10,306 research outputs found

    Distributed video coding for wireless video sensor networks: a review of the state-of-the-art architectures

    Get PDF
    Distributed video coding (DVC) is a relatively new video coding architecture originated from two fundamental theorems namely, Slepian–Wolf and Wyner–Ziv. Recent research developments have made DVC attractive for applications in the emerging domain of wireless video sensor networks (WVSNs). This paper reviews the state-of-the-art DVC architectures with a focus on understanding their opportunities and gaps in addressing the operational requirements and application needs of WVSNs

    Performance analysis and optimization of DCT-based multicarrier system on frequency-selective fading channels

    Get PDF
    Regarded as one of the most promising transmission techniques for future wireless communications, the discrete cosine transform (DCT) based multicarrier modulation (MCM) system employs cosine basis as orthogonal functions for real-modulated symbols multiplexing, by which the minimum orthogonal frequency spacing can be reduced by half compared to discrete Fourier transform (DFT) based one. With a time-reversed pre-filter employed at the front of the receiver, interference-free one-tap equalization is achievable for the DCT-based systems. However, due to the correlated pre-filtering operation in time domain, the signal-to-noise ratio (SNR) is enhanced as a result at the output. This leads to reformulated detection criterion to compensate for such filtering effect, rendering minimum-mean-square-error (MMSE) and maximum likelihood (ML) detections applicable to the DCT-based multicarrier system. In this paper, following on the pre-filtering based DCT-MCM model that build in the literature work, we extend the overall system by considering both transceiver perfections and imperfections, where frequency offset, time offset and insufficient guard sequence are included. In the presence of those imperfection errors, the DCT-MCM systems are analysed in terms of desired signal power, inter-carrier interference (ICI) and inter-symbol interference (ISI). Thereafter, new detection algorithms based on zero forcing (ZF) iterative results are proposed to mitigate the imperfection effect. Numerical results show that the theoretical analysis match the simulation results, and the proposed iterative detection algorithms are able to improve the overall system performance significantly

    Feedforward data-aided phase noise estimation from a DCT basis expansion

    Get PDF
    This contribution deals with phase noise estimation from pilot symbols. The phase noise process is approximated by an expansion of discrete cosine transform (DCT) basis functions containing only a few terms. We propose a feedforward algorithm that estimates the DCT coefficients without requiring detailed knowledge about the phase noise statistics. We demonstrate that the resulting (linearized) mean-square phase estimation error consists of two contributions: a contribution from the additive noise, that equals the Cramer-Rao lower bound, and a noise independent contribution, that results front the phase noise modeling error. We investigate the effect of the symbol sequence length, the pilot symbol positions, the number of pilot symbols, and the number of estimated DCT coefficients it the estimation accuracy and on the corresponding bit error rate (PER). We propose a pilot symbol configuration allowing to estimate any number of DCT coefficients not exceeding the number of pilot Symbols, providing a considerable Performance improvement as compared to other pilot symbol configurations. For large block sizes, the DCT-based estimation algorithm substantially outperforms algorithms that estimate only the time-average or the linear trend of the carrier phase. Copyright (C) 2009 J. Bhatti and M. Moeneclaey

    Fast watermarking of MPEG-1/2 streams using compressed-domain perceptual embedding and a generalized correlator detector

    Get PDF
    A novel technique is proposed for watermarking of MPEG-1 and MPEG-2 compressed video streams. The proposed scheme is applied directly in the domain of MPEG-1 system streams and MPEG-2 program streams (multiplexed streams). Perceptual models are used during the embedding process in order to avoid degradation of the video quality. The watermark is detected without the use of the original video sequence. A modified correlation-based detector is introduced that applies nonlinear preprocessing before correlation. Experimental evaluation demonstrates that the proposed scheme is able to withstand several common attacks. The resulting watermarking system is very fast and therefore suitable for copyright protection of compressed video

    A Robust Image Hashing Algorithm Resistant Against Geometrical Attacks

    Get PDF
    This paper proposes a robust image hashing method which is robust against common image processing attacks and geometric distortion attacks. In order to resist against geometric attacks, the log-polar mapping (LPM) and contourlet transform are employed to obtain the low frequency sub-band image. Then the sub-band image is divided into some non-overlapping blocks, and low and middle frequency coefficients are selected from each block after discrete cosine transform. The singular value decomposition (SVD) is applied in each block to obtain the first digit of the maximum singular value. Finally, the features are scrambled and quantized as the safe hash bits. Experimental results show that the algorithm is not only resistant against common image processing attacks and geometric distortion attacks, but also discriminative to content changes
    corecore