This document describes a method for efficiently streaming video data over a network by splitting the video frames into non-overlapping blocks. It involves dividing each video frame into blocks, extracting features from each block, and transmitting the blocks separately to allow playback before full transmission. The method is implemented using FPGA and MATLAB tools to split frames, interpolate blocks to original size without blurring, and display the enlarged blocks on a screen for streaming video data. This splitting and interpolation approach allows for higher precision video streaming with reduced data requirements.
Digital image processing involves compressing images to reduce file sizes. Image compression removes redundant data using three main techniques: coding redundancy reduction assigns shorter codes to more common pixel values; spatial and temporal redundancy reduction exploits correlations between neighboring pixel values; and irrelevant information removal discards visually unimportant data. Compression is achieved by an encoder that applies these techniques, while a decoder reconstructs the image for viewing. Popular compression methods include Huffman coding and arithmetic coding. Compression allows storage and transmission of images and video using less data while maintaining acceptable visual quality.
This document provides an overview and illustration of JPEG 2000, a new image compression standard that replaces JPEG. It explains key features like tile division, progression order, quantization, discrete wavelet transformation, DC level shifting, and region of interest encoding. Graphs show that JPEG 2000 provides much smaller file sizes than JPEG while maintaining higher image quality. The conclusion states that JPEG 2000 offers excellent compression, fully exploits discrete wavelet transformation, and is well-suited for hardware implementation, establishing it as the most advanced image compression standard.
This document discusses techniques for effective compression of digital video. It introduces several key algorithms used in video compression, including discrete cosine transform (DCT) for spatial redundancy reduction, motion estimation (ME) for temporal redundancy reduction, and embedded zerotree wavelet (EZW) transforms. DCT is used to compress individual video frames by removing spatial correlations within frames. Motion estimation compares blocks of pixels between frames to find and encode motion vectors rather than full pixel values, reducing file size. Combined, these techniques can achieve high compression ratios while maintaining high video quality for storage and transmission.
This document summarizes an article that proposes modifications to the JPEG 2000 image compression standard to achieve higher compression ratios while maintaining acceptable error rates. The proposed Adaptive JPEG 2000 technique involves pre-processing images with a transfer function to make them more suitable for compression by JPEG 2000. This is intended to provide higher compression ratios than the original JPEG 2000 standard while keeping root mean square error within allowed thresholds. The document provides background on JPEG 2000 and lossy image compression techniques, describes the proposed pre-processing approach, and indicates it was tested on single-channel images.
Compression: Video Compression (MPEG and others)danishrafiq
This document provides an overview of video compression techniques used in standards like MPEG and H.261. It discusses how uncompressed video data requires huge storage and bandwidth that compression aims to address. It explains that lossy compression methods are needed to achieve sufficient compression ratios. The key techniques discussed are intra-frame coding using DCT and quantization similar to JPEG, and inter-frame coding using motion estimation and compensation to remove temporal redundancy between frames. Motion vectors are found using techniques like block matching and sum of absolute differences. MPEG and other standards use a combination of these intra and inter-frame coding techniques to efficiently compress video for storage and transmission.
Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...CSCJournals
The new image compression standard JPEG2000, provides high compression rates for the same visual quality for gray and color images than JPEG. JPEG2000 is being adopted for image compression and transmission in mobile phones, PDA and computers. An image may contain the formatted text and graphics data. The compression performance of the JPEG2000 behaves poorly when compressing an image with low color depth such as graphics images. In this paper, we propose a technique to distinguish the true color images from graphics images and to compress graphics images using a simplified JPEG2000 compression method that will improve the compression performance. This method can be easily adapted in image compression applications without changing the syntax of compressed stream.
Digital image processing involves compressing images to reduce file sizes. Image compression removes redundant data using three main techniques: coding redundancy reduction assigns shorter codes to more common pixel values; spatial and temporal redundancy reduction exploits correlations between neighboring pixel values; and irrelevant information removal discards visually unimportant data. Compression is achieved by an encoder that applies these techniques, while a decoder reconstructs the image for viewing. Popular compression methods include Huffman coding and arithmetic coding. Compression allows storage and transmission of images and video using less data while maintaining acceptable visual quality.
This document provides an overview and illustration of JPEG 2000, a new image compression standard that replaces JPEG. It explains key features like tile division, progression order, quantization, discrete wavelet transformation, DC level shifting, and region of interest encoding. Graphs show that JPEG 2000 provides much smaller file sizes than JPEG while maintaining higher image quality. The conclusion states that JPEG 2000 offers excellent compression, fully exploits discrete wavelet transformation, and is well-suited for hardware implementation, establishing it as the most advanced image compression standard.
This document discusses techniques for effective compression of digital video. It introduces several key algorithms used in video compression, including discrete cosine transform (DCT) for spatial redundancy reduction, motion estimation (ME) for temporal redundancy reduction, and embedded zerotree wavelet (EZW) transforms. DCT is used to compress individual video frames by removing spatial correlations within frames. Motion estimation compares blocks of pixels between frames to find and encode motion vectors rather than full pixel values, reducing file size. Combined, these techniques can achieve high compression ratios while maintaining high video quality for storage and transmission.
This document summarizes an article that proposes modifications to the JPEG 2000 image compression standard to achieve higher compression ratios while maintaining acceptable error rates. The proposed Adaptive JPEG 2000 technique involves pre-processing images with a transfer function to make them more suitable for compression by JPEG 2000. This is intended to provide higher compression ratios than the original JPEG 2000 standard while keeping root mean square error within allowed thresholds. The document provides background on JPEG 2000 and lossy image compression techniques, describes the proposed pre-processing approach, and indicates it was tested on single-channel images.
Compression: Video Compression (MPEG and others)danishrafiq
This document provides an overview of video compression techniques used in standards like MPEG and H.261. It discusses how uncompressed video data requires huge storage and bandwidth that compression aims to address. It explains that lossy compression methods are needed to achieve sufficient compression ratios. The key techniques discussed are intra-frame coding using DCT and quantization similar to JPEG, and inter-frame coding using motion estimation and compensation to remove temporal redundancy between frames. Motion vectors are found using techniques like block matching and sum of absolute differences. MPEG and other standards use a combination of these intra and inter-frame coding techniques to efficiently compress video for storage and transmission.
Use of Wavelet Transform Extension for Graphics Image Compression using JPEG2...CSCJournals
The new image compression standard JPEG2000, provides high compression rates for the same visual quality for gray and color images than JPEG. JPEG2000 is being adopted for image compression and transmission in mobile phones, PDA and computers. An image may contain the formatted text and graphics data. The compression performance of the JPEG2000 behaves poorly when compressing an image with low color depth such as graphics images. In this paper, we propose a technique to distinguish the true color images from graphics images and to compress graphics images using a simplified JPEG2000 compression method that will improve the compression performance. This method can be easily adapted in image compression applications without changing the syntax of compressed stream.
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionIJERA Editor
A robust watermark scheme for copyright protection is proposed in this paper. The present method selects the
best block of image for watermark embedding by comparing luminance value of colored image and block. The
watermark is embedded in the selected pixel blocks by using block pixel differencing LSB substitution method.
The proposed approach overcomes the weak robustness problem of embedding the watermark in the spatial
domain LSB substitution method. Further the watermark extraction does not require the original image as in the
case of many digital watermarking methods. The experimental results indicate that the proposed system is better
in terms of image quality and robustness against various attacks.
Image compression using discrete wavelet transformHarshal Ladhe
This document discusses image compression using the discrete wavelet transform (DWT) as outlined in the JPEG2000 standard. It presents the basic block diagram of image compression, including the encoder and decoder. It demonstrates color and gray-scale image compression across multiple levels of compression, showing the original and compressed images. It concludes that DWT provides high compression ratios while maintaining image quality and outperforms other traditional techniques. Future work is proposed to implement neural network-based compression.
The document discusses JPEG 2000 software licensing. It notes that the authors' JPEG 2000 software package was originally intended for internal research and as a reference for the JPEG 2000 Part 10 standard, but that they have received numerous requests from companies and academics. It raises questions about how to balance non-commercial and commercial use policies for the code and how to provide access to it while potentially creating revenue.
A High Performance Modified SPIHT for Scalable Image CompressionCSCJournals
In this paper, we present a novel extension technique to the Set Partitioning in Hierarchical Trees (SPIHT) based image compression with spatial scalability. The present modification and the preprocessing techniques provide significantly better quality (both subjectively and objectively) reconstruction at the decoder with little additional computational complexity. There are two proposals for this paper. Firstly, we propose a pre-processing scheme, called Zero-Shifting, that brings the spatial values in signed integer range without changing the dynamic ranges, so that the transformed coefficient calculation becomes more consistent. For that reason, we have to modify the initialization step of the SPIHT algorithms. The experiments demonstrate a significant improvement in visual quality and faster encoding and decoding than the original one. Secondly, we incorporate the idea to facilitate resolution scalable decoding (not incorporated in original SPIHT) by rearranging the order of the encoded output bit stream. During the sorting pass of the SPIHT algorithm, we model the transformed coefficient based on the probability of significance, at a fixed threshold of the offspring. Calling it a fixed context model and generating a Huffman code for each context, we achieve comparable compression efficiency to that of arithmetic coder, but with much less computational complexity and processing time. As far as objective quality assessment of the reconstructed image is concerned, we have compared our results with popular Peak Signal to Noise Ratio (PSNR) and with Structural Similarity Index (SSIM). Both these metrics show that our proposed work is an improvement over the original one.
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image watermarking based on integer wavelet transform-singular value decompos...IJECEIAES
With the era of rapid technology in multimedia, the copyright protection is very important to preserve an ownership of multimedia data. This paper proposes an image watermarking scheme based on Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD). The binary watermark is scrambled by Arnold transform before embedding watermark. Embedding locations are determined by using variance pixels. Selected blocks with the lowest variance pixels are transformed by IWT, thus the LL sub-band of 8×8 IWT is computed by using SVD. The orthogonal U matrix component of U3,1 and U4,1 are modified using certain rules by considering the watermark bits and an optimal threshold. This research reveals an optimal threshold value based on the trade-off between robustness and imperceptibility of watermarked image. In order to measure the watermarking performance, the proposed scheme is tested under various attacks. The experimental results indicate that our scheme achieves higher robustness than other scheme under different types of attack.
1) The document discusses implementing various image compression algorithms such as discrete cosine transform (DCT), discrete wavelet transform (DWT), run length encoding (RLE), and quantization.
2) These algorithms aim to reduce image file size by eliminating redundant or unnecessary pixel data in order to more efficiently store and transmit images.
3) Key steps involve applying transforms to extract coefficients, then quantizing coefficients to remove insignificant values without significantly impacting image quality.
Digital video watermarking using modified lsb and dct techniqueeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document compares the DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) image compression techniques. It finds that DWT provides higher compression ratios and avoids blocking artifacts compared to DCT. DWT allows for better localization in both spatial and frequency domains. It also has inherent scaling and better identifies visually relevant data, leading to higher compression ratios. However, DCT is faster than DWT. Experimental results on test images show that DWT achieves higher PSNR and lower MSE and BER than DCT, while providing a slightly higher compression ratio and completing compression more quickly.
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
This document presents an approach for image deblurring based on sparse representation and a regularized filter. The approach involves splitting the blurred input image into patches, estimating sparse coefficients for each patch, learning dictionaries from the coefficients, and merging the patches. The merged patches are subtracted from the blurred image to obtain the deblur kernel. Wiener deconvolution with the kernel is then applied and followed by a regularized filter to recover the original image without blurring. The approach was tested on MATLAB and evaluation metrics like RMSE, PSNR, and SSIM showed it performed better than existing methods, recovering images with more details and contrast.
This document discusses various image compression standards and techniques. It begins with an introduction to image compression, noting that it reduces file sizes for storage or transmission while attempting to maintain image quality. It then outlines several international compression standards for binary images, photos, and video, including JPEG, MPEG, and H.261. The document focuses on JPEG, describing how it uses discrete cosine transform and quantization for lossy compression. It also discusses hierarchical and progressive modes for JPEG. In closing, the document presents challenges and results for motion segmentation and iris image segmentation.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
1) The document discusses a video steganography technique that hides data in a video file by substituting the least significant bits of frames with binary data, using different polynomial equations to determine the locations for insertion.
2) The technique converts the video into frames, treats each frame as an image, and hides binary data by replacing the least significant bit of pixels with binary values. Polynomial equations are used to select specific pixels for insertion.
3) The process of encoding involves converting a text file into binary, using polynomials to select pixel locations, and replacing least significant bit values to create a stego video. Decoding extracts the binary data and reconstructs the original text file.
The document discusses the JPEG image compression standard. It describes the basic JPEG compression pipeline which involves encoding, decoding, colour space transform, discrete cosine transform (DCT), quantization, zigzag scan, differential pulse code modulation (DPCM) on the DC component, run length encoding (RLE) on the AC components, and entropy coding using Huffman or arithmetic coding. It provides details on quantization methods, quantization tables, zigzag scan, DPCM, RLE, and Huffman coding used in JPEG to achieve maximal compression of images.
Efficient Image Compression Technique using JPEG2000 with Adaptive ThresholdCSCJournals
Image compression is a technique to reduce the size of image which is helpful for transforms. Due to the limited communication bandwidth we have to need optimum compressed image with good visual quality. Although the JPEG2000 compression technique is ideal for image processing as it uses DWT (Discrete Wavelet Transform).But in this paper we proposed fast and efficient image compression scheme using JPEG2000 technique with adaptive subband threshold. Actually we used subband adaptive threshold in decomposition section which gives us more compression ratio and good visual quality other than existing compression techniques. The subband adaptive threshold that concentrates on denoising each subband (except lowest coefficient subbands) by minimizing insignificant coefficients and adapt with modified coefficients which are significant and more responsible for image reconstruction. Finally we use embedded block coding with optimized truncation (EBCOT) entropy coder that gives three different passes which gives more compressed image. This proposed method is compared to other existing approach and give superior result that satisfy the human visual quality and also these resulting compressed images are evaluated by the performance parameter PSNR.
Dynamic Texture Coding using Modified Haar Wavelet with CUDAIJERA Editor
Texture is an image having repetition of patterns. There are two types, static and dynamic texture. Static texture is an image having repetitions of patterns in the spatial domain. Dynamic texture is number of frames having repetitions in spatial and temporal domain. This paper introduces a novel method for dynamic texture coding to achieve higher compression ratio of dynamic texture using 2D-modified Haar wavelet transform. The dynamic texture video contains high redundant parts in spatial and temporal domain. Redundant parts can be removed to achieve high compression ratios with better visual quality. The modified Haar wavelet is used to exploit spatial and temporal correlations amongst the pixels. The YCbCr color model is used to exploit chromatic components as HVS is less sensitive to chrominance. To decrease the time complexity of algorithm parallel programming is done using CUDA (Compute Unified Device Architecture). GPU contains the number of cores as compared to CPU, which is utilized to reduce the time complexity of algorithms.
Presented at the Digital Initiatives and Nearby History Institute, Terre Haute, IN, July 19, 2006 and the Indiana Library Federation Annual Conference: Indianapolis, IN, April 12, 2006;
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document is a mini project report on digital image processing using MATLAB. It discusses various image processing techniques and applications implemented in MATLAB, including image formats, operations, and tools. Applications demonstrated include text recognition, color tracking, solving an engineering problem using image processing, creating a virtual slate using laser tracking, face detection, and distance estimation. The report provides examples of MATLAB functions used for tasks like importing, displaying, converting and cropping images, as well as analyzing and manipulating them.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that presents a non-invasive method for estimating consciousness level using EEG signals. The method uses two electrodes to collect bio-potential signals from the brain, which are then amplified, filtered, and analyzed using fast Fourier transform (FFT) to extract the beta wave frequency range associated with different consciousness levels. Results from drug and alcohol experiments on subjects showed that their brain wave frequencies shifted towards the alpha range when intoxicated, indicating a loss of consciousness. The frequency analysis provides a way to continuously monitor consciousness level.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionIJERA Editor
A robust watermark scheme for copyright protection is proposed in this paper. The present method selects the
best block of image for watermark embedding by comparing luminance value of colored image and block. The
watermark is embedded in the selected pixel blocks by using block pixel differencing LSB substitution method.
The proposed approach overcomes the weak robustness problem of embedding the watermark in the spatial
domain LSB substitution method. Further the watermark extraction does not require the original image as in the
case of many digital watermarking methods. The experimental results indicate that the proposed system is better
in terms of image quality and robustness against various attacks.
Image compression using discrete wavelet transformHarshal Ladhe
This document discusses image compression using the discrete wavelet transform (DWT) as outlined in the JPEG2000 standard. It presents the basic block diagram of image compression, including the encoder and decoder. It demonstrates color and gray-scale image compression across multiple levels of compression, showing the original and compressed images. It concludes that DWT provides high compression ratios while maintaining image quality and outperforms other traditional techniques. Future work is proposed to implement neural network-based compression.
The document discusses JPEG 2000 software licensing. It notes that the authors' JPEG 2000 software package was originally intended for internal research and as a reference for the JPEG 2000 Part 10 standard, but that they have received numerous requests from companies and academics. It raises questions about how to balance non-commercial and commercial use policies for the code and how to provide access to it while potentially creating revenue.
A High Performance Modified SPIHT for Scalable Image CompressionCSCJournals
In this paper, we present a novel extension technique to the Set Partitioning in Hierarchical Trees (SPIHT) based image compression with spatial scalability. The present modification and the preprocessing techniques provide significantly better quality (both subjectively and objectively) reconstruction at the decoder with little additional computational complexity. There are two proposals for this paper. Firstly, we propose a pre-processing scheme, called Zero-Shifting, that brings the spatial values in signed integer range without changing the dynamic ranges, so that the transformed coefficient calculation becomes more consistent. For that reason, we have to modify the initialization step of the SPIHT algorithms. The experiments demonstrate a significant improvement in visual quality and faster encoding and decoding than the original one. Secondly, we incorporate the idea to facilitate resolution scalable decoding (not incorporated in original SPIHT) by rearranging the order of the encoded output bit stream. During the sorting pass of the SPIHT algorithm, we model the transformed coefficient based on the probability of significance, at a fixed threshold of the offspring. Calling it a fixed context model and generating a Huffman code for each context, we achieve comparable compression efficiency to that of arithmetic coder, but with much less computational complexity and processing time. As far as objective quality assessment of the reconstructed image is concerned, we have compared our results with popular Peak Signal to Noise Ratio (PSNR) and with Structural Similarity Index (SSIM). Both these metrics show that our proposed work is an improvement over the original one.
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Image watermarking based on integer wavelet transform-singular value decompos...IJECEIAES
With the era of rapid technology in multimedia, the copyright protection is very important to preserve an ownership of multimedia data. This paper proposes an image watermarking scheme based on Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD). The binary watermark is scrambled by Arnold transform before embedding watermark. Embedding locations are determined by using variance pixels. Selected blocks with the lowest variance pixels are transformed by IWT, thus the LL sub-band of 8×8 IWT is computed by using SVD. The orthogonal U matrix component of U3,1 and U4,1 are modified using certain rules by considering the watermark bits and an optimal threshold. This research reveals an optimal threshold value based on the trade-off between robustness and imperceptibility of watermarked image. In order to measure the watermarking performance, the proposed scheme is tested under various attacks. The experimental results indicate that our scheme achieves higher robustness than other scheme under different types of attack.
1) The document discusses implementing various image compression algorithms such as discrete cosine transform (DCT), discrete wavelet transform (DWT), run length encoding (RLE), and quantization.
2) These algorithms aim to reduce image file size by eliminating redundant or unnecessary pixel data in order to more efficiently store and transmit images.
3) Key steps involve applying transforms to extract coefficients, then quantizing coefficients to remove insignificant values without significantly impacting image quality.
Digital video watermarking using modified lsb and dct techniqueeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document compares the DCT (Discrete Cosine Transform) and DWT (Discrete Wavelet Transform) image compression techniques. It finds that DWT provides higher compression ratios and avoids blocking artifacts compared to DCT. DWT allows for better localization in both spatial and frequency domains. It also has inherent scaling and better identifies visually relevant data, leading to higher compression ratios. However, DCT is faster than DWT. Experimental results on test images show that DWT achieves higher PSNR and lower MSE and BER than DCT, while providing a slightly higher compression ratio and completing compression more quickly.
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
This document presents an approach for image deblurring based on sparse representation and a regularized filter. The approach involves splitting the blurred input image into patches, estimating sparse coefficients for each patch, learning dictionaries from the coefficients, and merging the patches. The merged patches are subtracted from the blurred image to obtain the deblur kernel. Wiener deconvolution with the kernel is then applied and followed by a regularized filter to recover the original image without blurring. The approach was tested on MATLAB and evaluation metrics like RMSE, PSNR, and SSIM showed it performed better than existing methods, recovering images with more details and contrast.
This document discusses various image compression standards and techniques. It begins with an introduction to image compression, noting that it reduces file sizes for storage or transmission while attempting to maintain image quality. It then outlines several international compression standards for binary images, photos, and video, including JPEG, MPEG, and H.261. The document focuses on JPEG, describing how it uses discrete cosine transform and quantization for lossy compression. It also discusses hierarchical and progressive modes for JPEG. In closing, the document presents challenges and results for motion segmentation and iris image segmentation.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
1) The document discusses a video steganography technique that hides data in a video file by substituting the least significant bits of frames with binary data, using different polynomial equations to determine the locations for insertion.
2) The technique converts the video into frames, treats each frame as an image, and hides binary data by replacing the least significant bit of pixels with binary values. Polynomial equations are used to select specific pixels for insertion.
3) The process of encoding involves converting a text file into binary, using polynomials to select pixel locations, and replacing least significant bit values to create a stego video. Decoding extracts the binary data and reconstructs the original text file.
The document discusses the JPEG image compression standard. It describes the basic JPEG compression pipeline which involves encoding, decoding, colour space transform, discrete cosine transform (DCT), quantization, zigzag scan, differential pulse code modulation (DPCM) on the DC component, run length encoding (RLE) on the AC components, and entropy coding using Huffman or arithmetic coding. It provides details on quantization methods, quantization tables, zigzag scan, DPCM, RLE, and Huffman coding used in JPEG to achieve maximal compression of images.
Efficient Image Compression Technique using JPEG2000 with Adaptive ThresholdCSCJournals
Image compression is a technique to reduce the size of image which is helpful for transforms. Due to the limited communication bandwidth we have to need optimum compressed image with good visual quality. Although the JPEG2000 compression technique is ideal for image processing as it uses DWT (Discrete Wavelet Transform).But in this paper we proposed fast and efficient image compression scheme using JPEG2000 technique with adaptive subband threshold. Actually we used subband adaptive threshold in decomposition section which gives us more compression ratio and good visual quality other than existing compression techniques. The subband adaptive threshold that concentrates on denoising each subband (except lowest coefficient subbands) by minimizing insignificant coefficients and adapt with modified coefficients which are significant and more responsible for image reconstruction. Finally we use embedded block coding with optimized truncation (EBCOT) entropy coder that gives three different passes which gives more compressed image. This proposed method is compared to other existing approach and give superior result that satisfy the human visual quality and also these resulting compressed images are evaluated by the performance parameter PSNR.
Dynamic Texture Coding using Modified Haar Wavelet with CUDAIJERA Editor
Texture is an image having repetition of patterns. There are two types, static and dynamic texture. Static texture is an image having repetitions of patterns in the spatial domain. Dynamic texture is number of frames having repetitions in spatial and temporal domain. This paper introduces a novel method for dynamic texture coding to achieve higher compression ratio of dynamic texture using 2D-modified Haar wavelet transform. The dynamic texture video contains high redundant parts in spatial and temporal domain. Redundant parts can be removed to achieve high compression ratios with better visual quality. The modified Haar wavelet is used to exploit spatial and temporal correlations amongst the pixels. The YCbCr color model is used to exploit chromatic components as HVS is less sensitive to chrominance. To decrease the time complexity of algorithm parallel programming is done using CUDA (Compute Unified Device Architecture). GPU contains the number of cores as compared to CPU, which is utilized to reduce the time complexity of algorithms.
Presented at the Digital Initiatives and Nearby History Institute, Terre Haute, IN, July 19, 2006 and the Indiana Library Federation Annual Conference: Indianapolis, IN, April 12, 2006;
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document is a mini project report on digital image processing using MATLAB. It discusses various image processing techniques and applications implemented in MATLAB, including image formats, operations, and tools. Applications demonstrated include text recognition, color tracking, solving an engineering problem using image processing, creating a virtual slate using laser tracking, face detection, and distance estimation. The report provides examples of MATLAB functions used for tasks like importing, displaying, converting and cropping images, as well as analyzing and manipulating them.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that presents a non-invasive method for estimating consciousness level using EEG signals. The method uses two electrodes to collect bio-potential signals from the brain, which are then amplified, filtered, and analyzed using fast Fourier transform (FFT) to extract the beta wave frequency range associated with different consciousness levels. Results from drug and alcohol experiments on subjects showed that their brain wave frequencies shifted towards the alpha range when intoxicated, indicating a loss of consciousness. The frequency analysis provides a way to continuously monitor consciousness level.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a study that used finite element modeling to simulate the hot rolling process and investigate the effects of various process parameters. The study developed a 3D finite element model of the hot rolling process using Abaqus software. It then analyzed how changes in parameters like slab thickness, rolling speed, roll diameter, thickness reduction, and temperature affect outcomes like temperature distribution, stress, strain, and roll force. The model was validated by comparing its predictions to theoretical results from previous studies. The results showed that increasing rolling speed, roll diameter, or thickness reduction increased roll force, while increasing temperature decreased roll force. Higher speeds also decreased minimum slab surface temperature.
This document discusses a numerical study of supersonic flow in conical rocket nozzles using computational fluid dynamics (CFD). The study uses Gambit software to design nozzle geometries and Fluent software to simulate flows. Specifically, it analyzes the flow in a conical nozzle with a divergence angle of 7 degrees. The results show the variation in parameters like Mach number, pressure, temperature, and velocity across the nozzle. Mach number increases from subsonic to supersonic values, static pressure decreases, and total temperature remains nearly constant before increasing near the nozzle exit.
This document summarizes a research paper that proposes a soft-switched PWM zero-voltage switching (ZVS) full bridge DC-DC converter. It introduces a circuit with an auxiliary transformer to achieve ZVS over a wide load range with minimal circulating energy. The auxiliary transformer provides a path for current through a primary inductor used to store ZVS energy. This adaptive energy storage allows ZVS even at no load, reducing component sizes and secondary-side duty cycle losses compared to conventional phase-shift full bridge converters. The document examines the circuit design and operation in detail.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document analyzes water samples from 258 wells in fractured sandstone basins in Mali. Statistical analysis identifies three classes of groundwater: 1) Normal carbonate calcium magnesium water. 2) Contaminated water high in iron and nitrates likely of anthropogenic origin. 3) Saline water high in sodium, chlorides and potassium. Principal component analysis identifies correlations between ions indicating water-rock interactions and some contamination from human activities like agriculture. The study provides baseline data on groundwater quality in the region.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document analyzes the runoff process at the outlet of the Kolondieba watershed in Mali. Monitoring of physicochemical parameters like pH, temperature, electrical conductivity, and total dissolved solids was conducted from 2009-2011 in rainfall, surface water, groundwater, and at the outlet. The deconvolution method EMMA was used to determine the origin of runoff based on electrical conductivity and total dissolved solids diagrams. This analysis showed a bipolar origin of runoff with rapid flows from rainfall (Qr) making up 77% and delayed flows from shallow aquifers (Qd) making up 23% during the high water period of 2010. In 2011, Qr increased to 80% while Qd decreased due
The document summarizes a study that used Taguchi methods and Grey Relational Analysis to optimize machining parameters (cutting speed, feed rate, depth of cut) for turning AISI H13 steel to maximize material removal rate and minimize surface roughness. Experiments were conducted based on an L18 orthogonal array design. Analysis of variance identified the significant parameters affecting each response. Optimal conditions for combined effects were found to be a cutting speed of 270m/min, feed rate of 0.1mm/rev, and depth of cut of 1.5mm, achieving a surface roughness of 1.0828μm and material removal rate of 554.04mm3/sec.
This document reviews various methods of wireless power transmission. It discusses Nikola Tesla's early experiments with wireless power transmission using large towers. It also describes several modern methods, including microwave power transmission, which transfers power via directed radio waves; electromagnetic transmission using lasers; inductive coupling using magnetic fields generated by coils; and resonant inductive coupling that improves efficiency through magnetic field resonance between coils. The document provides examples and diagrams to explain these different wireless power transmission technologies.
The document proposes a new strategy called Maximum Distance Point Strategy (MDPS) to evaluate spherical form error from points measured by a Coordinate Measuring Machine (CMM). MDPS selects points that are maximally distant from each other to define a candidate sphere, unlike the commonly used Least Squares Method (LSM) which minimizes the sum of squared deviations of all points from the sphere. The results of MDPS are compared to LSM. MDPS is found to provide comparable or better results than LSM, especially when points are not uniformly distributed. The strategy aims to provide a more robust evaluation of spherical form error compared to existing methods.
This document summarizes a study on connecting a wind farm to an AC load through a rectifier-inverter system and using batteries for energy storage. It discusses how batteries can be charged during periods of high wind by storing surplus power generated, and can discharge to supply the AC load during periods of low wind. MATLAB simulation results are presented showing voltage waveforms with and without batteries connected in parallel to the wind farm. The study highlights the importance of energy storage devices like batteries for ensuring continuous power supply to loads, even during low wind conditions, by charging batteries when wind is high and discharging them when wind is low.
This document summarizes a study that investigated the elasticity, compressive strength, and shear strength of masonry walls constructed from clay bricks commonly used in East Java, Indonesia. Tests were conducted on brick samples from several areas and mortar mixtures to determine their material properties. The results showed that the properties of the local brick walls differ from descriptions in references from Western countries. Specifically, the strength of the bricks tested was lower than the mortar, unlike Western masonry walls where bricks are stronger than mortar. This suggests existing theories for analyzing masonry strength and failure may not apply and a new approach is needed for Indonesian clay brick walls.
This document summarizes a study on flood risk reduction management of the Bhagirathi River in Agradweep, West Bengal, India.
1) The study aims to understand the types and impacts of floods in Agradweep, evaluate the roles of government and NGOs in disaster management and post-flood reconstruction, and identify ways to reduce flood impacts.
2) Primary data was collected through questionnaires and interviews with local communities, and secondary data from government reports and literature. The methodology included site selection, sampling, data collection, analysis, and reporting.
3) The results indicate that Agradweep experiences annual flooding in August-September-October from the Bhagirathi River, causing water
Secured Data Transmission Using Video Steganographic SchemeIJERA Editor
Steganography is the art of hiding information in ways that avert the revealing of hiding messages. Video Steganography is focused on spatial and transform domain. Spatial domain algorithm directly embedded information in the cover image with no visual changes. This kind of algorithms has the advantage in Steganography capacity, but the disadvantage is weak robustness. Transform domain algorithm is embedding the secret information in the transform space. This kind of algorithms has the advantage of good stability, but the disadvantage of small capacity. These kinds of algorithms are vulnerable to steganalysis. This paper proposes a new Compressed Video Steganographic scheme. The data is hidden in the horizontal and the vertical components of the motion vectors. The PSNR value is calculated so that the quality of the video after the data hiding is evaluated.
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
This document proposes a new secure image transmission method using byte rotation algorithm that improves encryption speed and security. The key steps are:
1. The input image is divided into four blocks which are shuffled using byte rotation.
2. A cover image is used to embed the shuffled secret image blocks for transmission.
3. At the receiver, byte rotation is applied again to extract the original secret image blocks from the embedded image.
Experimental results show the proposed method recovers images with high PSNR quality scores while increasing encryption speed over other algorithms like AES. This provides a more secure and fast way to transmit encrypted images over networks.
This document discusses various image compression methods and algorithms. It begins by explaining the need for image compression in applications like transmission, storage, and databases. It then reviews different types of compression, including lossless techniques like run length encoding and Huffman encoding, and lossy techniques like transformation coding, vector quantization, fractal coding, and subband coding. The document also describes the JPEG 2000 image compression algorithm and applications of JPEG 2000. Finally, it discusses self-organizing feature maps (SOM) and learning vector quantization (VQ) for image compression.
Design of digital video watermarking scheme using matlab simulinkeSAT Journals
Abstract
Due to increase in growth of internet users of networks are increasing rapidly. Owners of the digital products are concerned about illegal copying of their products. Security and copyright protection are becoming important issues in multimedia applications and services. Digital watermarking is a technology used for copyright protection of digital media. Here ownership information data called watermark is embedded into the digital media without affecting its perceptual quality. In case of any dispute, the watermark data can be detected or extracted from the media and use as a proof of ownership. Digital video watermarking scheme based on Discrete Wavelet Transform is addressed in this paper. Design of this scheme using Matlab Simulink is proposed. Embedded watermark is robust against various attacks that can be carried out on the watermarked video. Index Terms:Digital video, Discrete Wavelet Transform, Binary watermark.
IRJET- A Non Uniformity Process using High Picture Range QualityIRJET Journal
This document discusses image compression techniques using high picture quality. It proposes a non-uniformity process that can compress entire images and videos to low storage space while maintaining high quality. The process dynamically selects images for compression based on their properties. It implements encoding and decoding algorithms with quantization to reconstruct compressed data efficiently while fully compressing videos and images. This achieves high coding efficiency and reduces storage requirements for images and videos.
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
This document proposes a new method for securely transmitting images over a medium using mosaic image creation in video. The method has two main phases:
1) Mosaic video creation: A video is selected and its frames are used to create a mosaic image that resembles a target secret image. Color transformations are applied to fit tiles of the secret image into blocks of frames. Relevant information for recovery is embedded into the mosaic video.
2) Secret image recovery: At the receiving end, the frames are extracted from the video. The embedded information is extracted to recover tiles of the secret image from the mosaic frames through inverse transformations. The secret image is thus reconstructed without any loss.
Lossless Encryption using BITPLANE and EDGEMAP Crypt AlgorithmsIRJET Journal
The document discusses two lossless image encryption algorithms: the bit plane crypt algorithm and the edge map crypt algorithm. Both algorithms use a key image of the same size as the original image to encrypt the image. The bit plane algorithm extracts a bit plane from another image to generate the key image. It then performs an XOR operation between the key image and each bit plane of the original image. The edge map algorithm generates the key image by detecting edges in another image and encrypts each bit plane of the original image using an XOR with the edge map. Both algorithms invert the bit plane order and combine them to produce the encrypted image. Simulation results show the original image can be recovered losslessly from the encrypted image using the decryption process for
An overview Survey on Various Video compressions and its importanceINFOGAIN PUBLICATION
With the rise of digital computing and visual data processing, the need for storage and transmission of video data became prevalent. Storage and transmission of uncompressed raw visual data is not a good practice, because it requires a large storage space and great bandwidth. Video compression algorithms can compress this raw visual data or video into smaller files with a little sacrifice on the quality. This paper an overview and comparison of standard efforts on video compression algorithm of: MPEG-1, MPEG-2, MPEG-4, MPEG-7
Efficient video compression using EZWTIJERA Editor
In this article, wavelet based lossy video compression algorithm is presented. The motion estimation and compensation, being an important part in the compression, is based on segment movements. The proposed work is based on wavelet transform algorithm Embedded Zeroed WaveletTransform (EZWT). Based on the results of peak signal to noise ratio (PSNR), mean squared error (MSE), different videos are analyzed. Maintaining the PSNR to acceptable limits the proposed EZWT algorithm achieves very good compression ratios making the technique more efficient than the 2-Discrete Cosine Transform (DCT) in the H.264/AVC codec. The method is being suitable for low bit rate video showing highest compression ratio and very good PSNR of more than 30dB.
The Computation Complexity Reduction of 2-D Gaussian FilterIRJET Journal
This document discusses reducing the computational complexity of a 2D Gaussian filter for image smoothing. It begins with an abstract that notes 2D Gaussian filters are commonly used for image smoothing but require heavy computational resources. It then proposes using fixed-point arithmetic rather than floating point to implement the filter on an FPGA, which can increase efficiency and decrease area and complexity. The document is divided into sections that cover the theory behind image filtering, image smoothing and sharpening, quality metrics for evaluation, and an energy scalable Gaussian smoothing filter architecture. It concludes by discussing results and benefits of implementing the filter using fixed-point arithmetic on an FPGA.
International Journal of Computational Engineering Research(IJCER)ijceronline
The document describes a Simulink model for splitting real-time video/images into four blocks in real-time. The model takes in an RGB video, splits it into four 128x128 blocks using a submatrix block, resizes the blocks back to the original resolution, and displays each block on a separate screen. The model is implemented using various Simulink blocks like resize, color space conversion, matrix concatenation, and submatrix selection to split, process, and display the video/image in real-time across multiple screens.
This document summarizes the development of real-time video processing IP cores in FPGA by NeST including a video scaler, sharpness enhancer, gamma correction, and picture quality enhancer modules. It describes the specifications, algorithms, and architectures of each module developed as reusable IP cores. The video scaler uses bilinear interpolation for scaling up and nearest neighbor for scaling down. The sharpness enhancer uses a Laplacian filter. Gamma correction uses programmable lookup tables. The picture quality enhancer contains brightness, contrast, and color adjustment modules. Together these cores form a video processing suite for applications like surveillance and medical imaging.
This document discusses a digital image processing (DIP) based system for identifying defects in industrial materials like steel rods. Images of reference and test samples are taken and compared using techniques like thresholding, histograms, and cell segmentation in MATLAB. Defects are identified by variations between the images. The system is implemented on an FPGA for hardware acceleration. Images of steel rods with and without defects are compared to demonstrate the system's ability to detect cracks. The DIP based approach can replace manual inspection and provides faster quality evaluation of industrial materials compared to software-only methods.
Performance Analysis of Digital Watermarking Of Video in the Spatial Domainpaperpublications3
Abstract:In this paper, we have suggested the spatial domain method for the digital video watermarking for both visible and invisible watermarks. The methods are used for the copyright protection as well as proof of ownership. In this paper we first extracted the frames from the video and then used spatial domain characteristics of the frames where we directly worked on the pixel value of the frame according to the watermark and calculated different parameters.
Keywords:Digital video watermarking, copyright protection, spatial domain watermarking, Least Significant bit substitution.
An Efficient Video Watermarking Using Color Histogram Analysis and Biplanes I...IJERA Editor
Video watermarking is a novel technology that has the ability to solve the problem of illegal digital video
manipulation and distribution. In video watermarking, the copyright bits are embedded into video bit streams.
This paper proposes an effective, robust and indiscernible video watermarking algorithm. A video can also
undergo several intentional attacks like frame dropping, averaging, cropping and median filtering and
unintentional attacks like addition of noise and compression which can compromise copyright information,
thereby denying the authentication. In this paper, the design and implementation of SVD and multiple bit plane
image based watermarking is proposed. The developed method embeds 8 bit-plane images, obtained from single
gray scale watermark image, into different frames of a video sequence. In this algorithm, some of the luminous
values in the video pictures are selected and divided into groups, and the watermark bits are embedded by
adjusting the relative relationship of the member in each group. A sufficient number of watermark bits will be
embedded into the video pictures without causing noticeable distortion. The watermark will be correctly
retrieved at the extraction stage, even after various types of video manipulation and other signal processing
attacks.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a research paper that proposes a new image encryption method using magnitude and phase manipulation with crossover and mutation approaches. The proposed method encrypts images in the frequency domain. It performs crossover operations to swap real and complex parts of frequency components. It also applies a mutation operation using NOT logic. This makes the encrypted image sensitive to key changes and difficult to decrypt without the key. The method is evaluated on different types of images and is shown to encrypt images with 84-98% efficiency depending on the image content. The authors conclude the method provides an efficient encryption scheme and future work could further improve encryption of images containing easily recognizable objects.
Performance and Analysis of Video Compression Using Block Based Singular Valu...IJMER
This document presents an analysis of low-complexity video compression using block-based singular value decomposition (SVD) algorithms. It begins with an introduction to video compression and its importance for reducing storage and transmission costs. Current video compression standards like MPEG and H.26x are computationally expensive, making them unsuitable for real-time applications. The document then discusses block SVD algorithms as an alternative that can provide higher quality compression at lower computational complexity. It analyzes reducing the time complexity of video compression using block SVD and compares it to other compression methods. The document outlines the SVD decomposition process and how a 2D version can be applied to groups of image blocks for more efficient compression than 1D SVD.
The document discusses various techniques for digital video compression. It begins by introducing the basics of digital video and motivation for compression. It then covers lossless and lossy compression techniques, including run-length encoding, Huffman encoding, and JPEG. The document also discusses video compression standards like MPEG that use both intraframe and interframe compression, and covers motion compensation techniques. It provides an overview of different video coding standards including H.261, H.263, MPEG-1, MPEG-2 and MPEG-4.
Multiple Binary Images Watermarking in Spatial and Frequency Domainssipij
Editing, reproduction and distribution of the digital multimedia are becoming extremely easier and faster with the existence of the internet and the availability of pervasive and powerful multimedia tools. Digital watermarking has emerged as a possible method to tackle these issues. This paper proposes a scheme using which more data can be inserted into an image in different domains using different techniques. This increases the embedding capacity. Using the proposed scheme 24 binary images can be embedded in the DCT domain and 12 binary images can be embedded in the spatial domain using LSB substitution technique in a single RGB image. The proposed scheme also provides an extra level of security to the watermark image by scrambling the image before embedding it into the host image. Experimental results show that the proposed watermarking method results in almost invisible difference between the watermarked image and the original image and is also robust against various image processing attacks.
Multiple Binary Images Watermarking in Spatial and Frequency Domains
Gv2512441247
1. Swamy.TN, Rashmi. KM, Dr.P.Cyril Prasanna Raj, Dr.S.L.Pinjare / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.1244-1247
FPGA Implementation Of Efficient Algorithm Of Image Splitting
For Video Streaming Data
Swamy.TN*, Rashmi. KM**, Dr.P.Cyril Prasanna Raj ***, Dr.S.L.Pinjare
****
*(Assistant Prof, Rajiv Gandhi Institute of Technology, Bangalore)
** (Assistant Prof, SDMIT, Ujire, Mangalore)
***(Director, NXG semiconductor Technologies, Bangalore)
****(PG coordinator, Nitte Meenakshi Institute of Technology, Bangalore)
ABSTRACT
Video splitting is the process of dividing it can be processed as a steady and continuous
the video into non overlapping parts. Then row stream over the network. With streaming the client
mean and column mean or each part is obtained. browser or plug in can start displaying the
After applying transform on these, features sets multimedia data before the entire file has been
can be obtained to be used in image retrieval. By transmitted.
using splitting higher precision and recall can be
obtained. Streaming refers to transferring video
data such that it can be processed as a steady and
continuous stream over the network. With
streaming the client browser or plug in can start
displaying the multimedia data before the entire
file has been transmitted. In this paper original
image of particular size is split into blocks. Each
block is enlarged to the original dimension
without blurring. Enlarged image is displayed on
the big screen. This can be done on video
streaming data. Designs are implemented using
Xilinx and Mat lab tools and Xilinx Vertex-2p
FPGA board.
Keywords– Croma, interpolation, luma,
simulink, system generator.
I. INTRODUCTION Fig1. Original image and splitted image
1.1 Video splitting
Video splitting is the process of dividing 1.2 Interpolation
the video into non overlapping parts. Then row The goal of interpolation is to produce the
mean and column mean of each part is obtained. acceptable images at different resolution from a
After applying transform on these, feature sets can single low resolution image. The actual resolution of
be obtained to be used in image retrieval. By using the image is defined as the number of pixels. Image
splitting higher precision and recall can be obtained. interpolation is a basic tool used extensively in
Natural images are captured using image sensors in zooming, shrinking, rotating and geometric
the form of voltage intensities that are digitized and corrections. Interpolation is the process of using
stored in memory banks. Large storage space is known data to estimate values of unknown
required to store and process these digital samples locations, suppose that an image of size 500*500
[1]. For example, a color image of size 256*256 pixels has to be enlarged 1.5 times to 750*750
represented using 24-bit requires a storage space of pixels. A simple way to visualize zooming is to
47 Mega bits. Similarly the storage space for a three create an imaginary 750*750 grid with the same
hour movie requires 92000 Giga bits. pixel spacing as the original, and then shrink it so
Processing and transmission of huge image that if fits exactly over the original image.
data is time consuming and very cumbersome. Obviously, the pixel spacing in the shrunken
Hence the project has a major application in all 750*750 grid will be less than the pixel spacing in
areas of image processing. Fig1 shows original and the original image [2]. To perform intensity-level
spitted non overlapping parts respectively. assignment for any point in the overlay, we look for
Streaming refers to transferring video data such that its closest pixel in the original image and assign the
1244 | P a g e
2. Swamy.TN, Rashmi. KM, Dr.P.Cyril Prasanna Raj, Dr.S.L.Pinjare / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.1244-1247
intensity of that pixel to the new pixel in the
750*750 grid. When we are finished assigning
intensities to all the points in the overlay grid, we
expand it to the original size to obtain the zoomed
image. This method is called nearest neighbor
interpolation because it assigns to each new location
the intensity of its nearest neighbor. The basic
criteria for a good interpolation method are
geometric invariance, contrast invariance, noise,
edge preservation, aliasing, texture preservation,
over smoothing, application awareness, and
sensitivity to parameters [3].
Fig3. Image matrix to serial format
II. DESIGN
The block diagram of the design is shown The conversion of serial data into matrix
in Fig2. Video from a web camera at 30 frames per format is shown in Fig4. The hardware design using
second is applied to the video input block. Resize the system generator is shown in Fig5.
block enlarge or shrinks image size. Captured video
will be in RGB format. Input video is converted into
croma and luma components.
Luma represents the brightness in an image
and it represents the achromatic image without any
color while the croma component represents the
color information. Image split block splits the image
into number of blocks. Each spitted block is resized
using bicubic interpolation technique. The split
image is displayed using the video display output
block.
Fig4. Image serial to parallel conversion
Video Resize RGB to
input 256*256 YCrCb
Splitting
Video Resize YCbCr to
output 256*256 RGB
Fig5. System generator model
Fig2. Block diagram of image splitting
III. PARAMETERS
The design is implemented using simulink and 3.1 Video input block
system generator [3][4] environment. 3.1.1 Device
Image will be in matrix format. It has to be Device describes the image acquisition
converted into serial data before applying into the device to which we want to connect. The items in
system generator block. The design for converting the drop down list of device vary depending on
matrix to serial format is as shown in Fig3. which devices we have connected to the system. All
Transpose block is used to convert M*N video capture devices supported by image
matrix into N*M matrix. The block named convert acquisition toolbox are supported by the block.
2D to 1D block reshapes an M*N matrix into a 1D
vector with length M*N. Frame conversion block 3.1.2 Video format.
specifies the frame status of the output signal. The Video format shows the video formats
unbuffer block unbuffers frame based input into supported by the selected device. The drop down list
sample based output. of video format varies with each device. If the
device supports the use of camera files, from camera
file will be one of the choices in the list.
1245 | P a g e
3. Swamy.TN, Rashmi. KM, Dr.P.Cyril Prasanna Raj, Dr.S.L.Pinjare / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.1244-1247
The input image/video is splitted into four blocks of
3.1.3 Block sample time. dimension 128*128 each as shown in Fig7.
It specify the sample time of the block
during the simulation. This is the rate at which the
block is executed during simulation. The default is
1/30.
3.1.4 Ports model.
It is used to specify either a single output
port for all color spaces, or one part for each band
(for example R, G, B). When you select one
multidimensional signal, the output signal will be
combined into one line consisting of signal
information for all color signals. Select separated
color signals if you want to use three ports Fig7. Splitted image(128*128*3)
corresponding to the uncompressed red, green, and
blue color bands. These splitted images are interpolated to the original
dimension of the input, i.e. 256*256. Bicubic
3.1.5 Data type interpolation is used to resize the splitted image into
Image data type when the block outputs the original dimension. The resized image is of good
frames. This data type indicated how image frames quality because it resembles almost the resolution of
are output from the block to simulink. It supports all the original image. The interpolated images are
Matlab data types and single is the default. shown in Fig8.
3.2 Color space conversion
The color space conversion block converts
color information between color spaces. Conversion
parameter is used to specify the color spaces we are
converting. Conversion between RGB and YCbCr
and vice-versa are defined by the following
Equation (1).
(1)
Fig8. Interpolated image(256*256*3)
IV. RESULTS
4.1 Simulink output 4.2 Hardware output
The input image is in RGB format and of size The RGB image of dimension 128*128*3
256*256*3 shown in Fig6. is considered as input image as shown in Fig9.
Fig9. Input image for hardware(128*128*3)
Fig6. Original image 256*256*3 The image is resized to 128*128 and converted into
gray image as shown in Fig10.
1246 | P a g e
4. Swamy.TN, Rashmi. KM, Dr.P.Cyril Prasanna Raj, Dr.S.L.Pinjare / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 2, Issue 5, September- October 2012, pp.1244-1247
DSP with xilinx system generator for
Matlab, processdings of 35th south eastern
symposium, Vol 15, page 2226-2238, 2006
[1] [5]Akhtar. P and Azhar. F, A single image
interpolation scheme for enchanced super
resolution in Bio-Medical Imaging, 4th
International Conference on Bio-
informatics and Bio medical Engineering,
pages 1-5, June 2010.
Fig10. Gray image(128*128) [6] Fatma T. Arslan and Artyom M.
Grigoryan, Method of image enhancement
The output on the FPGA hardware is as shown in by splitting signal, IEEE international
Fig11. Conference on Acoustics, speech and
signal processing, vol 4, page iv/177 -
iv/180, March 2005
[7] Rafael C. Gonzalez and Richard E. Woods,
Digital Image Processing, Pearson Prentice
Hall, 3 Edition, 2008.
[8] Samir Palnitkar, Verilog HDL a Guide to
Digital Design and Synthesis, Pearson
Education, 2 Edition, 2009.
Fig11. Hardware output image(128*128)
V. CONCLUSION
This paper is very useful in displaying
wider images for commercial purposes in
Aerodromes and railway stations. And can be
widely used in medical fields. In medical field
doctor can easily indentify the affected area by
zooming that part without zooming entire image.
REFERENCES
[1] Ian kuon and Jonathan Rose, Measuring the
gap between FPGAs and ASICS, IEEE
transcation on Computer-Aided of
Integrated Circuits and systems, 26(2):
203-215,2007.
[2] Marco Aurelio,Nunu maganda, Real time
FPGA based architecture for bicubic
interpolation: an application for digital
image scaling. Proc of the International
conference on reconfigurable computing
and FPGAs, 2005
[3] T.Saidani, D. Dia, W. Elhamzi, M. Atri,
and R. Tourki, Hardware Cosimulation for
Video Processing using Xilinx System
Generator, Proc of the World Congress on
Engineering, Vol 1, page 1-3, 2009
[4] Matthew Own by, Dr Wagdy.H. mhmoud,
A design methodology for implementing
1247 | P a g e