To achieve high parallel computation of discrete wavelet transform (DWT) in JPEG2000, a high-throughput two-dimensional (2D) 9/7 DWT very large scale integration (VLSI) design is proposed, in which the row proce...To achieve high parallel computation of discrete wavelet transform (DWT) in JPEG2000, a high-throughput two-dimensional (2D) 9/7 DWT very large scale integration (VLSI) design is proposed, in which the row processor is based on flipping structure. Due to the difference of the input data flow, the column processor is obtained by adding the input selector and data buffer to the row processor. Normalization steps in row and column DWT are combined to reduce the number of multipliers, and the rationality is verified. By rearranging the output of four-line row DWT with a multiplexer (MUX), the amount of data processed by each column processor becomes half, and the four-input/four- output architecture is implemented. For an image with the size of N x N, the computing time of one-level 2D 9/7 DWT is 0.25N2 + 1.5N clock cycles. The critical path delay is one multiplier delay, and only 5N internal memory is required. The results of post-route simulation on FPGA show that clock frequency reaches 136 MHz, and the throughput is 544 Msample/s, which satisfies the requirements of high-speed applications.展开更多
This paper presents discrete wavelet transform (DWT) and its inverse (IDWT) with Haar wavelets as tools to compute the variable size interpolated versions of an image at optimum computational load. As a human obse...This paper presents discrete wavelet transform (DWT) and its inverse (IDWT) with Haar wavelets as tools to compute the variable size interpolated versions of an image at optimum computational load. As a human observer moves closer to or farther from a scene, the retinal image of the scene zooms in or out, respectively. This zooming in or out can be modeled using variable scale interpolation. The paper proposes a novel way of applying DWT and IDWT in a piecewise manner by non-uniform down- or up-sampling of the images to achieve partially sampled versions of the images. The partially sampled versions are then aggregated to achieve the final variable scale interpolated images. The non-uniform down- or up-sampling here is a function of the required scale of interpolation. Appropriate zero padding is used to make the images suitable for the required non-uniform sampling and the subsequent interpolation to the required scale. The concept of zeroeth level DWT is introduced here, which works as the basis for interpolating the images to achieve bigger size than the original one. The main emphasis here is on the computation of variable size images at less computational load, without compromise of quality of images. The interpolated images to different sizes and the reconstructed images are benchmarked using the statistical parameters and visual comparison. It has been found that the proposed approach performs better as compared to bilinear and bicubic interpolation techniques.展开更多
Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image w...Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties.This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform(DWT),Z-transform(ZT)and Bidiagonal Singular Value Decomposition(BSVD).The original image is decomposed into 3-level DWT,and then,ZT is applied on the HH3 and HL3 sub-bands.The watermark image is encrypted using Arnold Cat Map.BSVD for the watermark and transformed original image were computed,and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image.Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks.Experiments indicated that the proposed method is transparent and highly robust.展开更多
The paper describes a texture-based fast text location scheme which operates directly in the Discrete Wavelet Transform (DWT) domain. By the distinguishing texture characteristics encoded in wavelet transform domain, ...The paper describes a texture-based fast text location scheme which operates directly in the Discrete Wavelet Transform (DWT) domain. By the distinguishing texture characteristics encoded in wavelet transform domain, the text is fast detected from complex background images stored in the compressed format such as JPEG2000 without full decompress. Compared with some traditional character location methods, the proposed scheme has the advantages of low computational cost, robust to size and font of characters and high accuracy. Preliminary experimental results show that the proposed scheme is efficient and effective.展开更多
This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized ...This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized by applying block enabling technique, scaling, and rounding of the filter coefficients. The proposed architecture uses biorthogonal (9/7) wavelet filter. The architecture is modeled using Verilog HDL, simulated using ModelSim, synthesized using Xilinx ISE and finally implemented on Virtex-5 FPGA. The proposed 3-DDWT architecture has slice register utilization of 5%, operating frequency of 396 MHz and a power consumption of 0.45 W.展开更多
This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, ...This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, FFT-based algorithm, Short- length based algorithm and Lifting algorithm. The principles, structures and computational complexity of these algorithms are explored in details respectively. The results of the experiments for comparison are consistent to those simulated by MATLAB. It is found that there are limitations in the implementation of DWT. Some algorithms are workable only for special wavelet transform, lacking in generality. Above all, the speed of wavelet transform, as the governing element to the speed of image processing, is in fact the retarding factor for real-time image processing.展开更多
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen...Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.展开更多
It is revealed that the dynamic stability of 2-D recursive continuous-discrete systems with interval parameters involves the problem of robust Hurwitz-Schur stability of bivariate polynomials family. It is proved that...It is revealed that the dynamic stability of 2-D recursive continuous-discrete systems with interval parameters involves the problem of robust Hurwitz-Schur stability of bivariate polynomials family. It is proved that the Hurwitz-Schur stability of the denominator polynomials of the systems is necessary and sufficient for the asymptotic stability of the 2-D hybrid systems. The 2-D hybrid transformation, i. e. 2-D Laplace-Z transformation, has been proposed to solve the stability analysis of the 2-D continuous-discrete systems, to get the 2-D hybrid transfer functions of the systems. The edge test for the Hurwitz-Schur stability of interval bivariate polynomials is introduced. The Hurwitz-Schur stability of the interval family of 2-D polynomials can be guaranteed by the stability of its finite edge polynomials of the family. An algorithm about the stability test of edge polynomials is given.展开更多
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con...A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.展开更多
The El Niño-Southern Oscillation (ENSO) is a significant climate phenomenon with far-reaching impacts on global weather patterns, ecosystems, and economies. This study aims to enhance ENSO forecasting with the Ex...The El Niño-Southern Oscillation (ENSO) is a significant climate phenomenon with far-reaching impacts on global weather patterns, ecosystems, and economies. This study aims to enhance ENSO forecasting with the Extended Reconstruction Sea Surface Temperature v5 (ERSSTv5) climate model. The M-band discrete wavelet transforms (DWT) are utilized to capture multi-scale temporal and spatial features effectively. Long-short term memory (LSTM) autoencoders are also used to capture significant spatial and temporal patterns in sea surface temperature (SST) anomaly data. Deep learning techniques such as the convolutional neural networks (CNN) are used with non-image and image time series data. We also employ parallel computing in a various support vector regression (SVR) approximators to enhance accuracy. Preliminary results indicate that this hybrid model effectively identifies key precursors and patterns associated with El Niño events, surpassing traditional forecasting methods. Results of the hybrid model produce a correlation of 0.93 in 4-month lagged forecasting of the Oceanic Niño Index (ONI)—indicative of high success rate of the model. Future work will focus on evaluating the model’s performance using additional reanalysis datasets and other methods of deep learning to further refine its robustness and applicability. We propose wavelet-based deep learning models which have potential to shine a light on achieving United Nations’ 2030 Agenda for Sustainable Development’s goal 13: “Climate Action”, as an innovation with potential in improving time series image forecasting in all fields.展开更多
This paper expounded in detail the principle of energy spectrum analysis based on discrete wavelet transformation and multiresolution analysis. In the aspect of feature extraction method study, with investigating the ...This paper expounded in detail the principle of energy spectrum analysis based on discrete wavelet transformation and multiresolution analysis. In the aspect of feature extraction method study, with investigating the feature of impact factor in vibration signals and considering the non-placidity and non-linear of vibration diagnosis signals, the authors import wavelet analysis and fractal theory as the tools of faulty signal feature description. Experimental results proved the validity of this method. To some extent, this method provides a good approach of resolving the wholesome problem of fault feature symptom description.展开更多
Digital image watermarking is a useful solution to the problem of information security, copyright and network security. In this paper, we propose a watermarking algorithm for color image based HT and DWT. A binary ima...Digital image watermarking is a useful solution to the problem of information security, copyright and network security. In this paper, we propose a watermarking algorithm for color image based HT and DWT. A binary image as watermark is embedded into green component or blue component of color image. The algorithm can satisfy the transparence and robustness of the watermarking system very well. The experiment based on this algorithm demonstrates that the watermarking is robust to the common signal processing techniques including JPEG compressing, adding noise, low pass filter, and mosaic.展开更多
基金The National Science and Technology M ajor Project of the M inistry of Science and Technology of China(No.2014ZX03003007-009)
文摘To achieve high parallel computation of discrete wavelet transform (DWT) in JPEG2000, a high-throughput two-dimensional (2D) 9/7 DWT very large scale integration (VLSI) design is proposed, in which the row processor is based on flipping structure. Due to the difference of the input data flow, the column processor is obtained by adding the input selector and data buffer to the row processor. Normalization steps in row and column DWT are combined to reduce the number of multipliers, and the rationality is verified. By rearranging the output of four-line row DWT with a multiplexer (MUX), the amount of data processed by each column processor becomes half, and the four-input/four- output architecture is implemented. For an image with the size of N x N, the computing time of one-level 2D 9/7 DWT is 0.25N2 + 1.5N clock cycles. The critical path delay is one multiplier delay, and only 5N internal memory is required. The results of post-route simulation on FPGA show that clock frequency reaches 136 MHz, and the throughput is 544 Msample/s, which satisfies the requirements of high-speed applications.
文摘This paper presents discrete wavelet transform (DWT) and its inverse (IDWT) with Haar wavelets as tools to compute the variable size interpolated versions of an image at optimum computational load. As a human observer moves closer to or farther from a scene, the retinal image of the scene zooms in or out, respectively. This zooming in or out can be modeled using variable scale interpolation. The paper proposes a novel way of applying DWT and IDWT in a piecewise manner by non-uniform down- or up-sampling of the images to achieve partially sampled versions of the images. The partially sampled versions are then aggregated to achieve the final variable scale interpolated images. The non-uniform down- or up-sampling here is a function of the required scale of interpolation. Appropriate zero padding is used to make the images suitable for the required non-uniform sampling and the subsequent interpolation to the required scale. The concept of zeroeth level DWT is introduced here, which works as the basis for interpolating the images to achieve bigger size than the original one. The main emphasis here is on the computation of variable size images at less computational load, without compromise of quality of images. The interpolated images to different sizes and the reconstructed images are benchmarked using the statistical parameters and visual comparison. It has been found that the proposed approach performs better as compared to bilinear and bicubic interpolation techniques.
文摘Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images,videos,and audio data.Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties.This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform(DWT),Z-transform(ZT)and Bidiagonal Singular Value Decomposition(BSVD).The original image is decomposed into 3-level DWT,and then,ZT is applied on the HH3 and HL3 sub-bands.The watermark image is encrypted using Arnold Cat Map.BSVD for the watermark and transformed original image were computed,and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image.Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks.Experiments indicated that the proposed method is transparent and highly robust.
基金Supported by the National Natural Science Foundation of China(No.60402036)the Natural Science Foundation of Beijing(No.4042008).
文摘The paper describes a texture-based fast text location scheme which operates directly in the Discrete Wavelet Transform (DWT) domain. By the distinguishing texture characteristics encoded in wavelet transform domain, the text is fast detected from complex background images stored in the compressed format such as JPEG2000 without full decompress. Compared with some traditional character location methods, the proposed scheme has the advantages of low computational cost, robust to size and font of characters and high accuracy. Preliminary experimental results show that the proposed scheme is efficient and effective.
文摘This paper presents an optimized 3-D Discrete Wavelet Transform (3-DDWT) architecture. 1-DDWT employed for the design of 3-DDWT architecture uses reduced lifting scheme approach. Further the architecture is optimized by applying block enabling technique, scaling, and rounding of the filter coefficients. The proposed architecture uses biorthogonal (9/7) wavelet filter. The architecture is modeled using Verilog HDL, simulated using ModelSim, synthesized using Xilinx ISE and finally implemented on Virtex-5 FPGA. The proposed 3-DDWT architecture has slice register utilization of 5%, operating frequency of 396 MHz and a power consumption of 0.45 W.
基金the Natural Science Foundation of China (No.60472037).
文摘This paper presents an analysis on and experimental comparison of several typical fast algorithms for discrete wavelet transform (DWT) and their implementation in image compression, particularly the Mallat algorithm, FFT-based algorithm, Short- length based algorithm and Lifting algorithm. The principles, structures and computational complexity of these algorithms are explored in details respectively. The results of the experiments for comparison are consistent to those simulated by MATLAB. It is found that there are limitations in the implementation of DWT. Some algorithms are workable only for special wavelet transform, lacking in generality. Above all, the speed of wavelet transform, as the governing element to the speed of image processing, is in fact the retarding factor for real-time image processing.
文摘Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.
基金This project was supported by National Natural Science Foundation of China (69971002).
文摘It is revealed that the dynamic stability of 2-D recursive continuous-discrete systems with interval parameters involves the problem of robust Hurwitz-Schur stability of bivariate polynomials family. It is proved that the Hurwitz-Schur stability of the denominator polynomials of the systems is necessary and sufficient for the asymptotic stability of the 2-D hybrid systems. The 2-D hybrid transformation, i. e. 2-D Laplace-Z transformation, has been proposed to solve the stability analysis of the 2-D continuous-discrete systems, to get the 2-D hybrid transfer functions of the systems. The edge test for the Hurwitz-Schur stability of interval bivariate polynomials is introduced. The Hurwitz-Schur stability of the interval family of 2-D polynomials can be guaranteed by the stability of its finite edge polynomials of the family. An algorithm about the stability test of edge polynomials is given.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62105004 and 52174141)the College Student Innovation and Entrepreneurship Fund Project(Grant No.202210361053)+1 种基金Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center,Anhui University of Science&Technology(Grant No.KSJD202304)the Anhui Province Digital Agricultural Engineering Technology Research Center Open Project(Grant No.AHSZNYGC-ZXKF021)。
文摘A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.
文摘The El Niño-Southern Oscillation (ENSO) is a significant climate phenomenon with far-reaching impacts on global weather patterns, ecosystems, and economies. This study aims to enhance ENSO forecasting with the Extended Reconstruction Sea Surface Temperature v5 (ERSSTv5) climate model. The M-band discrete wavelet transforms (DWT) are utilized to capture multi-scale temporal and spatial features effectively. Long-short term memory (LSTM) autoencoders are also used to capture significant spatial and temporal patterns in sea surface temperature (SST) anomaly data. Deep learning techniques such as the convolutional neural networks (CNN) are used with non-image and image time series data. We also employ parallel computing in a various support vector regression (SVR) approximators to enhance accuracy. Preliminary results indicate that this hybrid model effectively identifies key precursors and patterns associated with El Niño events, surpassing traditional forecasting methods. Results of the hybrid model produce a correlation of 0.93 in 4-month lagged forecasting of the Oceanic Niño Index (ONI)—indicative of high success rate of the model. Future work will focus on evaluating the model’s performance using additional reanalysis datasets and other methods of deep learning to further refine its robustness and applicability. We propose wavelet-based deep learning models which have potential to shine a light on achieving United Nations’ 2030 Agenda for Sustainable Development’s goal 13: “Climate Action”, as an innovation with potential in improving time series image forecasting in all fields.
文摘This paper expounded in detail the principle of energy spectrum analysis based on discrete wavelet transformation and multiresolution analysis. In the aspect of feature extraction method study, with investigating the feature of impact factor in vibration signals and considering the non-placidity and non-linear of vibration diagnosis signals, the authors import wavelet analysis and fractal theory as the tools of faulty signal feature description. Experimental results proved the validity of this method. To some extent, this method provides a good approach of resolving the wholesome problem of fault feature symptom description.
文摘Digital image watermarking is a useful solution to the problem of information security, copyright and network security. In this paper, we propose a watermarking algorithm for color image based HT and DWT. A binary image as watermark is embedded into green component or blue component of color image. The algorithm can satisfy the transparence and robustness of the watermarking system very well. The experiment based on this algorithm demonstrates that the watermarking is robust to the common signal processing techniques including JPEG compressing, adding noise, low pass filter, and mosaic.