Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (21)

Search Parameters:
Keywords = joint photographic experts group-2000 (JPEG-2000)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
7 pages, 1414 KiB  
Proceeding Paper
Improved Low Complexity Predictor for Block-Based Lossless Image Compression
by Huang-Chun Hsu, Jian-Jiun Ding and De-Yan Lu
Eng. Proc. 2025, 92(1), 38; https://doi.org/10.3390/engproc2025092038 - 30 Apr 2025
Viewed by 287
Abstract
Lossless image compression has been studied and widely applied, particularly in medicine, space exploration, aerial photography, and satellite communication. In this study, we proposed a low-complexity lossless compression for image (LOCO-I) predictor based on the joint photographic expert group–lossless standard (JPEG-LS). We analyzed [...] Read more.
Lossless image compression has been studied and widely applied, particularly in medicine, space exploration, aerial photography, and satellite communication. In this study, we proposed a low-complexity lossless compression for image (LOCO-I) predictor based on the joint photographic expert group–lossless standard (JPEG-LS). We analyzed the nature of the LOCO-I predictor and offered possible solutions. The improved LOCO-I outperformed LOCO-I by a reduction of 2.26% in entropy for the full image size and reductions of 2.70, 2.81, and 2.89% for 32 × 32, 16 × 16, and 8 × 8 block-based compression, respectively. In addition, we suggested vertical/horizontal flip for block-based compression, which requires extra bits to record and decreases the entropy. Compared with other state-of-the-art (SOTA) lossless image compression predictors, the proposed method has low computation complexity as it is multiplication- and division-free. The model is also better suited for hardware implementation. As the predictor exploits no inter-block relation, it enables parallel processing and random access if encoded by fix-length coding (FLC). Full article
(This article belongs to the Proceedings of 2024 IEEE 6th Eurasia Conference on IoT, Communication and Engineering)
Show Figures

Figure 1

36 pages, 21603 KiB  
Article
Forensic Joint Photographic Experts Group (JPEG) Watermarking for Disk Image Leak Attribution: An Adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) Approach
by Belinda I. Onyeashie, Petra Leimich, Sean McKeown and Gordon Russell
Electronics 2025, 14(9), 1800; https://doi.org/10.3390/electronics14091800 - 28 Apr 2025
Viewed by 957
Abstract
This paper presents a novel forensic watermarking method for digital evidence distribution in non-cloud environments. The approach addresses the critical need for the secure sharing of Joint Photographic Experts Group (JPEG) images in forensic investigations. The method utilises an adaptive Discrete Cosine Transform–Discrete [...] Read more.
This paper presents a novel forensic watermarking method for digital evidence distribution in non-cloud environments. The approach addresses the critical need for the secure sharing of Joint Photographic Experts Group (JPEG) images in forensic investigations. The method utilises an adaptive Discrete Cosine Transform–Discrete Wavelet Transform (DCT-DWT) domain technique to embed a 64-bit watermark in both stand-alone JPEGs and those within forensic disk images. This occurs without alterations to disk structure or complications to the chain of custody. The system implements uniform secure randomisation and recipient-specific watermarks to balance security with forensic workflow efficiency. This work presents the first implementation of forensic watermarking at the disk image level that preserves structural integrity and enables precise leak source attribution. It addresses a critical gap in secure evidence distribution methodologies. The evaluation occurred on extensive datasets: 1124 JPEGs in a forensic disk image, 10,000 each of BOSSBase 256 × 256 and 512 × 512 greyscale images, and 10,000 COCO2017 coloured images. The results demonstrate high imperceptibility with average Peak Signal-to-Noise Ratio (PSNR) values ranging from 46.13 dB to 49.37 dB across datasets. The method exhibits robust performance against geometric attacks with perfect watermark recovery (Bit Error Rate (BER) = 0) for rotations up to 90° and scaling factors between 0.6 and 1.5. The approach maintains compatibility with forensic tools like Forensic Toolkit FTK and Autopsy. It performs effectively under attacks including JPEG compression (QF ≥ 60), filtering, and noise addition. The technique achieves high feature match ratios between 0.684 and 0.690 for a threshold of 0.70, with efficient processing times (embedding: 0.0347 s to 0.1187 s; extraction: 0.0077 s to 0.0366 s). This watermarking technique improves forensic investigation processes, particularly those that involve sensitive JPEG files. It supports leak source attribution, preserves evidence integrity, and provides traceability throughout forensic procedures. Full article
(This article belongs to the Special Issue Advances in Cyber-Security and Machine Learning)
Show Figures

Figure 1

14 pages, 398 KiB  
Article
Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding
by Yuanfeng Pan and Jiangqun Ni
Symmetry 2024, 16(5), 575; https://doi.org/10.3390/sym16050575 - 7 May 2024
Cited by 1 | Viewed by 1151
Abstract
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we [...] Read more.
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we break the boundary between these two types of schemes by establishing a theoretical link between the distortion costs in the spatial domain and those in the JPEG domain and thus propose a scheme for domain transformations of distortion costs for efficient JPEG steganography with symmetric embedding, which can directly convert the spatial distortion cost into its JPEG counterpart. Specifically, by formulating the distortion cost function for JPEG images in the decompressed spatial domain, a closed-form expression for a distortion cost cross-domain transformation is derived theoretically, which precisely characterizes the conversion from the distortion costs obtained by existing spatial steganographic schemes to those applied in JPEG steganography. Experimental results demonstrate that the proposed method outperforms other advanced JPEG steganographic schemes, e.g., JUNIWARD (JPEG steganography with Universal Wavelet Relative Distortion), JMiPOD (JPEG steganography by Minimizing the Power of the Optimal Detector), and DCDT (Distortion Cost Domain Transformation), in resisting the detection of various advanced steganalyzers. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

15 pages, 10740 KiB  
Article
Security Improvements of JPEG Images Using Image De-Identification
by Ho-Seok Kang, Seongjun Cha and Sung-Ryul Kim
Electronics 2024, 13(7), 1332; https://doi.org/10.3390/electronics13071332 - 2 Apr 2024
Viewed by 1252
Abstract
Today, as data is easily exposed through various channels, such as storing data in cloud services or exchanging data through a SNS (Social Network Service), related privacy issues are receiving a significant amount of attention. In addition, for data that are more sensitive [...] Read more.
Today, as data is easily exposed through various channels, such as storing data in cloud services or exchanging data through a SNS (Social Network Service), related privacy issues are receiving a significant amount of attention. In addition, for data that are more sensitive to personal information, such as medical images, more attention should be paid to privacy protection. De-identification is a common method for privacy protection. Typically, it is a method of deleting or masking individual identifiers and omitting quasi-identifiers such as birth dates. In the case of images, de-identification is performed by mosaic processing or applying various effects. In this paper, we present a method of de-identifying an image by encrypting only some of the data in the JPEG (Joint Photograph Experts Group) image format, one of the most common image compression formats, so that the entire image cannot be recognized. The purpose of this paper is to protect images by encrypting only small parts, and not the entire image. This work is suitable for the fast and safe transmission and verification of high-capacity images. We have shown that images can be de-identified by encrypting data from the DHT (Define Huffman Table) segment among the JPEG header segments. Through experiments, we confirmed that that these images could not be identified after encrypting only a minimal portion, compared to previous studies that encrypted entire images, and the encryption speed and decryption speed were also faster and more effective than the results of previous studies. A model was implemented to de-identify images using AES-256 (Advanced Encryption Standard-256) and symmetric key encryption algorithm in the Huffman tables of JPEG headers, resulting in the ability to render entire images unidentifiable quickly and effectively. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

16 pages, 14094 KiB  
Article
Remote Sensing Image Compression Based on the Multiple Prior Information
by Chuan Fu and Bo Du
Remote Sens. 2023, 15(8), 2211; https://doi.org/10.3390/rs15082211 - 21 Apr 2023
Cited by 18 | Viewed by 3515
Abstract
Learned image compression has achieved a series of breakthroughs for nature images, but there is little literature focusing on high-resolution remote sensing image (HRRSI) datasets. This paper focuses on designing a learned lossy image compression framework for compressing HRRSIs. Considering the local and [...] Read more.
Learned image compression has achieved a series of breakthroughs for nature images, but there is little literature focusing on high-resolution remote sensing image (HRRSI) datasets. This paper focuses on designing a learned lossy image compression framework for compressing HRRSIs. Considering the local and non-local redundancy contained in HRRSI, a mixed hyperprior network is designed to explore both the local and non-local redundancy in order to improve the accuracy of entropy estimation. In detail, a transformer-based hyperprior and a CNN-based hyperprior are fused for entropy estimation. Furthermore, to reduce the mismatch between training and testing, a three-stage training strategy is introduced to refine the network. In this training strategy, the entire network is first trained, and then some sub-networks are fixed while the others are trained. To evaluate the effectiveness of the proposed compression algorithm, the experiments are conducted on an HRRSI dataset. The results show that the proposed algorithm achieves comparable or better compression performance than some traditional and learned image compression algorithms, such as Joint Photographic Experts Group (JPEG) and JPEG2000. At a similar or lower bitrate, the proposed algorithm is about 2 dB higher than the PSNR value of JPEG2000. Full article
(This article belongs to the Special Issue AI-Based Obstacle Detection and Avoidance in Remote Sensing Images)
Show Figures

Figure 1

17 pages, 9072 KiB  
Article
A Novel Multimedia Player for International Standard—JPEG Snack
by Sonain Jamil, Oh-Jin Kwon, Jinhee Lee, Faiz Ullah, Yaseen and Afnan
J. Imaging 2023, 9(3), 58; https://doi.org/10.3390/jimaging9030058 - 1 Mar 2023
Cited by 1 | Viewed by 2627
Abstract
The advancement in mobile communication and technologies has led to the usage of short-form digital content increasing daily. This short-form content is mainly based on images that urged the joint photographic experts’ group (JPEG) to introduce a novel international standard, JPEG Snack (International [...] Read more.
The advancement in mobile communication and technologies has led to the usage of short-form digital content increasing daily. This short-form content is mainly based on images that urged the joint photographic experts’ group (JPEG) to introduce a novel international standard, JPEG Snack (International Organization for Standardization (ISO)/ International Electrotechnical Commission (IEC) IS, 19566-8). In JPEG Snack, the multimedia content is embedded into a main background JPEG file, and the resulting JPEG Snack file is saved and transmitted as a .jpg file. If someone does not have a JPEG Snack Player, their device decoder will treat it as a JPEG file and display a background image only. As the standard has been proposed recently, the JPEG Snack Player is needed. In this article, we present a methodology to develop JPEG Snack Player. JPEG Snack Player uses a JPEG Snack decoder and renders media objects on the background JPEG file according to the instructions in the JPEG Snack file. We also present some results and computational complexity metrics for the JPEG Snack Player. Full article
Show Figures

Figure 1

10 pages, 1926 KiB  
Article
A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments
by Kurnia Anggriani, Shu-Fen Chiou, Nan-I Wu and Min-Shiang Hwang
Electronics 2023, 12(2), 395; https://doi.org/10.3390/electronics12020395 - 12 Jan 2023
Cited by 7 | Viewed by 2619
Abstract
Coverless data hiding is resistant to steganalytical tool attacks because a stego image is not altered. On the other hand, one of its flaws is its limited hiding capacity. Recently, a coverless data-hiding method, known as the coverless information-hiding method based on the [...] Read more.
Coverless data hiding is resistant to steganalytical tool attacks because a stego image is not altered. On the other hand, one of its flaws is its limited hiding capacity. Recently, a coverless data-hiding method, known as the coverless information-hiding method based on the most significant bit of the cover image (CIHMSB), has been developed. This uses the most significant bit value in the cover image by calculating the average intensity value on the fragment and mapping it with a predefined sequence. As a result, CIHMBS is resistant to attack threats such as additive Gaussian white noise (AGWN), salt-and-pepper noise attacks, low-pass filtering attacks, and Joint Photographic Experts Group (JPEG) compression attacks. However, it only has a limited hiding capacity. This paper proposes a coverless information-hiding method based on the lowest and highest values of the fragment (CIHLHF) of the cover image. According to the experimental results, the hiding capacity of CIHLHF is twice that of CIHMSB. Full article
(This article belongs to the Special Issue Recent Developments and Applications of Image Watermarking)
Show Figures

Figure 1

18 pages, 1697 KiB  
Article
CARNet: Context-Aware Residual Learning for JPEG-LS Compressed Remote Sensing Image Restoration
by Maomei Liu, Lei Tang, Lijia Fan, Sheng Zhong, Hangzai Luo and Jinye Peng
Remote Sens. 2022, 14(24), 6318; https://doi.org/10.3390/rs14246318 - 13 Dec 2022
Cited by 9 | Viewed by 2501
Abstract
JPEG-LS (a lossless (LS) compression standard developed by the Joint Photographic Expert Group) compressed image restoration is a significant problem in remote sensing applications. It faces the following two challenges: first, bridging small pixel-value gaps from wide numerical ranges; and second, removing banding [...] Read more.
JPEG-LS (a lossless (LS) compression standard developed by the Joint Photographic Expert Group) compressed image restoration is a significant problem in remote sensing applications. It faces the following two challenges: first, bridging small pixel-value gaps from wide numerical ranges; and second, removing banding artifacts in the condition of lacking available context information. As far as we know, there is currently no research dealing with the above issues. Hence, we develop this initial line of work on JPEG-LS compressed remote sensing image restoration. We propose a novel CNN model called CARNet. Its core idea is a context-aware residual learning mechanism. Specifically, it realizes residual learning for accurate restoration by adopting a scale-invariant baseline. It enables large receptive fields for banding artifact removal through a context-aware scheme. Additionally, it eases the information flow among stages by utilizing a prior-guided feature-fusion mechanism. Alternatively, we design novel R IQA models to provide a better restoration performance assessment for our study by utilizing gradient priors of JPEG-LS banding artifacts. Furthermore, we prepare a new dataset of JPEG-LS compressed remote sensing images to supplement existing benchmark data. Experiments show that our method sets the state-of-the-art for JPEG-LS compressed remote sensing image restoration. Full article
Show Figures

Figure 1

16 pages, 2827 KiB  
Article
Local-Moment-Driven Robust Reversible Data Hiding
by Yash Veer Singh, Shadab Khan, Santosh Kumar Shukla and Ki-Hyun Jung
Appl. Sci. 2022, 12(22), 11826; https://doi.org/10.3390/app122211826 - 21 Nov 2022
Cited by 3 | Viewed by 1716
Abstract
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then embeds the secret information into the MSB [...] Read more.
In this paper, a local-moment-driven robust reversible data hiding (LM-RRDH) scheme is proposed, which can provide security to hidden messages against unintentional modifications. The proposed LM-RRDH decomposes an image into LSB and MSB planes and then embeds the secret information into the MSB image so that intrusion by unintentional modifications can be avoided. In addition, the proposed scheme utilizes the prevalent correlation among the pixels on the MSB plane for optimal embedding. In the proposed scheme, a cover image is partitioned into sub-blocks at first, and pixel groups in the sub-block are formed according to local moment and moment-of-moment so that similar-intensity pixels can be grouped into the same group. Next, the secret data is embedded into the pixels of each group by selecting a pairwise embedding strategy adaptively which is based on the number of pixels in each group. As a result, the proposed LM-RRDH can limit the distortion while providing a decent embedding capacity. Further, a protection against non-malicious attacks such as Joint Photographic Experts Group (JPEG) compression is also provided. The experimental results show that the proposed scheme provides a superior quality to the previous works while providing a comparable embedding capacity. Full article
(This article belongs to the Special Issue Development of IoE Applications for Multimedia Security)
Show Figures

Figure 1

25 pages, 15128 KiB  
Review
Compression for Bayer CFA Images: Review and Performance Comparison
by Kuo-Liang Chung, Hsuan-Ying Chen, Tsung-Lun Hsieh and Yen-Bo Chen
Sensors 2022, 22(21), 8362; https://doi.org/10.3390/s22218362 - 31 Oct 2022
Cited by 4 | Viewed by 4910
Abstract
Bayer color filter array (CFA) images are captured by a single-chip image sensor covered with a Bayer CFA pattern which has been widely used in modern digital cameras. In the past two decades, many compression methods have been proposed to compress Bayer CFA [...] Read more.
Bayer color filter array (CFA) images are captured by a single-chip image sensor covered with a Bayer CFA pattern which has been widely used in modern digital cameras. In the past two decades, many compression methods have been proposed to compress Bayer CFA images. These compression methods can be roughly divided into the compression-first-based (CF-based) scheme and the demosaicing-first-based (DF-based) scheme. However, in the literature, no review article for the two compression schemes and their compression performance is reported. In this article, the related CF-based and DF-based compression works are reviewed first. Then, the testing Bayer CFA images created from the Kodak, IMAX, screen content images, videos, and classical image datasets are compressed on the Joint Photographic Experts Group-2000 (JPEG-2000) and the newly released Versatile Video Coding (VVC) platform VTM-16.2. In terms of the commonly used objective quality, perceptual quality metrics, the perceptual effect, and the quality–bitrate tradeoff metric, the compression performance comparison of the CF-based compression methods, in particular the reversible color transform-based compression methods and the DF-based compression methods, is reported and discussed. Full article
Show Figures

Figure 1

16 pages, 16085 KiB  
Article
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression
by Urmila Pilania, Rohit Tanwar, Mazdak Zamani and Azizah Abdul Manaf
Future Internet 2022, 14(9), 254; https://doi.org/10.3390/fi14090254 - 25 Aug 2022
Cited by 11 | Viewed by 2469
Abstract
In today’s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of personal information. Storing and [...] Read more.
In today’s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of personal information. Storing and forwarding of embedded personal information specifically in public places is gaining more attention day by day. In this research work, the Integer Wavelet Transform technique along with JPEG (Joint Photograph Expert Group) compression is proposed to overcome some of the issues associated with steganography techniques. Video cover files and JPEG compression improve concealing capacity because of their intrinsic properties. Integer Wavelet Transform is used to improve the imperceptibility and robustness of the proposed technique. The Imperceptibility of the proposed work is analyzed through evaluation parameters such as PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error), SSIM (Structure Similarity Metric), and CC (Correlation Coefficient). Robustness is validated through some image processing attacks. Complexity is calculated in terms of concealing and retrieval time along with the amount of secret information hidden. Full article
(This article belongs to the Special Issue Distributed Systems and Artificial Intelligence)
Show Figures

Figure 1

19 pages, 8056 KiB  
Article
First Gradually, Then Suddenly: Understanding the Impact of Image Compression on Object Detection Using Deep Learning
by Tomasz Gandor and Jakub Nalepa
Sensors 2022, 22(3), 1104; https://doi.org/10.3390/s22031104 - 1 Feb 2022
Cited by 23 | Viewed by 6252
Abstract
Video surveillance systems process high volumes of image data. To enable long-term retention of recorded images and because of the data transfer limitations in geographically distributed systems, lossy compression is commonly applied to images prior to processing, but this causes a deterioration in [...] Read more.
Video surveillance systems process high volumes of image data. To enable long-term retention of recorded images and because of the data transfer limitations in geographically distributed systems, lossy compression is commonly applied to images prior to processing, but this causes a deterioration in image quality due to the removal of potentially important image details. In this paper, we investigate the impact of image compression on the performance of object detection methods based on convolutional neural networks. We focus on Joint Photographic Expert Group (JPEG) compression and thoroughly analyze a range of the performance metrics. Our experimental study, performed over a widely used object detection benchmark, assessed the robustness of nine popular object-detection deep models against varying compression characteristics. We show that our methodology can allow practitioners to establish an acceptable compression level for specific use cases; hence, it can play a key role in applications that process and store very large image data. Full article
(This article belongs to the Special Issue Sensors for Object Detection, Classification and Tracking)
Show Figures

Figure 1

13 pages, 6937 KiB  
Article
Reduction of Compression Artifacts Using a Densely Cascading Image Restoration Network
by Yooho Lee, Sang-hyo Park, Eunjun Rhee, Byung-Gyu Kim and Dongsan Jun
Appl. Sci. 2021, 11(17), 7803; https://doi.org/10.3390/app11177803 - 25 Aug 2021
Cited by 4 | Viewed by 3234
Abstract
Since high quality realistic media are widely used in various computer vision applications, image compression is one of the essential technologies to enable real-time applications. Image compression generally causes undesired compression artifacts, such as blocking artifacts and ringing effects. In this study, we [...] Read more.
Since high quality realistic media are widely used in various computer vision applications, image compression is one of the essential technologies to enable real-time applications. Image compression generally causes undesired compression artifacts, such as blocking artifacts and ringing effects. In this study, we propose a densely cascading image restoration network (DCRN), which consists of an input layer, a densely cascading feature extractor, a channel attention block, and an output layer. The densely cascading feature extractor has three densely cascading (DC) blocks, and each DC block contains two convolutional layers, five dense layers, and a bottleneck layer. To optimize the proposed network architectures, we investigated the trade-off between quality enhancement and network complexity. Experimental results revealed that the proposed DCRN can achieve a better peak signal-to-noise ratio and structural similarity index measure for compressed joint photographic experts group (JPEG) images compared to the previous methods. Full article
(This article belongs to the Special Issue Artificial Intelligence for Multimedia Signal Processing)
Show Figures

Figure 1

25 pages, 2356 KiB  
Article
A Hidden DCT-Based Invisible Watermarking Method for Low-Cost Hardware Implementations
by Yuxuan Wang, Yuanyong Luo, Zhongfeng Wang and Hongbing Pan
Electronics 2021, 10(12), 1465; https://doi.org/10.3390/electronics10121465 - 18 Jun 2021
Cited by 5 | Viewed by 5283
Abstract
This paper presents an invisible and robust watermarking method and its hardware implementation. The proposed architecture is based on the discrete cosine transform (DCT) algorithm. Novel techniques are applied as well to reduce the computational cost of DCT and color space conversion to [...] Read more.
This paper presents an invisible and robust watermarking method and its hardware implementation. The proposed architecture is based on the discrete cosine transform (DCT) algorithm. Novel techniques are applied as well to reduce the computational cost of DCT and color space conversion to achieve low-cost and high-speed performance. Besides, a watermark embedder and a blind extractor are implemented in the same circuit using a resource-sharing method. Our approach is compatible with various watermarking embedding ratios, such as 1/16 and 1/64, with a PSNR of over 45 and the NC value of 1. After Joint Photographic Experts Group (JPEG) compression with a quality factor (QF) of 50, our method can achieve an NC value of 0.99. Results from a design compiler (DC) with TSMC-90 nm CMOS technology show that our design can achieve the frequency of 2.32 GHz with the area consumption of 304,980.08 μm2 and power consumption of 508.1835 mW. For the FPGA implementation, our method achieved a frequency of 421.94 MHz. Compared with the state-of-the-art works, our design improved the frequency by 4.26 times, saved 90.2% on area and increased the power efficiency by more than 1000 fold. Full article
(This article belongs to the Section Circuit and Signal Processing)
Show Figures

Figure 1

16 pages, 5975 KiB  
Article
VLSI Implementation of a Cost-Efficient Loeffler DCT Algorithm with Recursive CORDIC for DCT-Based Encoder
by Rih-Lung Chung, Chen-Wei Chen, Chiung-An Chen, Patricia Angela R. Abu and Shih-Lun Chen
Electronics 2021, 10(7), 862; https://doi.org/10.3390/electronics10070862 - 5 Apr 2021
Cited by 6 | Viewed by 3231
Abstract
This paper presents a low-cost and high-quality, hardware-oriented, two-dimensional discrete cosine transform (2-D DCT) signal analyzer for image and video encoders. In order to reduce memory requirement and improve image quality, a novel Loeffler DCT based on a coordinate rotation digital computer (CORDIC) [...] Read more.
This paper presents a low-cost and high-quality, hardware-oriented, two-dimensional discrete cosine transform (2-D DCT) signal analyzer for image and video encoders. In order to reduce memory requirement and improve image quality, a novel Loeffler DCT based on a coordinate rotation digital computer (CORDIC) technique is proposed. In addition, the proposed algorithm is realized by a recursive CORDIC architecture instead of an unfolded CORDIC architecture with approximated scale factors. In the proposed design, a fully pipelined architecture is developed to efficiently increase operating frequency and throughput, and scale factors are implemented by using four hardware-sharing machines for complexity reduction. Thus, the computational complexity can be decreased significantly with only 0.01 dB loss deviated from the optimal image quality of the Loeffler DCT. Experimental results show that the proposed 2-D DCT spectral analyzer not only achieved a superior average peak signal–noise ratio (PSNR) compared to the previous CORDIC-DCT algorithms but also designed cost-efficient architecture for very large scale integration (VLSI) implementation. The proposed design was realized using a UMC 0.18-μm CMOS process with a synthesized gate count of 8.04 k and core area of 75,100 μm2. Its operating frequency was 100 MHz and power consumption was 4.17 mW. Moreover, this work had at least a 64.1% gate count reduction and saved at least 22.5% in power consumption compared to previous designs. Full article
(This article belongs to the Special Issue New Techniques for Image and Video Coding)
Show Figures

Figure 1

Back to TopTop