With the rapid development of artificial intelligence and the widespread use of the Internet of Things, semantic communication, as an emerging communication paradigm, has been attracting great interest. Taking image t...With the rapid development of artificial intelligence and the widespread use of the Internet of Things, semantic communication, as an emerging communication paradigm, has been attracting great interest. Taking image transmission as an example, from the semantic communication's view, not all pixels in the images are equally important for certain receivers. The existing semantic communication systems directly perform semantic encoding and decoding on the whole image, in which the region of interest cannot be identified. In this paper, we propose a novel semantic communication system for image transmission that can distinguish between Regions Of Interest (ROI) and Regions Of Non-Interest (RONI) based on semantic segmentation, where a semantic segmentation algorithm is used to classify each pixel of the image and distinguish ROI and RONI. The system also enables high-quality transmission of ROI with lower communication overheads by transmissions through different semantic communication networks with different bandwidth requirements. An improved metric θPSNR is proposed to evaluate the transmission accuracy of the novel semantic transmission network. Experimental results show that our proposed system achieves a significant performance improvement compared with existing approaches, namely, existing semantic communication approaches and the conventional approach without semantics.展开更多
The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication ...The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away fromunauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels.展开更多
With the development of underwater sonar detection technology,simultaneous localization and mapping(SLAM)approach has attracted much attention in underwater navigation field in recent years.But the weak detection abil...With the development of underwater sonar detection technology,simultaneous localization and mapping(SLAM)approach has attracted much attention in underwater navigation field in recent years.But the weak detection ability of a single vehicle limits the SLAM performance in wide areas.Thereby,cooperative SLAM using multiple vehicles has become an important research direction.The key factor of cooperative SLAM is timely and efficient sonar image transmission among underwater vehicles.However,the limited bandwidth of underwater acoustic channels contradicts a large amount of sonar image data.It is essential to compress the images before transmission.Recently,deep neural networks have great value in image compression by virtue of the powerful learning ability of neural networks,but the existing sonar image compression methods based on neural network usually focus on the pixel-level information without the semantic-level information.In this paper,we propose a novel underwater acoustic transmission scheme called UAT-SSIC that includes semantic segmentation-based sonar image compression(SSIC)framework and the joint source-channel codec,to improve the accuracy of the semantic information of the reconstructed sonar image at the receiver.The SSIC framework consists of Auto-Encoder structure-based sonar image compression network,which is measured by a semantic segmentation network's residual.Considering that sonar images have the characteristics of blurred target edges,the semantic segmentation network used a special dilated convolution neural network(DiCNN)to enhance segmentation accuracy by expanding the range of receptive fields.The joint source-channel codec with unequal error protection is proposed that adjusts the power level of the transmitted data,which deal with sonar image transmission error caused by the serious underwater acoustic channel.Experiment results demonstrate that our method preserves more semantic information,with advantages over existing methods at the same compression ratio.It also improves the error tolerance and packet loss resistance of transmission.展开更多
If the degree distribution is chosen carefully, the irregular low-density parity-check (LDPC) codes can outperform the regular ones. An image transmission system is proposed by combining regular and irregular LDPC cod...If the degree distribution is chosen carefully, the irregular low-density parity-check (LDPC) codes can outperform the regular ones. An image transmission system is proposed by combining regular and irregular LDPC codes with 16QAM/64QAM modulation to improve both efficiency and reliability. Simulaton results show that LDPC codes are good coding schemes over fading channel in image communication with lower system complexity. More over, irregular codes can obtain a code gain of about 0.7 dB compared with regular ones when BER is 10 -4. So the irregular LDPC codes are more suitable for image transmission than the regular codes.展开更多
An efficient image transmission scheme is proposed based on byte partition and adaptive sub-channel distribution technique in Filtered MultiTone (FMT) system over frequency selective slow fading channel. According to ...An efficient image transmission scheme is proposed based on byte partition and adaptive sub-channel distribution technique in Filtered MultiTone (FMT) system over frequency selective slow fading channel. According to the simulation results and analysis of a typical image with matlab, improvement in Peak Signal to Noise Ratio (PSNR) of the received image and low complexity for equalization is demonstrated remarkably. Comparing with no adaptive and no actual channel equalization scheme, the proposed scheme saves over 6 dB when PSNR=40 dB.展开更多
This paper describes the design of modulation, compression coding and transmission control in underwater acoustic color image transmission system. This design adapts a special system of modulation and transmission con...This paper describes the design of modulation, compression coding and transmission control in underwater acoustic color image transmission system. This design adapts a special system of modulation and transmission control based on a DSP(Digital Signal Processing) chip, to cope with the complex underwater acoustic channel. The hardware block diagram and software flow chart are presented.展开更多
Information loss recovery techniques are important for transmitting images over error-prone channels at the decoder. A novel error recovery scheme for JPEG2000 image is presented in this paper, which adopts different ...Information loss recovery techniques are important for transmitting images over error-prone channels at the decoder. A novel error recovery scheme for JPEG2000 image is presented in this paper, which adopts different techniques for the lowest frequency coefficients and high frequency coefficients in the wavelet domain. The low-frequency recovery algorithm was implemented by adopting the watermarking technique and the packet structure of JPEG2000. The low-frequency eoefficients taken as the hidden data were extracted from the compressed bit stream, and then were embedded back into the bit stream itself prior to transmission. The embedded data were used to recover the information loss. High-frequency reconstruction was performed in bitplane base. The damaged bitplanes were recovered according to the correlation in the wavelet subband structure and by using the algorithm based on the horizontal and vertical edge detection. Experiments verified the effectiveness of these algorithms.展开更多
The constrained Viterbi algorithm (C-VA) makes use of some prior reliable information to reduce complexity and improve performance of Viterbi algorithm (VA). However it can only be used in the concatenate code sch...The constrained Viterbi algorithm (C-VA) makes use of some prior reliable information to reduce complexity and improve performance of Viterbi algorithm (VA). However it can only be used in the concatenate code scheme because the detection result of cyclic redundancy check code (CRC) is exploited to provide reliable information. In this paper, a different way is proposed to provide reliable information for C-VA, which is possible to be used in simple codec. Known bits were added to the set partitioning in hierarchical trees (SPIHT) coded image sequence periodically and directly. They were thought to be reliable information for C-VA in the decoder. Experimental results show that the proposed scheme can obtain much better error resilient ability compared with conventional VA under the extremely inferior channel condition if the best desired quality of reconstructed images can be sacrificed.展开更多
Based on the property that high degree variable nodes within an irregular LowDensity Parity-Check (LDPC) code have more powerful error-correcting capability than that of low degree variable nodes, a group of irregular...Based on the property that high degree variable nodes within an irregular LowDensity Parity-Check (LDPC) code have more powerful error-correcting capability than that of low degree variable nodes, a group of irregular LDPC codes with Unequal Error Protection (UEP)property is designed in this letter. Simulation results show that the transmission quality of the image may be effectively improved with this class of irregular LDPC code.展开更多
The underwater acoustic image transmission system based on the high-speed DSP device TMS320C549 has been studied.We use Goertzel algorithm for source decoding and MFSK for modulation.Turbo code is used for channel cod...The underwater acoustic image transmission system based on the high-speed DSP device TMS320C549 has been studied.We use Goertzel algorithm for source decoding and MFSK for modulation.Turbo code is used for channel coding and decoding.The purpose is to implement underwater video image data transmission.展开更多
The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that c...The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced.This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images.The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression.This paper introduces a content-based image authentication mechanism that is suitable for usage across an untrusted network and resistant to data loss during transmission.By employing scale attributes and a key-dependent parametric Long Short-Term Memory(LSTM),it is feasible to improve the resilience of digital signatures against image deterioration and strengthen their security against malicious actions.Furthermore,the successful implementation of transmitting biometric data in a compressed format over a wireless network has been accomplished.For applications involving the transmission and sharing of images across a network.The suggested technique utilizes the scalability of a structural digital signature to attain a satisfactory equilibrium between security and picture transfer.An effective adaptive compression strategy was created to lengthen the overall lifetime of the network by sharing the processing of responsibilities.This scheme ensures a large reduction in computational and energy requirements while minimizing image quality loss.This approach employs multi-scale characteristics to improve the resistance of signatures against image deterioration.The proposed system attained a Gaussian noise value of 98%and a rotation accuracy surpassing 99%.展开更多
A robust progressive image transmission scheme over broadband wireless fading channels is developed for 4th generation wireless communication systems (4G) in this paper. The proposed scheme is based on space-time bl...A robust progressive image transmission scheme over broadband wireless fading channels is developed for 4th generation wireless communication systems (4G) in this paper. The proposed scheme is based on space-time block coded orthogonal frequency-division multiplexing (OFDM) with 4 transmit antennas and 2 receive antennas and uses a simplified minimum mean square error (MMSE) detector instead of maximum likelihood (ML) detectors. Considering DCT is simpler and more widely applied in the industry than wavelet transforms, a progressive image compression method based on DCT called mean-subtract embedded DCT (MSEDCT) is developed, with a simple mean-subtract method for the redundancy of reorganized DC blocks in addition to a structure similar to the embedded zerotree wavelet coding (EZW) method. Then after analyzing and testing bit importance of the progressive MSEDCT bitstreams, the layered unequal error protection method of joint source-channels coding based on Reed-Solomon (RS) codes is used to protect different parts of bitstreams, providing different QoS assurances and good flexibility. Simulation experiments show our proposed scheme can effectively degrade fading effects and obtain better image transmission effects with 10 -20 dB average peak-sig- nal-noise-ratio (PSNR) gains at the median Eb/No than those schemes without space-time coded OFDM or equal error protections with space-time coded OFDM.展开更多
Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the n...Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the network. When images are transmitted over fading channels, especially in the severe circum- stances of a coal mine, blocks of the image may be destroyed by the effects of noise. Instead of using com- mon retransmission query protocols the lost data is reconstructed by using the adaptive curvature-driven diffusion (ACDD) image restoration algorithm in the gradient domain of the destroyed image. Missing blocks are restored by the method in two steps: In step one, the missing blocks are filled in the gradient domain by the ACDD algorithm; in step two, and the image is reconstructed from the reformed gradients by solving a Poisson equation. The proposed method eliminates the staircase effect and accelerates the convergence rate. This is demonstrated by experimental results.展开更多
In this paper, we propose a novel Unequal Error Protection (UEP) scheme with two levels for image transmission using Multilevel Codes (MLC). By providing the best protection for the most important data, the final reco...In this paper, we propose a novel Unequal Error Protection (UEP) scheme with two levels for image transmission using Multilevel Codes (MLC). By providing the best protection for the most important data, the final recovered image quality is remarkably improved both in visual effect and in Peak Signal to Noise power Ratio (PSNR) performance.展开更多
Purpose-The purpose of this paper is to propose a novel and secure image transmission based on the unpredictable behavior of the chaotic systems.Design/methodology/approach-The proposed approach includes two main cont...Purpose-The purpose of this paper is to propose a novel and secure image transmission based on the unpredictable behavior of the chaotic systems.Design/methodology/approach-The proposed approach includes two main contributions:synchronization scheme and transmission scheme.The synchronization scheme benefits the advantage of the fractional-order active synchronization method.A new control law is derived to asymptotically synchronize the underlined fractional-order Bloch chaotic system.The validity of the proposed synchronization scheme is proved by the Lyapunov stability theorem.Then,a novel image transmission scheme is designed to transfer image data via chaotic signals,which modulates the encrypted data in the sender signals and demodulates it at the receiver side.Findings-Numerical simulations are provided to show the validity and effectiveness of the proposed image transmission system.Furthermore,the performance of the image transmission system is evaluated using some illustrative examples and their corresponding statistical tests.The results demonstrate the effectiveness of the proposed method in comparison with other proposed methods in this subject.Originality/value–A new chaos-based image transmission system is developed based on the synchronization of Bloch chaotic system.The introduced transmission system is interesting and could be applicable to any kind of secure image/video transmission.展开更多
Images and videos provide a wealth of information for people in production and life.Although most digital information is transmitted via optical fiber,the image acquisition and transmission processes still rely heavil...Images and videos provide a wealth of information for people in production and life.Although most digital information is transmitted via optical fiber,the image acquisition and transmission processes still rely heavily on electronic circuits.The development of all-optical transmission networks and optical computing frameworks has pointed to the direction for the next generation of data transmission and information processing.Here,we propose a high-speed,low-cost,multiplexed parallel and one-piece all-fiber architecture for image acquisition,encoding,and transmission,called the Multicore Fiber Acquisition and Transmission Image System(MFAT).Based on different spatial and modal channels of the multicore fiber,fiber-coupled self-encoding,and digital aperture decoding technology,scenes can be observed directly from up to 1 km away.The expansion of capacity provides the possibility of parallel coded transmission of multimodal high-quality data.MFAT requires no additional signal transmitting and receiving equipment.The all-fiber processing saves the time traditionally spent on signal conversion and image pre-processing(compression,encoding,and modulation).Additionally,it provides an effective solution for 2D information acquisition and transmission tasks in extreme environments such as high temperatures and electromagnetic interference.展开更多
With the development of deep learning(DL),joint source-channel coding(JSCC)solutions for end-to-end transmission have gained a lot of attention.Adaptive deep JSCC schemes support dynamically adjusting the rate accordi...With the development of deep learning(DL),joint source-channel coding(JSCC)solutions for end-to-end transmission have gained a lot of attention.Adaptive deep JSCC schemes support dynamically adjusting the rate according to different channel conditions during transmission,enhancing robustness in dynamic wireless environment.However,most of the existing adaptive JSCC schemes only consider different channel conditions,ignoring the different feature importance in the image processing and transmission.The uniform compression of different features in the image may result in the compromise of critical image details,particularly in low signal-to-noise ratio(SNR)scenarios.To address the above issues,in this paper,a dual attention mechanism is introduced and an SNR-adaptive deep JSCC mechanism with a convolutional block attention module(CBAM)is proposed,in which matrix operations are applied to features in spatial and channel dimensions respectively.The proposed solution concatenates the pooling feature with the SNR level and passes it sequentially through the channel attention network and spatial attention network to obtain the importance evaluation result.Experiments show that the proposed solution outperforms other baseline schemes in terms of peak SNR(PSNR)and structural similarity(SSIM),particularly in low SNR scenarios or when dealing with complex image content.展开更多
Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images.The basic idea of visual cryptography is to construct two or more secret shares from the original image in the fo...Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images.The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image.In this paper,a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed.The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns.The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret image.The main feature of the proposed scheme is the selection of random blocks to apply the tetrolet tilling patterns from the fundamental tetrolet pattern board.Single procedure is used to perform both tetrolet transform and the scheme of visual cryptography.Finally,the experimental results showcase the proposed scheme is an extraordinary approach to transfer the secret image and reconstruct the secret image with high visual quality in the receiver end.展开更多
The thesis describes an advanced digital solution to mining digital image monitor system, which makes up the shortage of the traditional mining analog image monitor. It illustrates the system components and how to cho...The thesis describes an advanced digital solution to mining digital image monitor system, which makes up the shortage of the traditional mining analog image monitor. It illustrates the system components and how to choose the encoder bandwidth of the system. The problem of image multicast and its solution in LAN are also discussed.展开更多
<span style="font-family:Verdana;">In a context marked by the proliferation of smartphones and multimedia applications, the processing and transmission of images </span><span style="font-...<span style="font-family:Verdana;">In a context marked by the proliferation of smartphones and multimedia applications, the processing and transmission of images </span><span style="font-family:Verdana;">ha</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">ve</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> become a real problem. Image compression </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">is</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> the first approach to address this problem, it nevertheless suffers from its inability to adapt to the dynamics of limited environments, consisting mainly of mobile equipment and wireless networks. In this work, we propose a stochastic model to gradually estimate an image upon </span><span style="font-family:Verdana;">information</span><span style="font-family:Verdana;"> on its pixels that are transmitted progressively. We consider this transmission as a </span><span style="font-family:Verdana;">dynamical</span><span style="font-family:Verdana;"> process, where the sender </span><span style="font-family:Verdana;">push</span></span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the data in decreasing significance order. In order to adapt to network conditions and performances, instead of truncating the pixels, we suggest a new method called Fast Reconstruction Method by Kalman Filtering (FRM-KF) consisting </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">of</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> recursive inference of the not yet received layers belonging to a sequence of bitplanes. After empirical analysis, we estimate </span><span style="font-family:Verdana;">parameters</span><span style="font-family:Verdana;"> of our model which is a linear discrete Kalman Filter. We assume the initial law of information to be the uniform distribution on the set [0, 255] corresponding to the range of gray levels. The performances of FRM-KF method ha</span></span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">ve </span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;">been evaluated in terms of the ratios in the quality of data image/size sent and in the quality of image/time required for treatment. </span><span style="font-family:Verdana;">A high</span><span style="font-family:Verdana;"> quality was reached faster with relatively small data (less than 10% of image data is needed to obtain up to the sixth-quality image). The time for treatment also decreases faster with </span><span style="font-family:Verdana;">number</span><span style="font-family:Verdana;"> of received layers. However, we found that the time of image treatment might be large starting from </span><span style="font-family:Verdana;">a image</span><span style="font-family:Verdana;"> resolution of 1024 * 1024. Hence, we recommend </span><span style="font-family:Verdana;">FRM-KF</span><span style="font-family:Verdana;"> method for resolutions less or equal to 512 * 512. A statistical comparative analysis reveals that FRM-KF is competitive and suitable to be implemented </span><span style="font-family:Verdana;">on</span><span style="font-family:Verdana;"> limited </span><span style="font-family:Verdana;">resource</span><span style="font-family:Verdana;"> environments.</span></span></span></span>展开更多
基金supported in part by collaborative research with Toyota Motor Corporation,in part by ROIS NII Open Collaborative Research under Grant 21S0601,in part by JSPS KAKENHI under Grants 20H00592,21H03424.
文摘With the rapid development of artificial intelligence and the widespread use of the Internet of Things, semantic communication, as an emerging communication paradigm, has been attracting great interest. Taking image transmission as an example, from the semantic communication's view, not all pixels in the images are equally important for certain receivers. The existing semantic communication systems directly perform semantic encoding and decoding on the whole image, in which the region of interest cannot be identified. In this paper, we propose a novel semantic communication system for image transmission that can distinguish between Regions Of Interest (ROI) and Regions Of Non-Interest (RONI) based on semantic segmentation, where a semantic segmentation algorithm is used to classify each pixel of the image and distinguish ROI and RONI. The system also enables high-quality transmission of ROI with lower communication overheads by transmissions through different semantic communication networks with different bandwidth requirements. An improved metric θPSNR is proposed to evaluate the transmission accuracy of the novel semantic transmission network. Experimental results show that our proposed system achieves a significant performance improvement compared with existing approaches, namely, existing semantic communication approaches and the conventional approach without semantics.
基金the Deanship of Scientific Research,Princess Nourah bint Abdulrahman University,through the Program of Research Project Funding After Publication,Grant No.(44-PRFA-P-131).
文摘The efficient transmission of images,which plays a large role inwireless communication systems,poses a significant challenge in the growth of multimedia technology.High-quality images require well-tuned communication standards.The Single Carrier Frequency Division Multiple Access(SC-FDMA)is adopted for broadband wireless communications,because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio(PAPR).Data transmission through open-channel networks requires much concentration on security,reliability,and integrity.The data need a space away fromunauthorized access,modification,or deletion.These requirements are to be fulfilled by digital image watermarking and encryption.This paper ismainly concerned with secure image communication over the wireless SC-FDMA systemas an adopted communication standard.It introduces a robust image communication framework over SC-FDMA that comprises digital image watermarking and encryption to improve image security,while maintaining a high-quality reconstruction of images at the receiver side.The proposed framework allows image watermarking based on the Discrete Cosine Transform(DCT)merged with the Singular Value Decomposition(SVD)in the so-called DCT-SVD watermarking.In addition,image encryption is implemented based on chaos and DNA encoding.The encrypted watermarked images are then transmitted through the wireless SC-FDMA system.The linearMinimumMean Square Error(MMSE)equalizer is investigated in this paper to mitigate the effect of channel fading and noise on the transmitted images.Two subcarrier mapping schemes,namely localized and interleaved schemes,are compared in this paper.The study depends on different channelmodels,namely PedestrianAandVehicularA,with a modulation technique namedQuadratureAmplitude Modulation(QAM).Extensive simulation experiments are conducted and introduced in this paper for efficient transmission of encrypted watermarked images.In addition,different variants of SC-FDMA based on the Discrete Wavelet Transform(DWT),Discrete Cosine Transform(DCT),and Fast Fourier Transform(FFT)are considered and compared for the image communication task.The simulation results and comparison demonstrate clearly that DWT-SC-FDMAis better suited to the transmission of the digital images in the case of PedestrianAchannels,while the DCT-SC-FDMA is better suited to the transmission of the digital images in the case of Vehicular A channels.
基金supported in part by the Tianjin Technology Innovation Guidance Special Fund Project under Grant No.21YDTPJC00850in part by the National Natural Science Foundation of China under Grant No.41906161in part by the Natural Science Foundation of Tianjin under Grant No.21JCQNJC00650。
文摘With the development of underwater sonar detection technology,simultaneous localization and mapping(SLAM)approach has attracted much attention in underwater navigation field in recent years.But the weak detection ability of a single vehicle limits the SLAM performance in wide areas.Thereby,cooperative SLAM using multiple vehicles has become an important research direction.The key factor of cooperative SLAM is timely and efficient sonar image transmission among underwater vehicles.However,the limited bandwidth of underwater acoustic channels contradicts a large amount of sonar image data.It is essential to compress the images before transmission.Recently,deep neural networks have great value in image compression by virtue of the powerful learning ability of neural networks,but the existing sonar image compression methods based on neural network usually focus on the pixel-level information without the semantic-level information.In this paper,we propose a novel underwater acoustic transmission scheme called UAT-SSIC that includes semantic segmentation-based sonar image compression(SSIC)framework and the joint source-channel codec,to improve the accuracy of the semantic information of the reconstructed sonar image at the receiver.The SSIC framework consists of Auto-Encoder structure-based sonar image compression network,which is measured by a semantic segmentation network's residual.Considering that sonar images have the characteristics of blurred target edges,the semantic segmentation network used a special dilated convolution neural network(DiCNN)to enhance segmentation accuracy by expanding the range of receptive fields.The joint source-channel codec with unequal error protection is proposed that adjusts the power level of the transmitted data,which deal with sonar image transmission error caused by the serious underwater acoustic channel.Experiment results demonstrate that our method preserves more semantic information,with advantages over existing methods at the same compression ratio.It also improves the error tolerance and packet loss resistance of transmission.
文摘If the degree distribution is chosen carefully, the irregular low-density parity-check (LDPC) codes can outperform the regular ones. An image transmission system is proposed by combining regular and irregular LDPC codes with 16QAM/64QAM modulation to improve both efficiency and reliability. Simulaton results show that LDPC codes are good coding schemes over fading channel in image communication with lower system complexity. More over, irregular codes can obtain a code gain of about 0.7 dB compared with regular ones when BER is 10 -4. So the irregular LDPC codes are more suitable for image transmission than the regular codes.
文摘An efficient image transmission scheme is proposed based on byte partition and adaptive sub-channel distribution technique in Filtered MultiTone (FMT) system over frequency selective slow fading channel. According to the simulation results and analysis of a typical image with matlab, improvement in Peak Signal to Noise Ratio (PSNR) of the received image and low complexity for equalization is demonstrated remarkably. Comparing with no adaptive and no actual channel equalization scheme, the proposed scheme saves over 6 dB when PSNR=40 dB.
文摘This paper describes the design of modulation, compression coding and transmission control in underwater acoustic color image transmission system. This design adapts a special system of modulation and transmission control based on a DSP(Digital Signal Processing) chip, to cope with the complex underwater acoustic channel. The hardware block diagram and software flow chart are presented.
文摘Information loss recovery techniques are important for transmitting images over error-prone channels at the decoder. A novel error recovery scheme for JPEG2000 image is presented in this paper, which adopts different techniques for the lowest frequency coefficients and high frequency coefficients in the wavelet domain. The low-frequency recovery algorithm was implemented by adopting the watermarking technique and the packet structure of JPEG2000. The low-frequency eoefficients taken as the hidden data were extracted from the compressed bit stream, and then were embedded back into the bit stream itself prior to transmission. The embedded data were used to recover the information loss. High-frequency reconstruction was performed in bitplane base. The damaged bitplanes were recovered according to the correlation in the wavelet subband structure and by using the algorithm based on the horizontal and vertical edge detection. Experiments verified the effectiveness of these algorithms.
基金Project supported by the National Natural Science Foundation of China (Grant No.60372070)
文摘The constrained Viterbi algorithm (C-VA) makes use of some prior reliable information to reduce complexity and improve performance of Viterbi algorithm (VA). However it can only be used in the concatenate code scheme because the detection result of cyclic redundancy check code (CRC) is exploited to provide reliable information. In this paper, a different way is proposed to provide reliable information for C-VA, which is possible to be used in simple codec. Known bits were added to the set partitioning in hierarchical trees (SPIHT) coded image sequence periodically and directly. They were thought to be reliable information for C-VA in the decoder. Experimental results show that the proposed scheme can obtain much better error resilient ability compared with conventional VA under the extremely inferior channel condition if the best desired quality of reconstructed images can be sacrificed.
文摘Based on the property that high degree variable nodes within an irregular LowDensity Parity-Check (LDPC) code have more powerful error-correcting capability than that of low degree variable nodes, a group of irregular LDPC codes with Unequal Error Protection (UEP)property is designed in this letter. Simulation results show that the transmission quality of the image may be effectively improved with this class of irregular LDPC code.
基金This project was supported by NFSC (No. 60172053) Fujian Provincial Natural Science Foundation (No. A0110001)
文摘The underwater acoustic image transmission system based on the high-speed DSP device TMS320C549 has been studied.We use Goertzel algorithm for source decoding and MFSK for modulation.Turbo code is used for channel coding and decoding.The purpose is to implement underwater video image data transmission.
文摘The act of transmitting photos via the Internet has become a routine and significant activity.Enhancing the security measures to safeguard these images from counterfeiting and modifications is a critical domain that can still be further enhanced.This study presents a system that employs a range of approaches and algorithms to ensure the security of transmitted venous images.The main goal of this work is to create a very effective system for compressing individual biometrics in order to improve the overall accuracy and security of digital photographs by means of image compression.This paper introduces a content-based image authentication mechanism that is suitable for usage across an untrusted network and resistant to data loss during transmission.By employing scale attributes and a key-dependent parametric Long Short-Term Memory(LSTM),it is feasible to improve the resilience of digital signatures against image deterioration and strengthen their security against malicious actions.Furthermore,the successful implementation of transmitting biometric data in a compressed format over a wireless network has been accomplished.For applications involving the transmission and sharing of images across a network.The suggested technique utilizes the scalability of a structural digital signature to attain a satisfactory equilibrium between security and picture transfer.An effective adaptive compression strategy was created to lengthen the overall lifetime of the network by sharing the processing of responsibilities.This scheme ensures a large reduction in computational and energy requirements while minimizing image quality loss.This approach employs multi-scale characteristics to improve the resistance of signatures against image deterioration.The proposed system attained a Gaussian noise value of 98%and a rotation accuracy surpassing 99%.
文摘A robust progressive image transmission scheme over broadband wireless fading channels is developed for 4th generation wireless communication systems (4G) in this paper. The proposed scheme is based on space-time block coded orthogonal frequency-division multiplexing (OFDM) with 4 transmit antennas and 2 receive antennas and uses a simplified minimum mean square error (MMSE) detector instead of maximum likelihood (ML) detectors. Considering DCT is simpler and more widely applied in the industry than wavelet transforms, a progressive image compression method based on DCT called mean-subtract embedded DCT (MSEDCT) is developed, with a simple mean-subtract method for the redundancy of reorganized DC blocks in addition to a structure similar to the embedded zerotree wavelet coding (EZW) method. Then after analyzing and testing bit importance of the progressive MSEDCT bitstreams, the layered unequal error protection method of joint source-channels coding based on Reed-Solomon (RS) codes is used to protect different parts of bitstreams, providing different QoS assurances and good flexibility. Simulation experiments show our proposed scheme can effectively degrade fading effects and obtain better image transmission effects with 10 -20 dB average peak-sig- nal-noise-ratio (PSNR) gains at the median Eb/No than those schemes without space-time coded OFDM or equal error protections with space-time coded OFDM.
基金supported by the National High-Tech Research and Development Program of China (No. 2008AA062200)the National Natural Science Foundation of China (No.60802077)the Fundamental Research Funds for the Central Universities (No. 2010QNA43)
文摘Curvature-driven diffusion (CDD) principles were used to develop a novel gradient based image restora- tion algorithm. The algorithm fills in blocks of missing data in a wireless image after transmission through the network. When images are transmitted over fading channels, especially in the severe circum- stances of a coal mine, blocks of the image may be destroyed by the effects of noise. Instead of using com- mon retransmission query protocols the lost data is reconstructed by using the adaptive curvature-driven diffusion (ACDD) image restoration algorithm in the gradient domain of the destroyed image. Missing blocks are restored by the method in two steps: In step one, the missing blocks are filled in the gradient domain by the ACDD algorithm; in step two, and the image is reconstructed from the reformed gradients by solving a Poisson equation. The proposed method eliminates the staircase effect and accelerates the convergence rate. This is demonstrated by experimental results.
文摘In this paper, we propose a novel Unequal Error Protection (UEP) scheme with two levels for image transmission using Multilevel Codes (MLC). By providing the best protection for the most important data, the final recovered image quality is remarkably improved both in visual effect and in Peak Signal to Noise power Ratio (PSNR) performance.
文摘Purpose-The purpose of this paper is to propose a novel and secure image transmission based on the unpredictable behavior of the chaotic systems.Design/methodology/approach-The proposed approach includes two main contributions:synchronization scheme and transmission scheme.The synchronization scheme benefits the advantage of the fractional-order active synchronization method.A new control law is derived to asymptotically synchronize the underlined fractional-order Bloch chaotic system.The validity of the proposed synchronization scheme is proved by the Lyapunov stability theorem.Then,a novel image transmission scheme is designed to transfer image data via chaotic signals,which modulates the encrypted data in the sender signals and demodulates it at the receiver side.Findings-Numerical simulations are provided to show the validity and effectiveness of the proposed image transmission system.Furthermore,the performance of the image transmission system is evaluated using some illustrative examples and their corresponding statistical tests.The results demonstrate the effectiveness of the proposed method in comparison with other proposed methods in this subject.Originality/value–A new chaos-based image transmission system is developed based on the synchronization of Bloch chaotic system.The introduced transmission system is interesting and could be applicable to any kind of secure image/video transmission.
基金financial supports from the National Key R&D Program of China (2021YFA1401103)the National Natural Science Foundation of China (61925502 and 51772145)
文摘Images and videos provide a wealth of information for people in production and life.Although most digital information is transmitted via optical fiber,the image acquisition and transmission processes still rely heavily on electronic circuits.The development of all-optical transmission networks and optical computing frameworks has pointed to the direction for the next generation of data transmission and information processing.Here,we propose a high-speed,low-cost,multiplexed parallel and one-piece all-fiber architecture for image acquisition,encoding,and transmission,called the Multicore Fiber Acquisition and Transmission Image System(MFAT).Based on different spatial and modal channels of the multicore fiber,fiber-coupled self-encoding,and digital aperture decoding technology,scenes can be observed directly from up to 1 km away.The expansion of capacity provides the possibility of parallel coded transmission of multimodal high-quality data.MFAT requires no additional signal transmitting and receiving equipment.The all-fiber processing saves the time traditionally spent on signal conversion and image pre-processing(compression,encoding,and modulation).Additionally,it provides an effective solution for 2D information acquisition and transmission tasks in extreme environments such as high temperatures and electromagnetic interference.
基金This work was supported in part by the National Natural Science Foundation of China(62293481)in part by the Young Elite Scientists Sponsorship Program by CAST(2023QNRC001)+1 种基金in part by the National Natural Science Foundation for Young Scientists of China(62001050)in part by the Fundamental Research Funds for the Central Universities(2023RC95).
文摘With the development of deep learning(DL),joint source-channel coding(JSCC)solutions for end-to-end transmission have gained a lot of attention.Adaptive deep JSCC schemes support dynamically adjusting the rate according to different channel conditions during transmission,enhancing robustness in dynamic wireless environment.However,most of the existing adaptive JSCC schemes only consider different channel conditions,ignoring the different feature importance in the image processing and transmission.The uniform compression of different features in the image may result in the compromise of critical image details,particularly in low signal-to-noise ratio(SNR)scenarios.To address the above issues,in this paper,a dual attention mechanism is introduced and an SNR-adaptive deep JSCC mechanism with a convolutional block attention module(CBAM)is proposed,in which matrix operations are applied to features in spatial and channel dimensions respectively.The proposed solution concatenates the pooling feature with the SNR level and passes it sequentially through the channel attention network and spatial attention network to obtain the importance evaluation result.Experiments show that the proposed solution outperforms other baseline schemes in terms of peak SNR(PSNR)and structural similarity(SSIM),particularly in low SNR scenarios or when dealing with complex image content.
文摘Visual cryptographic scheme is specially designed for secret image sharing in the form of shadow images.The basic idea of visual cryptography is to construct two or more secret shares from the original image in the form of chaotic image.In this paper,a novel secret image communication scheme based on visual cryptography and Tetrolet tiling patterns is proposed.The proposed image communication scheme will break the secret image into more shadow images based on the Tetrolet tiling patterns.The secret image is divided into 4×4 blocks of tetrominoes and employs the concept of visual cryptography to hide the secret image.The main feature of the proposed scheme is the selection of random blocks to apply the tetrolet tilling patterns from the fundamental tetrolet pattern board.Single procedure is used to perform both tetrolet transform and the scheme of visual cryptography.Finally,the experimental results showcase the proposed scheme is an extraordinary approach to transfer the secret image and reconstruct the secret image with high visual quality in the receiver end.
文摘The thesis describes an advanced digital solution to mining digital image monitor system, which makes up the shortage of the traditional mining analog image monitor. It illustrates the system components and how to choose the encoder bandwidth of the system. The problem of image multicast and its solution in LAN are also discussed.
文摘<span style="font-family:Verdana;">In a context marked by the proliferation of smartphones and multimedia applications, the processing and transmission of images </span><span style="font-family:Verdana;">ha</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">ve</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> become a real problem. Image compression </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">is</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> the first approach to address this problem, it nevertheless suffers from its inability to adapt to the dynamics of limited environments, consisting mainly of mobile equipment and wireless networks. In this work, we propose a stochastic model to gradually estimate an image upon </span><span style="font-family:Verdana;">information</span><span style="font-family:Verdana;"> on its pixels that are transmitted progressively. We consider this transmission as a </span><span style="font-family:Verdana;">dynamical</span><span style="font-family:Verdana;"> process, where the sender </span><span style="font-family:Verdana;">push</span></span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">es</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> the data in decreasing significance order. In order to adapt to network conditions and performances, instead of truncating the pixels, we suggest a new method called Fast Reconstruction Method by Kalman Filtering (FRM-KF) consisting </span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">of</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> recursive inference of the not yet received layers belonging to a sequence of bitplanes. After empirical analysis, we estimate </span><span style="font-family:Verdana;">parameters</span><span style="font-family:Verdana;"> of our model which is a linear discrete Kalman Filter. We assume the initial law of information to be the uniform distribution on the set [0, 255] corresponding to the range of gray levels. The performances of FRM-KF method ha</span></span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">ve </span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;">been evaluated in terms of the ratios in the quality of data image/size sent and in the quality of image/time required for treatment. </span><span style="font-family:Verdana;">A high</span><span style="font-family:Verdana;"> quality was reached faster with relatively small data (less than 10% of image data is needed to obtain up to the sixth-quality image). The time for treatment also decreases faster with </span><span style="font-family:Verdana;">number</span><span style="font-family:Verdana;"> of received layers. However, we found that the time of image treatment might be large starting from </span><span style="font-family:Verdana;">a image</span><span style="font-family:Verdana;"> resolution of 1024 * 1024. Hence, we recommend </span><span style="font-family:Verdana;">FRM-KF</span><span style="font-family:Verdana;"> method for resolutions less or equal to 512 * 512. A statistical comparative analysis reveals that FRM-KF is competitive and suitable to be implemented </span><span style="font-family:Verdana;">on</span><span style="font-family:Verdana;"> limited </span><span style="font-family:Verdana;">resource</span><span style="font-family:Verdana;"> environments.</span></span></span></span>