits blocking-artifact features shown in wavelet domain. The energy of blocking artifacts is concentrated into some lines to form annoying visual effects after wavelet transform. The aim of reducing blocking artifacts is to capture excessive energy on the block boundary effectively and reduce it below the visual scope. Adaptive operators for different subbands are computed based on the wavelet coefficients. The operators are made adaptive to different images and characteristics of blocking artifacts. Experimental results show that the proposed method can significantly improve the visual quality and also increase the peak signal-noise-ratio(PSNR) in the output image.
文摘For traditional JPEG image encryption,block position shuffling can achieve a better encryption effect and is resistant to non-zero counting attack.However,the numbers of non-zero coefficients in the 8×8 sub-blocks are unchanged using block position shuffle.For this defect,this paper proposes a fast attack algorithm for JPEG image encryption based on inter-block shuffle and non-zero quantization discrete cosine transformation coefficient attack.The algorithm analyzes the position mapping relationship before and after encryption of image blocks by detecting the pixel values of an image by the designed plaintext image.Then the preliminary attack result of the image blocks can be obtained from the inverse mapping relationship.Finally,the final attack result of the algorithm is generated according to the numbers of non-zero coefficients in each 8×8 block of the preliminary attack result.Every 8×8 block position is related with its number of non-zero discrete cosine transform coefficients in the designed plaintext.It is verified that the main content of the original image could be obtained without knowledge of the encryption algorithm and keys in a relatively short time.
文摘Biometric template protection is essential for finger-based authentication systems,as template tampering and adversarial attacks threaten the security.This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication.The system was tested against NIST SD4 and Anguli fingerprint datasets,wherein 10,000 watermarked fingerprints were employed for training.The designed approach recorded a tamper detection rate of 98.3%,performing 3–6%better than current DCT,SVD,and DWT-based watermarking approaches.The false positive rate(≤1.2%)and false negative rate(≤1.5%)were much lower compared to previous research,which maintained high reliability for template change detection.The system showed real-time performance,averaging 12–18 ms processing time per template,and is thus suitable for real-world biometric authentication scenarios.Quality analysis of fingerprints indicated that NFIQ scores were enhanced from 2.07 to 1.81,reflecting improved minutiae clarity and ridge structure preservation.The approach also exhibited strong resistance to compression and noise distortions,with the improvements in PSNR being 2 dB(JPEG compression Q=80)and the SSIM values rising by 3%–5%under noise attacks.Comparative assessment demonstrated that training with NIST SD4 data greatly improved the ridge continuity and quality of fingerprints,resulting in better match scores(260–295)when tested against Bozorth3.Smaller batch sizes(batch=2)also resulted in improved ridge clarity,whereas larger batch sizes(batch=8)resulted in distortions.The DCNN-based tamper detection model supported real-time classification,which greatly minimized template exposure to adversarial attacks and synthetic fingerprint forgeries.Results demonstrate that fragile watermarking with AI indeed greatly enhances fingerprint security,providing privacy-preserving biometric authentication with high robustness,accuracy,and computational efficiency.