13 research outputs found

    The efficient interleaving of digital-video-broadcasting-satellite 2nd generations system

    Get PDF
    The DVB-S2 system is designed as a toolbox to permit the execution of the satellite programs. Interleaver is an essential part of the DVB-S2 system. The current general block interleaver in DVB-S2 is not best, which leads to high BER and maybe not satisfy the requirements of the system. The purpose of this paper is to study the several interleaver types and comparative analyses are done between them to find which of these give better performance. Simulations results obtained prove that the 2D interleavers minimize BER more than other interleavers of DVB-S2. Further, the performance of 2D interleaver is better on a system that required a low SNR

    Signal processing techniques for mobile multimedia systems

    Get PDF
    Recent trends in wireless communication systems show a significant demand for the delivery of multimedia services and applications over mobile networks - mobile multimedia - like video telephony, multimedia messaging, mobile gaming, interactive and streaming video, etc. However, despite the ongoing development of key communication technologies that support these applications, the communication resources and bandwidth available to wireless/mobile radio systems are often severely limited. It is well known, that these bottlenecks are inherently due to the processing capabilities of mobile transmission systems, and the time-varying nature of wireless channel conditions and propagation environments. Therefore, new ways of processing and transmitting multimedia data over mobile radio channels have become essential which is the principal focus of this thesis. In this work, the performance and suitability of various signal processing techniques and transmission strategies in the application of multimedia data over wireless/mobile radio links are investigated. The proposed transmission systems for multimedia communication employ different data encoding schemes which include source coding in the wavelet domain, transmit diversity coding (space-time coding), and adaptive antenna beamforming (eigenbeamforming). By integrating these techniques into a robust communication system, the quality (SNR, etc) of multimedia signals received on mobile devices is maximised while mitigating the fast fading and multi-path effects of mobile channels. To support the transmission of high data-rate multimedia applications, a well known multi-carrier transmission technology known as Orthogonal Frequency Division Multiplexing (OFDM) has been implemented. As shown in this study, this results in significant performance gains when combined with other signal-processing techniques such as spa ce-time block coding (STBC). To optimise signal transmission, a novel unequal adaptive modulation scheme for the communication of multimedia data over MIMO-OFDM systems has been proposed. In this system, discrete wavelet transform/subband coding is used to compress data into their respective low-frequency and high-frequency components. Unlike traditional methods, however, data representing the low-frequency data are processed and modulated separately as they are more sensitive to the distortion effects of mobile radio channels. To make use of a desirable subchannel state, such that the quality (SNR) of the multimedia data recovered at the receiver is optimized, we employ a lookup matrix-adaptive bit and power allocation (LM-ABPA) algorithm. Apart from improving the spectral efficiency of OFDM, the modified LM-ABPA scheme, sorts and allocates subcarriers with the highest SNR to low-frequency data and the remaining to the least important data. To maintain a target system SNR, the LM-ABPA loading scheme assigns appropriate signal constella tion sizes and transmit power levels (modulation type) across all subcarriers and is adapted to the varying channel conditions such that the average system error-rate (SER/BER) is minimised. When configured for a constant data-rate load, simulation results show significant performance gains over non-adaptive systems. In addition to the above studies, the simulation framework developed in this work is applied to investigate the performance of other signal processing techniques for multimedia communication such as blind channel equalization, and to examine the effectiveness of a secure communication system based on a logistic chaotic generator (LCG) for chaos shift-keying (CSK)

    Agricultural Monitoring System using Images through a LPWAN Network

    Get PDF
    Internet of things (IoT) has turned into an opportunity to connect millions of devices through communication networks in digital environments. Inside IoT and mainly in the technologies of communication networks, it is possible to find Low Power Wide Area Networks (LPWAN). Within these technologies, there are service platforms in unlicensed frequency bands such as the LoRa Wide Area Network (LoRaWAN). It has features such as low power consumption, long-distance operation between gateway and node, and low data transport capacity. LPWAN networks are not commonly used to transport high data rates as in the case of agricultural images. The main goal of this research is to present a methodology to transport images through LPWAN networks using LoRa modulation. The methodology presented in this thesis is composed of three stages mainly. The first one is image processing and classification process. This stage allows preparing the image in order to give the information to the classifier and separate the normal and abnormal images; i.e. to classify the images under the normal conditions of its representation in contrast with the images that can represent some sick or affectation with the consequent presence of a particular pathology. For this activity. it was used some techniques were used classifiers such as Support Vector Machine SVM, K-means clustering, neuronal networks, deep learning and convolutional neuronal networks. The last one offered the best results in classifying the samples of the images. The second stage consists in a compression technique and reconstruction algorithms. In this stage, a method is developed to process the image and entails the reduction of the high amount of information that an image has in its normal features with the goal to transport the lowest amount of information. For this purpose, a technique will be presented for the representation of the information of an image in a common base that improves the reduction process of the information. For this activity, the evaluated components were Wavelet, DCT-2D and Kronecker algorithms. The best results were obtained by Wavelet Transform. On the other hand, the compres- sion process entails a series of iterations in the vector information, therefore, each iteration is a possibility to reduce that vector until a value with a minimum PSNR (peak signal to noise ratio) that allows rebuilding the original vector. In the reconstruction process, Iterative Hard Thresholding (IHT), Ortogonal MAtching Pur- suit (OMP), Gradient Projection for Sparse Reconstruction (GPSR)and Step Iterative Shrinage/Thresholding (Twist) algorithms were evaluated. Twist showed the best performance in the results. Finally, in the third stage, LoRa modulation is implemented through the creation of LoRa symbols in Matlab with the compressed information. The symbols were delivered for transmission to Software Defined Radio (SDR). In the receptor, a SDR device receives the signal, which is converted into symbols that are in turn converted in an information vector. Then, the reconstruction process is carried out following the description in the last part of stage 2 - compression technique and reconstruction algorithms, which is described in more detailed in chapter 3, section 3.2. Finally, the image reconstructed is presented. The original image and the result image were compared in order to find the differences. This comparison used Peak Signal-to-Noise Ratio (PSNR) feature in order to get the fidelity of the reconstructed image with respect of the original image. In the receptor node, it is possible to observe the pathology of the leaf. The methodology is particularly applied for monitoring abnormal leaves samples in potato crops. This work allows finding a methodology to communicate images through LPWAN using the LoRa modulation technique. In this work, a framework was used to classify the images, then, to process them in order to reduce the amount of data, to establish communication between a transmitter and a receiver through a wireless communication system and finally, in the receptor, to obtain a picture that shows the particularity of the pathology in an agricultural crop.Gobernación de Boyacá, Colfuturo, Colciencias, Universidad Santo Tomás, Pontificia Universidad JaverianaInternet of things (IoT) has turned into an opportunity to connect millions of devices through communication networks in digital environments. Inside IoT and mainly in the technologies of communication networks, it is possible to find Low Power Wide Area Networks (LPWAN). Within these technologies, there are service platforms in unlicensed frequency bands such as the LoRa Wide Area Network (LoRaWAN). It has features such as low power consumption, long-distance operation between gateway and node, and low data transport capacity. LPWAN networks are not commonly used to transport high data rates as in the case of agricultural images. The main goal of this research is to present a methodology to transport images through LPWAN networks using LoRa modulation. The methodology presented in this thesis is composed of three stages mainly. The first one is image processing and classification process. This stage allows preparing the image in order to give the information to the classifier and separate the normal and abnormal images; i.e. to classify the images under the normal conditions of its representation in contrast with the images that can represent some sick or affectation with the consequent presence of a particular pathology. For this activity. it was used some techniques were used classifiers such as Support Vector Machine SVM, K-means clustering, neuronal networks, deep learning and convolutional neuronal networks. The last one offered the best results in classifying the samples of the images. The second stage consists in a compression technique and reconstruction algorithms. In this stage, a method is developed to process the image and entails the reduction of the high amount of information that an image has in its normal features with the goal to transport the lowest amount of information. For this purpose, a technique will be presented for the representation of the information of an image in a common base that improves the reduction process of the information. For this activity, the evaluated components were Wavelet, DCT-2D and Kronecker algorithms. The best results were obtained by Wavelet Transform. On the other hand, the compres- sion process entails a series of iterations in the vector information, therefore, each iteration is a possibility to reduce that vector until a value with a minimum PSNR (peak signal to noise ratio) that allows rebuilding the original vector. In the reconstruction process, Iterative Hard Thresholding (IHT), Ortogonal MAtching Pur- suit (OMP), Gradient Projection for Sparse Reconstruction (GPSR)and Step Iterative Shrinage/Thresholding (Twist) algorithms were evaluated. Twist showed the best performance in the results. Finally, in the third stage, LoRa modulation is implemented through the creation of LoRa symbols in Matlab with the compressed information. The symbols were delivered for transmission to Software Defined Radio (SDR). In the receptor, a SDR device receives the signal, which is converted into symbols that are in turn converted in an information vector. Then, the reconstruction process is carried out following the description in the last part of stage 2 - compression technique and reconstruction algorithms, which is described in more detailed in chapter 3, section 3.2. Finally, the image reconstructed is presented. The original image and the result image were compared in order to find the differences. This comparison used Peak Signal-to-Noise Ratio (PSNR) feature in order to get the fidelity of the reconstructed image with respect of the original image. In the receptor node, it is possible to observe the pathology of the leaf. The methodology is particularly applied for monitoring abnormal leaves samples in potato crops. This work allows finding a methodology to communicate images through LPWAN using the LoRa modulation technique. In this work, a framework was used to classify the images, then, to process them in order to reduce the amount of data, to establish communication between a transmitter and a receiver through a wireless communication system and finally, in the receptor, to obtain a picture that shows the particularity of the pathology in an agricultural crop.Doctor en IngenieríaDoctoradohttps://orcid.org/0000-0002-3554-1531https://scholar.google.com/citations?user=5_dx9REAAAAJ&hl=eshttps://scienti.minciencias.gov.co/cvlac/EnRecursoHumano/query.d

    Recent Advances in Signal Processing

    Get PDF
    The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    A NOVEL JOINT PERCEPTUAL ENCRYPTION AND WATERMARKING SCHEME (JPEW) WITHIN JPEG FRAMEWORK

    Get PDF
    Due to the rapid growth in internet and multimedia technologies, many new commercial applications like video on demand (VOD), pay-per-view and real-time multimedia broadcast etc, have emerged. To ensure the integrity and confidentiality of the multimedia content, the content is usually watermarked and then encrypted or vice versa. If the multimedia content needs to be watermarked and encrypted at the same time, the watermarking function needs to be performed first followed by encryption function. Hence, if the watermark needs to be extracted then the multimedia data needs to be decrypted first followed by extraction of the watermark. This results in large computational overhead. The solution provided in the literature for this problem is by using what is called partial encryption, in which media data are partitioned into two parts - one to be watermarked and the other is encrypted. In addition, some multimedia applications i.e. video on demand (VOD), Pay-TV, pay-per-view etc, allow multimedia content preview which involves „perceptual‟ encryption wherein all or some selected part of the content is, perceptually speaking, distorted with an encryption key. Up till now no joint perceptual encryption and watermarking scheme has been proposed in the literature. In this thesis, a novel Joint Perceptual Encryption and Watermarking (JPEW) scheme is proposed that is integrated within JPEG standard. The design of JPEW involves the design and development of both perceptual encryption and watermarking schemes that are integrated in JPEG and feasible within the „partial‟ encryption framework. The perceptual encryption scheme exploits the energy distribution of AC components and DC components bitplanes of continuous-tone images and is carried out by selectively encrypting these AC coefficients and DC components bitplanes. The encryption itself is based on a chaos-based permutation reported in an earlier work. Similarly, in contrast to the traditional watermarking schemes, the proposed watermarking scheme makes use of DC component of the image and it is carried out by selectively substituting certain bitplanes of DC components with watermark bits. vi ii Apart from the aforesaid JPEW, additional perceptual encryption scheme, integrated in JPEG, has also been proposed. The scheme is outside of joint framework and implements perceptual encryption on region of interest (ROI) by scrambling the DCT blocks of the chosen ROI. The performances of both, perceptual encryption and watermarking schemes are evaluated and compared with Quantization Index modulation (QIM) based watermarking scheme and reversible Histogram Spreading (RHS) based perceptual encryption scheme. The results show that the proposed watermarking scheme is imperceptible and robust, and suitable for authentication. Similarly, the proposed perceptual encryption scheme outperforms the RHS based scheme in terms of number of operations required to achieve a given level of perceptual encryption and provides control over the amount of perceptual encryption. The overall security of the JPEW has also been evaluated. Additionally, the performance of proposed separate perceptual encryption scheme has been thoroughly evaluated in terms of security and compression efficiency. The scheme is found to be simpler in implementation, have insignificant effect on compression ratios and provide more options for the selection of control factor

    Applications of MATLAB in Science and Engineering

    Get PDF
    The book consists of 24 chapters illustrating a wide range of areas where MATLAB tools are applied. These areas include mathematics, physics, chemistry and chemical engineering, mechanical engineering, biological (molecular biology) and medical sciences, communication and control systems, digital signal, image and video processing, system modeling and simulation. Many interesting problems have been included throughout the book, and its contents will be beneficial for students and professionals in wide areas of interest

    A NOVEL JOINT PERCEPTUAL ENCRYPTION AND WATERMARKING SCHEME (JPEW) WITHIN JPEG FRAMEWORK

    Get PDF
    Due to the rapid growth in internet and multimedia technologies, many new commercial applications like video on demand (VOD), pay-per-view and real-time multimedia broadcast etc, have emerged. To ensure the integrity and confidentiality of the multimedia content, the content is usually watermarked and then encrypted or vice versa. If the multimedia content needs to be watermarked and encrypted at the same time, the watermarking function needs to be performed first followed by encryption function. Hence, if the watermark needs to be extracted then the multimedia data needs to be decrypted first followed by extraction of the watermark. This results in large computational overhead. The solution provided in the literature for this problem is by using what is called partial encryption, in which media data are partitioned into two parts - one to be watermarked and the other is encrypted. In addition, some multimedia applications i.e. video on demand (VOD), Pay-TV, pay-per-view etc, allow multimedia content preview which involves „perceptual‟ encryption wherein all or some selected part of the content is, perceptually speaking, distorted with an encryption key. Up till now no joint perceptual encryption and watermarking scheme has been proposed in the literature. In this thesis, a novel Joint Perceptual Encryption and Watermarking (JPEW) scheme is proposed that is integrated within JPEG standard. The design of JPEW involves the design and development of both perceptual encryption and watermarking schemes that are integrated in JPEG and feasible within the „partial‟ encryption framework. The perceptual encryption scheme exploits the energy distribution of AC components and DC components bitplanes of continuous-tone images and is carried out by selectively encrypting these AC coefficients and DC components bitplanes. The encryption itself is based on a chaos-based permutation reported in an earlier work. Similarly, in contrast to the traditional watermarking schemes, the proposed watermarking scheme makes use of DC component of the image and it is carried out by selectively substituting certain bitplanes of DC components with watermark bits. vi ii Apart from the aforesaid JPEW, additional perceptual encryption scheme, integrated in JPEG, has also been proposed. The scheme is outside of joint framework and implements perceptual encryption on region of interest (ROI) by scrambling the DCT blocks of the chosen ROI. The performances of both, perceptual encryption and watermarking schemes are evaluated and compared with Quantization Index modulation (QIM) based watermarking scheme and reversible Histogram Spreading (RHS) based perceptual encryption scheme. The results show that the proposed watermarking scheme is imperceptible and robust, and suitable for authentication. Similarly, the proposed perceptual encryption scheme outperforms the RHS based scheme in terms of number of operations required to achieve a given level of perceptual encryption and provides control over the amount of perceptual encryption. The overall security of the JPEW has also been evaluated. Additionally, the performance of proposed separate perceptual encryption scheme has been thoroughly evaluated in terms of security and compression efficiency. The scheme is found to be simpler in implementation, have insignificant effect on compression ratios and provide more options for the selection of control factor
    corecore