55 research outputs found

    ROI Based Quality Access Control of Compressed Color Image using DWT via Lifting

    Get PDF
    Region-of-Interest (ROI) in an image or video signal contains important information and may be used for access control at various qualities using multiresolution analysis (MRA). This paper proposes a novel quality access control method of compressed color image by modulating the coefficients of ROI at various levels. Data modulation causes visual degradation in the original image and plays the key role in access control through reversible process. The modulation information, in the form of a secret key, is embedded in non-ROI part of the chrominance blue (Cb) channel of the color image using quantization index modulation (QIM). Lifting based DWT, rather than conventional DWT, is used to decompose the original image in order to achieve two-fold advantages, namely (1) better flexibility and low loss in image quality due to QIM and (2) better decoding reliability that leads to better access control. Only the authorized users having the full knowledge of the secret key restore the full quality of ROI. Simulation results duly support this claims

    Watermarking on Compressed Image: A New Perspective

    Get PDF

    Jointly Optimal RIS Placement and Power Allocation for Underlay D2D Communications: An Outage Probability Minimization Approach

    Full text link
    In this paper, we study underlay device-to-device (D2D) communication systems empowered by a reconfigurable intelligent surface (RIS) for cognitive cellular networks. Considering Rayleigh fading channels and the general case where there exist both the direct and RIS-enabled D2D channels, the outage probability (OP) of the D2D communication link is presented in closed-form. Next, for the considered RIS-empowered underlaid D2D system, we frame an OP minimization problem. We target the joint optimization of the transmit power at the D2D source and the RIS placement, under constraints on the transmit power at the D2D source and on the limited interference imposed on the cellular user for two RIS deployment topologies. Due to the coupled optimization variables, the formulated optimization problem is extremely intractable. We propose an equivalent transformation which we are able to solve analytically. In the transformed problem, an expression for the average value of the signal-to-interference-noise ratio (SINR) at the D2D receiver is derived in closed-form. Our theoretical derivations are corroborated through simulation results, and various system design insights are deduced. It is indicatively showcased that the proposed RIS-empowered underlaid D2D system design outperforms the benchmark semi-adaptive optimal power and optimal distance schemes, offering 44%44\% and 20%20\% performance improvement, respectively

    Measurements of branching fraction ratios and CP-asymmetries in suppressed B^- -> D(-> K^+ pi^-)K^- and B^- -> D(-> K^+ pi^-)pi^- decays

    Get PDF
    We report the first reconstruction in hadron collisions of the suppressed decays B^- -> D(-> K^+ pi^-)K^- and B^- -> D(-> K^+ pi^-)pi^-, sensitive to the CKM phase gamma, using data from 7 fb^-1 of integrated luminosity collected by the CDF II detector at the Tevatron collider. We reconstruct a signal for the B^- -> D(-> K^+ pi^-)K^- suppressed mode with a significance of 3.2 standard deviations, and measure the ratios of the suppressed to favored branching fractions R(K) = [22.0 \pm 8.6(stat)\pm 2.6(syst)]\times 10^-3, R^+(K) = [42.6\pm 13.7(stat)\pm 2.8(syst)]\times 10^-3, R^-(K)= [3.8\pm 10.3(stat)\pm 2.7(syst]\times 10^-3, as well as the direct CP-violating asymmetry A(K) = -0.82\pm 0.44(stat)\pm 0.09(syst) of this mode. Corresponding quantities for B^- -> D(-> K^+ pi^-)pi^- decay are also reported.Comment: 8 pages, 1 figure, accepted by Phys.Rev.D Rapid Communications for Publicatio
    • …
    corecore