SlideShare a Scribd company logo
1 of 32
Download to read offline
SOC: Application Studies
Mr. A. B. Shinde
Assistant Professor,
Electronics Engineering,
PVPIT, Budhgaon, Sangli
shindesir.pvp@gmail.com
Contents…
• Introduction,
• SOC Design Approach,
• Application Study AES:
• AES Algorithm and Requirements,
• AES: Design and Evaluation,
• Application Study Image Compression:
• JPEG Compression,
• Example JPEG System for Digital Still
Camera
2
SOC Design Approach
3
• An initial design can be developed
by considering the basic
specifications & requirements.
• This initial design can then be
systematically optimized by
addressing issues related to
memory, interconnect, processor
and cache and customization and
configurability.
• This process is repeated until
reaching a design that meets the
specification and run - time
requirements.
System Design Process
• System design is often more
challenging than component or
processor design.
• It often takes many iterations through
the design to ensure that:
(1) The design requirements are
satisfied and
(2) The design is close to optimal
(overall cost, manufacturing, and
other costs) and performance.
4
System Design Process
• The starting point for a design is an initial project plan. This includes
a budget allocation for product development, a schedule, a market
estimate
• The next step is to create an initial product design.
• Further analysis may prove that it may or may not satisfy the
requirements (understanding of the performance and functional
requirements and their inter – relationship).
• The various pieces of the application are specified and simulation
models are developed.
• These models should provide an idea of the performance –
functionality trade - off for the application and the implementation
technology, which would be important in meeting run - time
requirements.
5
System Design: Initial Design
6
An initial design, with three processors
System Design: Initial Design
• The development of the initial design proceeds as follows:
1. Selection and allocation of memory.
2. Once the memory has been allocated, the processor(s) are selected.
Usually a simple base processor is selected to run the operating
system and manage the application control functions.
Time critical processes can be assigned to special processors
(VLIW and SIMD processors) depending on the nature of the critical
computation.
3. The layout of the memory and the processors generally defines the
interconnect architecture.
Now the bandwidth requirements must be determined.
Cache memory can act as an important buffer element in meeting
specifications.
Usually the initial design assumes that the interconnect bandwidth is
sufficient to match the bandwidth of memory.
7
System Design: Initial Design
• The development of the initial design proceeds as follows:
4. The memory elements are analyzed to assess their effects on latency
and bandwidth.
The caches or data buffers are sized to meet the memory and
interconnect bandwidth requirements.
5. Some applications require peripheral selection and design, which
must also meet bandwidth requirements.
6. Rough estimates of overall cost and performance are determined.
8
Application Study: AES
9
AES: Algorithm and Requirements
• AES: Advanced Encryption Standard
• The AES cipher standard has three block sizes: 128 (AES - 128),
192 (AES - 192), and 256 (AES - 256) bits.
• The whole process from original data to encrypted data involves
one initial round, r − 1 standard rounds, and one final round.
10
AES: Algorithm and Requirements
Fully pipelined AES architecture
11
AES: Algorithm and Requirements
• The major transformations involve the following steps:
• SubBytes: An input block is transformed byte by byte by using a
special design substitution box (S - Box).
• ShiftRows: The bytes of the input are arranged into four rows.
Each row is then rotated with a predefined step according to its row
value.
• MixColumns: The arranged four - row structure is then transformed
by using polynomial multiplication over GF (28 ) per column basis.
• AddRoundKey: The input block is XOR - ed with the key in that
round.
12
AES: Algorithm and Requirements
• There is one round AddRoundKey operation in the initial round.
• The standard round consists of all four operations; and the
MixColumns operation is removed in the final round operation,
while the other three operations remains as it is.
• On the other hand, the inverse transformations are applied for
decryption. The round transformation can be parallelized for fast
implementation.
• Besides the above four main steps, the AES standard includes three
block sizes: 128 (AES - 128), 192 (AES - 192), and 256 (AES - 256)
bits.
• The whole block encryption is divided into different rounds.
The design supporting AES – 128 standard consists of 10 rounds.
13
AES : Design and Evaluation
14
AES : Design and Evaluation
• Normally, initial design starts with a die size, design specification,
and run – time requirement.
• We assume that the requirements specify the use of a PLCC68
(Plastic Leaded Chip carrier) package, with a die size of 24.2 × 24.2
mm2 .
15
AES : Design and Evaluation
• Our task is to select a processor that meets the area constraint &
capable of performing a required function.
• Let us consider ARM7TDMI, a 32 – bit RISC processor. Its die size is
0.59 mm2 for a 180 nm process, and 0.18 mm2 for a 90 nm process.
• Both processors can fit into the initial area requirement for the
PLCC68 package.
• The cycle count for executing AES from the SimpleScalar tool set is
16,511, so the throughput, given an 115 - MHz clock with the 180 -
nm device, is (115 × 32)/16,511 = 222.9 Kbps;
For a 236 - MHz clock with the 90 - nm device, the throughput is
457.4 Kbps.
Hence the 180 - nm ARM7 device is likely to be capable of
performing VoIP, while the 90 nm ARM7 device should be able to
support PAN 802.15 TG4 as well.
16
AES : Design and Evaluation
• Using SimpleScalar with an AES software model, the effects of
mapping instruction cache from 32 bytes to 64 bytes; the AES cycle
count reduces from 16,511 to 16,094, or 2.6%.
• Assume that the initial area of the processor with the basic
configuration without cache is 60K rbe, and the L1 instruction cache
has 8K rbe.
• If we double the size of the cache, we get a total of 76K rbe instead
of 68K. The total area increase is over 11%, instead of 2.6% speed
improvement.
17
AES : Design and Evaluation
• The ARM7 is already a pipelined instruction processor.
• Other architectural styles, such as parallel pipelined datapaths, have
much potential; at the expense of larger area and power consumption
than ASICs.
• Another alternative, is to extend the instruction set of a processor by
custom instructions; in this case they would be specific to AES.
18
Application Study:
Image Compression
19
Application Study: Image Compression
• A number of intraframe operations are common to both still image
compression methods (JPEG), and video compression methods
(MPEG and H.264).
• Video compression methods usually also include interframe
operations, such as motion compensation (MC), to take advantage of
the fact that successive video frames are often similar.
20
JPEG Compression
• The JPEG compression method involves 24 bits per pixel (eight
each of RGB (red, green, and blue).
• It can deal with both lossy and lossless compression.
• There are three main steps:
– Color space transformation
– Discrete cosine transform
– EC (Entropy Coding: Lossless Coding Technique)
21
JPEG Compression
Block diagram for JPEG compression
22
JPEG Compression
• There are three main steps:
• First: Color space transformation:
• The image is converted from RGB into a different color space such as
YCbCr.
• The Y component represents the brightness of a pixel, while the Cb
and Cr components together represent the chrominance or color.
• Human can see more detail in the Y component than in Cb and Cr,
so the latter two are reduced by downsampling.
23
JPEG Compression
• There are three main steps:
• First: Color space transformation:
• The ratios at which the downsampling can be done on JPEG are
– 4:4:4 (no downsampling),
– 4:2:2 (reduce by factor of 2 in horizontal direction), and
– 4:2:0 (reduce by factor of 2 in horizontal and vertical directions).
• For the rest of the compression process, Y, Cb, and Cr are processed
separately in a similar manner.
24
JPEG Compression
• There are three main steps:
• Second: discrete cosine transform:
• Each component (Y, Cb, Cr) of the image is arranged into tiles of 8 ×
8 pixels,
Each tile is converted to frequency space using a two - dimensional
forward DCT (DCT, type II) by multiplication with an 8 × 8 matrix.
• Since much information is covered by the low - frequency pixels,
one could apply quantization (another matrix operation) to reduce the
high - frequency components.
25
JPEG Compression
• There are three main steps:
• Third: EC (Entropy Coding):
• EC is a special form of lossless data compression.
• It arranges the image components in a “ zigzag ” order accessing
low – frequency components first,
• Then Run - Length Coding (RLC) algorithm to group of similar
frequencies is applied on the AC component and differential pulse
code modulation (DPCM) on the DC component, and
• Finally, Huffman coding or arithmetic coding is applied on what is
left.
26
Example JPEG System for Digital Still Camera
27
Block diagram for a still image camera
A/D: analog to digital conversion;
CFA: color filter array.
Example JPEG System for Digital Still Camera
• Typical imaging pipeline for a still image camera is shown in figure.
• The TMS320C549 processor, receiving 16 × 16 blocks of pixels from
SDRAM, implements this imaging pipeline.
• The TMS320C549 has 32K of 16 - bit RAM and 16K of 16 - bit ROM,
all imaging pipeline operations can be executed on chip since only a
small 16 × 16 block of the image is used.
• The processing time is kept short, because there is no need for
slow external memory.
28
Example JPEG System for Digital Still Camera
• This device offers performance up to 100 MIPS, with low power
consumption in the region of 0.45 mA/MIPS.
• The entire imaging pipeline, including JPEG, takes about 150
cycles/pixel, or about 150 instructions/ pixel given a device of 100
MIPS at 100 MHz.
• A TMS320C54x processor at 100 MHz can process 1 megapixel
CCD (charge coupled devices) image in 1.5 second.
• This processor supports a 2 second shot - to - shot delay, including
data movement from external memory to on - chip memory.
• Digital cameras should also allow users to display the captured
images on an external TV monitor.
• Since the captured images are stored on a flash memory card,
playback - mode software is also needed on this SOC.
29
Example JPEG System for Digital Still Camera
• If the images are stored as JPEG bitstreams, the playback - mode
software decodes them, scale the decoded images to appropriate
spatial resolutions, and display them on the LCD screen and/or the
external TV monitor.
• The TMS320C54x playback - mode software can execute 100
cycles/pixel to support a 1 second playback of a megapixel image.
• This processor requires 1.7 KB for program memory and 4.6 KB for
data memory to support the imaging pipeline and compress the image
according to the JPEG standard.
• The complete imaging pipeline software is stored on - chip, which
reduces external memory accesses.
• This organization not just improves performance, but it also lowers
the system cost and enhances power efficiency.
30
Example JPEG System for Digital Still Camera
• More recent chips
for use in digital
cameras would
need to support, in
addition to image
compression, also
video compression,
audio processing,
and wireless
communication.
• Figure shows some
of the key elements
in such a chip.
31
Thank you…
32
This presentation is published only for Educational Purpose

More Related Content

What's hot

Introduction to embedded system design
Introduction to embedded system designIntroduction to embedded system design
Introduction to embedded system designMukesh Bansal
 
Design challenges in embedded systems
Design challenges in embedded systemsDesign challenges in embedded systems
Design challenges in embedded systemsmahalakshmimalini
 
VLSI-Physical Design- Tool Terminalogy
VLSI-Physical Design- Tool TerminalogyVLSI-Physical Design- Tool Terminalogy
VLSI-Physical Design- Tool TerminalogyMurali Rai
 
UNIT-II CPLD & FPGA Architectures and Applications
UNIT-II CPLD & FPGA  Architectures   and ApplicationsUNIT-II CPLD & FPGA  Architectures   and Applications
UNIT-II CPLD & FPGA Architectures and ApplicationsDr.YNM
 
System on chip buses
System on chip busesSystem on chip buses
System on chip busesA B Shinde
 
System On Chip
System On ChipSystem On Chip
System On Chipanishgoel
 
18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptx18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptxSudeep35
 
Vlsi physical design-notes
Vlsi physical design-notesVlsi physical design-notes
Vlsi physical design-notesDr.YNM
 
VHDL-PRESENTATION.ppt
VHDL-PRESENTATION.pptVHDL-PRESENTATION.ppt
VHDL-PRESENTATION.pptDr.YNM
 
RISC (reduced instruction set computer)
RISC (reduced instruction set computer)RISC (reduced instruction set computer)
RISC (reduced instruction set computer)LokmanArman
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded SystemZakaria Gomaa
 

What's hot (20)

SOC design
SOC design SOC design
SOC design
 
Introduction to embedded system design
Introduction to embedded system designIntroduction to embedded system design
Introduction to embedded system design
 
Speech encoding techniques
Speech encoding techniquesSpeech encoding techniques
Speech encoding techniques
 
Design challenges in embedded systems
Design challenges in embedded systemsDesign challenges in embedded systems
Design challenges in embedded systems
 
VLSI-Physical Design- Tool Terminalogy
VLSI-Physical Design- Tool TerminalogyVLSI-Physical Design- Tool Terminalogy
VLSI-Physical Design- Tool Terminalogy
 
UNIT-II CPLD & FPGA Architectures and Applications
UNIT-II CPLD & FPGA  Architectures   and ApplicationsUNIT-II CPLD & FPGA  Architectures   and Applications
UNIT-II CPLD & FPGA Architectures and Applications
 
System on chip buses
System on chip busesSystem on chip buses
System on chip buses
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
 
System On Chip
System On ChipSystem On Chip
System On Chip
 
SoC: System On Chip
SoC: System On ChipSoC: System On Chip
SoC: System On Chip
 
18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptx18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptx
 
FPGA
FPGAFPGA
FPGA
 
Dual port ram
Dual port ramDual port ram
Dual port ram
 
Vlsi physical design-notes
Vlsi physical design-notesVlsi physical design-notes
Vlsi physical design-notes
 
VHDL-PRESENTATION.ppt
VHDL-PRESENTATION.pptVHDL-PRESENTATION.ppt
VHDL-PRESENTATION.ppt
 
RISC (reduced instruction set computer)
RISC (reduced instruction set computer)RISC (reduced instruction set computer)
RISC (reduced instruction set computer)
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
System on Chip (SoC)
System on Chip (SoC)System on Chip (SoC)
System on Chip (SoC)
 
Zynq architecture
Zynq architectureZynq architecture
Zynq architecture
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded System
 

Viewers also liked

Digital Image Processing_ ch1 introduction-2003
Digital Image Processing_ ch1 introduction-2003Digital Image Processing_ ch1 introduction-2003
Digital Image Processing_ ch1 introduction-2003Malik obeisat
 
Spartan-II FPGA (xc2s30)
Spartan-II FPGA (xc2s30)Spartan-II FPGA (xc2s30)
Spartan-II FPGA (xc2s30)A B Shinde
 
How to Make Effective Presentation
How to Make Effective PresentationHow to Make Effective Presentation
How to Make Effective PresentationA B Shinde
 
Processors used in System on chip
Processors used in System on chip Processors used in System on chip
Processors used in System on chip A B Shinde
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentalsA B Shinde
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image ProcessingSahil Biswas
 
Design of open core protocl ocp abstract
Design of open core protocl ocp abstractDesign of open core protocl ocp abstract
Design of open core protocl ocp abstractZubed Uddin
 
Design of open core protocol ocp
Design of open core protocol ocpDesign of open core protocol ocp
Design of open core protocol ocpZubed Uddin
 
Hick-Hyman & Fitts Law _Jing
Hick-Hyman & Fitts Law _JingHick-Hyman & Fitts Law _Jing
Hick-Hyman & Fitts Law _JingJing Chen
 
Fitts List Presentation
Fitts List PresentationFitts List Presentation
Fitts List PresentationAndrew Tong
 
B Eng Final Year Project Presentation
B Eng Final Year Project PresentationB Eng Final Year Project Presentation
B Eng Final Year Project Presentationjesujoseph
 
Digital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionDigital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionSeda Yalçın
 
Semiconductor Hubs for Research & Innovation
Semiconductor Hubs for Research & InnovationSemiconductor Hubs for Research & Innovation
Semiconductor Hubs for Research & InnovationZinnov
 
Project presentation image compression by manish myst, ssgbcoet
Project presentation image compression by manish myst, ssgbcoetProject presentation image compression by manish myst, ssgbcoet
Project presentation image compression by manish myst, ssgbcoetManish Myst
 
Soc architecture and design
Soc architecture and designSoc architecture and design
Soc architecture and designSatya Harish
 
xilinx fpga problems
xilinx fpga problemsxilinx fpga problems
xilinx fpga problemsAnish Gupta
 

Viewers also liked (20)

Digital Image Processing_ ch1 introduction-2003
Digital Image Processing_ ch1 introduction-2003Digital Image Processing_ ch1 introduction-2003
Digital Image Processing_ ch1 introduction-2003
 
Spartan-II FPGA (xc2s30)
Spartan-II FPGA (xc2s30)Spartan-II FPGA (xc2s30)
Spartan-II FPGA (xc2s30)
 
How to Make Effective Presentation
How to Make Effective PresentationHow to Make Effective Presentation
How to Make Effective Presentation
 
Processors used in System on chip
Processors used in System on chip Processors used in System on chip
Processors used in System on chip
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentals
 
image compression ppt
image compression pptimage compression ppt
image compression ppt
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Design of open core protocl ocp abstract
Design of open core protocl ocp abstractDesign of open core protocl ocp abstract
Design of open core protocl ocp abstract
 
Design of open core protocol ocp
Design of open core protocol ocpDesign of open core protocol ocp
Design of open core protocol ocp
 
Hick-Hyman & Fitts Law _Jing
Hick-Hyman & Fitts Law _JingHick-Hyman & Fitts Law _Jing
Hick-Hyman & Fitts Law _Jing
 
Fitts law
Fitts lawFitts law
Fitts law
 
Fitts List Presentation
Fitts List PresentationFitts List Presentation
Fitts List Presentation
 
B Eng Final Year Project Presentation
B Eng Final Year Project PresentationB Eng Final Year Project Presentation
B Eng Final Year Project Presentation
 
Fitts' Law
Fitts' LawFitts' Law
Fitts' Law
 
Digital Image Processing and Edge Detection
Digital Image Processing and Edge DetectionDigital Image Processing and Edge Detection
Digital Image Processing and Edge Detection
 
Semiconductor Hubs for Research & Innovation
Semiconductor Hubs for Research & InnovationSemiconductor Hubs for Research & Innovation
Semiconductor Hubs for Research & Innovation
 
Power
PowerPower
Power
 
Project presentation image compression by manish myst, ssgbcoet
Project presentation image compression by manish myst, ssgbcoetProject presentation image compression by manish myst, ssgbcoet
Project presentation image compression by manish myst, ssgbcoet
 
Soc architecture and design
Soc architecture and designSoc architecture and design
Soc architecture and design
 
xilinx fpga problems
xilinx fpga problemsxilinx fpga problems
xilinx fpga problems
 

Similar to SOC Application Studies: Image Compression

4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdfarpowersarps
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)danishrafiq
 
Computer organization & ARM microcontrollers module 3 PPT
Computer organization & ARM microcontrollers module 3 PPTComputer organization & ARM microcontrollers module 3 PPT
Computer organization & ARM microcontrollers module 3 PPTChetanNaikJECE
 
Gpu with cuda architecture
Gpu with cuda architectureGpu with cuda architecture
Gpu with cuda architectureDhaval Kaneria
 
Short.course.introduction.to.vhdl for beginners
Short.course.introduction.to.vhdl for beginners Short.course.introduction.to.vhdl for beginners
Short.course.introduction.to.vhdl for beginners Ravi Sony
 
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...Shashidhar Reddy
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpegDr. Kapil Gupta
 
24-02-18 Rejender pratap.pdf
24-02-18 Rejender pratap.pdf24-02-18 Rejender pratap.pdf
24-02-18 Rejender pratap.pdfFrangoCamila
 
FPGA based JPEG Encoder
FPGA based JPEG EncoderFPGA based JPEG Encoder
FPGA based JPEG EncoderIJERA Editor
 
Project Slides for Website 2020-22.pptx
Project Slides for Website 2020-22.pptxProject Slides for Website 2020-22.pptx
Project Slides for Website 2020-22.pptxAkshitAgiwal1
 
5035-Pipeline-Optimization-Techniques.pdf
5035-Pipeline-Optimization-Techniques.pdf5035-Pipeline-Optimization-Techniques.pdf
5035-Pipeline-Optimization-Techniques.pdfssmukherjee2013
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)danishrafiq
 

Similar to SOC Application Studies: Image Compression (20)

5-3.pptx
5-3.pptx5-3.pptx
5-3.pptx
 
module01.ppt
module01.pptmodule01.ppt
module01.ppt
 
4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf
 
Processors selection
Processors selectionProcessors selection
Processors selection
 
Compression: Images (JPEG)
Compression: Images (JPEG)Compression: Images (JPEG)
Compression: Images (JPEG)
 
Computer organization & ARM microcontrollers module 3 PPT
Computer organization & ARM microcontrollers module 3 PPTComputer organization & ARM microcontrollers module 3 PPT
Computer organization & ARM microcontrollers module 3 PPT
 
Gpu with cuda architecture
Gpu with cuda architectureGpu with cuda architecture
Gpu with cuda architecture
 
Parallel Algorithms
Parallel AlgorithmsParallel Algorithms
Parallel Algorithms
 
Short.course.introduction.to.vhdl for beginners
Short.course.introduction.to.vhdl for beginners Short.course.introduction.to.vhdl for beginners
Short.course.introduction.to.vhdl for beginners
 
Data compression
Data compressionData compression
Data compression
 
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
Built In Self Testing(BIST) Architecture for Motin Estimation and Computing A...
 
Multimedia communication jpeg
Multimedia communication jpegMultimedia communication jpeg
Multimedia communication jpeg
 
00364438
0036443800364438
00364438
 
24-02-18 Rejender pratap.pdf
24-02-18 Rejender pratap.pdf24-02-18 Rejender pratap.pdf
24-02-18 Rejender pratap.pdf
 
FPGA based JPEG Encoder
FPGA based JPEG EncoderFPGA based JPEG Encoder
FPGA based JPEG Encoder
 
Deblocking_Filter_v2
Deblocking_Filter_v2Deblocking_Filter_v2
Deblocking_Filter_v2
 
Project Slides for Website 2020-22.pptx
Project Slides for Website 2020-22.pptxProject Slides for Website 2020-22.pptx
Project Slides for Website 2020-22.pptx
 
5035-Pipeline-Optimization-Techniques.pdf
5035-Pipeline-Optimization-Techniques.pdf5035-Pipeline-Optimization-Techniques.pdf
5035-Pipeline-Optimization-Techniques.pdf
 
Aa sort-v4
Aa sort-v4Aa sort-v4
Aa sort-v4
 
Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)Compression: Video Compression (MPEG and others)
Compression: Video Compression (MPEG and others)
 

More from A B Shinde

Communication System Basics
Communication System BasicsCommunication System Basics
Communication System BasicsA B Shinde
 
MOSFETs: Single Stage IC Amplifier
MOSFETs: Single Stage IC AmplifierMOSFETs: Single Stage IC Amplifier
MOSFETs: Single Stage IC AmplifierA B Shinde
 
Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: BasicsA B Shinde
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and SegmentationA B Shinde
 
Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filtersA B Shinde
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial DomainA B Shinde
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image FundamentalsA B Shinde
 
Resume Writing
Resume WritingResume Writing
Resume WritingA B Shinde
 
Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing BasicsA B Shinde
 
Blooms Taxonomy in Engineering Education
Blooms Taxonomy in Engineering EducationBlooms Taxonomy in Engineering Education
Blooms Taxonomy in Engineering EducationA B Shinde
 
ISE 7.1i Software
ISE 7.1i SoftwareISE 7.1i Software
ISE 7.1i SoftwareA B Shinde
 
VHDL Coding Syntax
VHDL Coding SyntaxVHDL Coding Syntax
VHDL Coding SyntaxA B Shinde
 
VLSI Testing Techniques
VLSI Testing TechniquesVLSI Testing Techniques
VLSI Testing TechniquesA B Shinde
 
Selecting Engineering Project
Selecting Engineering ProjectSelecting Engineering Project
Selecting Engineering ProjectA B Shinde
 
Interview Techniques
Interview TechniquesInterview Techniques
Interview TechniquesA B Shinde
 
Semiconductors
SemiconductorsSemiconductors
SemiconductorsA B Shinde
 
Diode Applications & Transistor Basics
Diode Applications & Transistor BasicsDiode Applications & Transistor Basics
Diode Applications & Transistor BasicsA B Shinde
 

More from A B Shinde (20)

Communication System Basics
Communication System BasicsCommunication System Basics
Communication System Basics
 
MOSFETs: Single Stage IC Amplifier
MOSFETs: Single Stage IC AmplifierMOSFETs: Single Stage IC Amplifier
MOSFETs: Single Stage IC Amplifier
 
MOSFETs
MOSFETsMOSFETs
MOSFETs
 
Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: Basics
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filters
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
Resume Format
Resume FormatResume Format
Resume Format
 
Digital Image Fundamentals
Digital Image FundamentalsDigital Image Fundamentals
Digital Image Fundamentals
 
Resume Writing
Resume WritingResume Writing
Resume Writing
 
Image Processing Basics
Image Processing BasicsImage Processing Basics
Image Processing Basics
 
Blooms Taxonomy in Engineering Education
Blooms Taxonomy in Engineering EducationBlooms Taxonomy in Engineering Education
Blooms Taxonomy in Engineering Education
 
ISE 7.1i Software
ISE 7.1i SoftwareISE 7.1i Software
ISE 7.1i Software
 
VHDL Coding Syntax
VHDL Coding SyntaxVHDL Coding Syntax
VHDL Coding Syntax
 
VHDL Programs
VHDL ProgramsVHDL Programs
VHDL Programs
 
VLSI Testing Techniques
VLSI Testing TechniquesVLSI Testing Techniques
VLSI Testing Techniques
 
Selecting Engineering Project
Selecting Engineering ProjectSelecting Engineering Project
Selecting Engineering Project
 
Interview Techniques
Interview TechniquesInterview Techniques
Interview Techniques
 
Semiconductors
SemiconductorsSemiconductors
Semiconductors
 
Diode Applications & Transistor Basics
Diode Applications & Transistor BasicsDiode Applications & Transistor Basics
Diode Applications & Transistor Basics
 

Recently uploaded

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

SOC Application Studies: Image Compression

  • 1. SOC: Application Studies Mr. A. B. Shinde Assistant Professor, Electronics Engineering, PVPIT, Budhgaon, Sangli shindesir.pvp@gmail.com
  • 2. Contents… • Introduction, • SOC Design Approach, • Application Study AES: • AES Algorithm and Requirements, • AES: Design and Evaluation, • Application Study Image Compression: • JPEG Compression, • Example JPEG System for Digital Still Camera 2
  • 3. SOC Design Approach 3 • An initial design can be developed by considering the basic specifications & requirements. • This initial design can then be systematically optimized by addressing issues related to memory, interconnect, processor and cache and customization and configurability. • This process is repeated until reaching a design that meets the specification and run - time requirements.
  • 4. System Design Process • System design is often more challenging than component or processor design. • It often takes many iterations through the design to ensure that: (1) The design requirements are satisfied and (2) The design is close to optimal (overall cost, manufacturing, and other costs) and performance. 4
  • 5. System Design Process • The starting point for a design is an initial project plan. This includes a budget allocation for product development, a schedule, a market estimate • The next step is to create an initial product design. • Further analysis may prove that it may or may not satisfy the requirements (understanding of the performance and functional requirements and their inter – relationship). • The various pieces of the application are specified and simulation models are developed. • These models should provide an idea of the performance – functionality trade - off for the application and the implementation technology, which would be important in meeting run - time requirements. 5
  • 6. System Design: Initial Design 6 An initial design, with three processors
  • 7. System Design: Initial Design • The development of the initial design proceeds as follows: 1. Selection and allocation of memory. 2. Once the memory has been allocated, the processor(s) are selected. Usually a simple base processor is selected to run the operating system and manage the application control functions. Time critical processes can be assigned to special processors (VLIW and SIMD processors) depending on the nature of the critical computation. 3. The layout of the memory and the processors generally defines the interconnect architecture. Now the bandwidth requirements must be determined. Cache memory can act as an important buffer element in meeting specifications. Usually the initial design assumes that the interconnect bandwidth is sufficient to match the bandwidth of memory. 7
  • 8. System Design: Initial Design • The development of the initial design proceeds as follows: 4. The memory elements are analyzed to assess their effects on latency and bandwidth. The caches or data buffers are sized to meet the memory and interconnect bandwidth requirements. 5. Some applications require peripheral selection and design, which must also meet bandwidth requirements. 6. Rough estimates of overall cost and performance are determined. 8
  • 10. AES: Algorithm and Requirements • AES: Advanced Encryption Standard • The AES cipher standard has three block sizes: 128 (AES - 128), 192 (AES - 192), and 256 (AES - 256) bits. • The whole process from original data to encrypted data involves one initial round, r − 1 standard rounds, and one final round. 10
  • 11. AES: Algorithm and Requirements Fully pipelined AES architecture 11
  • 12. AES: Algorithm and Requirements • The major transformations involve the following steps: • SubBytes: An input block is transformed byte by byte by using a special design substitution box (S - Box). • ShiftRows: The bytes of the input are arranged into four rows. Each row is then rotated with a predefined step according to its row value. • MixColumns: The arranged four - row structure is then transformed by using polynomial multiplication over GF (28 ) per column basis. • AddRoundKey: The input block is XOR - ed with the key in that round. 12
  • 13. AES: Algorithm and Requirements • There is one round AddRoundKey operation in the initial round. • The standard round consists of all four operations; and the MixColumns operation is removed in the final round operation, while the other three operations remains as it is. • On the other hand, the inverse transformations are applied for decryption. The round transformation can be parallelized for fast implementation. • Besides the above four main steps, the AES standard includes three block sizes: 128 (AES - 128), 192 (AES - 192), and 256 (AES - 256) bits. • The whole block encryption is divided into different rounds. The design supporting AES – 128 standard consists of 10 rounds. 13
  • 14. AES : Design and Evaluation 14
  • 15. AES : Design and Evaluation • Normally, initial design starts with a die size, design specification, and run – time requirement. • We assume that the requirements specify the use of a PLCC68 (Plastic Leaded Chip carrier) package, with a die size of 24.2 × 24.2 mm2 . 15
  • 16. AES : Design and Evaluation • Our task is to select a processor that meets the area constraint & capable of performing a required function. • Let us consider ARM7TDMI, a 32 – bit RISC processor. Its die size is 0.59 mm2 for a 180 nm process, and 0.18 mm2 for a 90 nm process. • Both processors can fit into the initial area requirement for the PLCC68 package. • The cycle count for executing AES from the SimpleScalar tool set is 16,511, so the throughput, given an 115 - MHz clock with the 180 - nm device, is (115 × 32)/16,511 = 222.9 Kbps; For a 236 - MHz clock with the 90 - nm device, the throughput is 457.4 Kbps. Hence the 180 - nm ARM7 device is likely to be capable of performing VoIP, while the 90 nm ARM7 device should be able to support PAN 802.15 TG4 as well. 16
  • 17. AES : Design and Evaluation • Using SimpleScalar with an AES software model, the effects of mapping instruction cache from 32 bytes to 64 bytes; the AES cycle count reduces from 16,511 to 16,094, or 2.6%. • Assume that the initial area of the processor with the basic configuration without cache is 60K rbe, and the L1 instruction cache has 8K rbe. • If we double the size of the cache, we get a total of 76K rbe instead of 68K. The total area increase is over 11%, instead of 2.6% speed improvement. 17
  • 18. AES : Design and Evaluation • The ARM7 is already a pipelined instruction processor. • Other architectural styles, such as parallel pipelined datapaths, have much potential; at the expense of larger area and power consumption than ASICs. • Another alternative, is to extend the instruction set of a processor by custom instructions; in this case they would be specific to AES. 18
  • 20. Application Study: Image Compression • A number of intraframe operations are common to both still image compression methods (JPEG), and video compression methods (MPEG and H.264). • Video compression methods usually also include interframe operations, such as motion compensation (MC), to take advantage of the fact that successive video frames are often similar. 20
  • 21. JPEG Compression • The JPEG compression method involves 24 bits per pixel (eight each of RGB (red, green, and blue). • It can deal with both lossy and lossless compression. • There are three main steps: – Color space transformation – Discrete cosine transform – EC (Entropy Coding: Lossless Coding Technique) 21
  • 22. JPEG Compression Block diagram for JPEG compression 22
  • 23. JPEG Compression • There are three main steps: • First: Color space transformation: • The image is converted from RGB into a different color space such as YCbCr. • The Y component represents the brightness of a pixel, while the Cb and Cr components together represent the chrominance or color. • Human can see more detail in the Y component than in Cb and Cr, so the latter two are reduced by downsampling. 23
  • 24. JPEG Compression • There are three main steps: • First: Color space transformation: • The ratios at which the downsampling can be done on JPEG are – 4:4:4 (no downsampling), – 4:2:2 (reduce by factor of 2 in horizontal direction), and – 4:2:0 (reduce by factor of 2 in horizontal and vertical directions). • For the rest of the compression process, Y, Cb, and Cr are processed separately in a similar manner. 24
  • 25. JPEG Compression • There are three main steps: • Second: discrete cosine transform: • Each component (Y, Cb, Cr) of the image is arranged into tiles of 8 × 8 pixels, Each tile is converted to frequency space using a two - dimensional forward DCT (DCT, type II) by multiplication with an 8 × 8 matrix. • Since much information is covered by the low - frequency pixels, one could apply quantization (another matrix operation) to reduce the high - frequency components. 25
  • 26. JPEG Compression • There are three main steps: • Third: EC (Entropy Coding): • EC is a special form of lossless data compression. • It arranges the image components in a “ zigzag ” order accessing low – frequency components first, • Then Run - Length Coding (RLC) algorithm to group of similar frequencies is applied on the AC component and differential pulse code modulation (DPCM) on the DC component, and • Finally, Huffman coding or arithmetic coding is applied on what is left. 26
  • 27. Example JPEG System for Digital Still Camera 27 Block diagram for a still image camera A/D: analog to digital conversion; CFA: color filter array.
  • 28. Example JPEG System for Digital Still Camera • Typical imaging pipeline for a still image camera is shown in figure. • The TMS320C549 processor, receiving 16 × 16 blocks of pixels from SDRAM, implements this imaging pipeline. • The TMS320C549 has 32K of 16 - bit RAM and 16K of 16 - bit ROM, all imaging pipeline operations can be executed on chip since only a small 16 × 16 block of the image is used. • The processing time is kept short, because there is no need for slow external memory. 28
  • 29. Example JPEG System for Digital Still Camera • This device offers performance up to 100 MIPS, with low power consumption in the region of 0.45 mA/MIPS. • The entire imaging pipeline, including JPEG, takes about 150 cycles/pixel, or about 150 instructions/ pixel given a device of 100 MIPS at 100 MHz. • A TMS320C54x processor at 100 MHz can process 1 megapixel CCD (charge coupled devices) image in 1.5 second. • This processor supports a 2 second shot - to - shot delay, including data movement from external memory to on - chip memory. • Digital cameras should also allow users to display the captured images on an external TV monitor. • Since the captured images are stored on a flash memory card, playback - mode software is also needed on this SOC. 29
  • 30. Example JPEG System for Digital Still Camera • If the images are stored as JPEG bitstreams, the playback - mode software decodes them, scale the decoded images to appropriate spatial resolutions, and display them on the LCD screen and/or the external TV monitor. • The TMS320C54x playback - mode software can execute 100 cycles/pixel to support a 1 second playback of a megapixel image. • This processor requires 1.7 KB for program memory and 4.6 KB for data memory to support the imaging pipeline and compress the image according to the JPEG standard. • The complete imaging pipeline software is stored on - chip, which reduces external memory accesses. • This organization not just improves performance, but it also lowers the system cost and enhances power efficiency. 30
  • 31. Example JPEG System for Digital Still Camera • More recent chips for use in digital cameras would need to support, in addition to image compression, also video compression, audio processing, and wireless communication. • Figure shows some of the key elements in such a chip. 31
  • 32. Thank you… 32 This presentation is published only for Educational Purpose