Version-1 (Jan-Feb 2017)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | Optimized linear spatial filters implemented in FPGA |
Country | : | Bulgaria |
Authors | : | Ivan Kanev || Petya Pavlova |
: | 10.9790/4200-0701010107 |
ABSTRACT: Linear spatial filters (LSF) are used for filtering of digital images with the purpose of blurring, noise reduction, detail enhancement etc. The realization of LSF confronts the capital problem of a lot of operations needed for their computation. In this paper, described is an approach for optimizing of LSF by utilizing parallel algorithms and their hardware implementation on FPGA. A model and an algorithm based on partial sums and aimed at calculating the filtered pixels are presented. Defined are criteria for comparing of the different types of linear filters............
Keywords: DSP, FPGA, Linear Spatial Filtering, Partial Sum, VHDL
[1] Gonzalez R., Woods R., Digital Image Processing, third edition, Prentice Hall, 2012.
[2] Uwe Meyer-Baese, Digital Signal Processing with Field Programmable Gate Arrays (FPGA), 4th Edition, Springer 2014.
[3] Jackson L., Digital Filters and Signal Processing, with MATLAB Exercises, 3rd Edition, Springer 2010.
[4] Salunkhe A., Bombale U., Optimized Implementation of Edge Preserving Color Guided Filter for Video on FPGA, IOSR Journal
of VLSI and Signal Processing , e-ISSN: 2319 – 4200, Volume 5, Issue 6, Ver. I (Nov -Dec. 2015), PP 27-33
[5] Bailey D., Design for Embedded Image Processing on FPGAs, First Edition, John Wiley & Sons (Asia) Pte Ltd., 2011
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)'s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris............
Keywords: Iris Recognition, EMD, FFT, ROI, ED and Fusion
[1] Ya-Ping Huang, Si-Wei Luo and En-Yi Chen, "An Efficient Iris Recognition System," IEEE International Conference on Machine Learning and Cybernetics, vol. 1, pp. 450–454, November 2002.
[2] C. Tisse, L. Martin, L. Torres and M. Robert, "Person Identification Technique using Human Iris Recognition," IEEE International Conference on Vision Interface, vol. 4, pp. 33 - 36, 2004.
[3] J. Daugman, "How Iris Recognition Works," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 14, pp. 21-30, 2004.
[4] Hui Zheng and Fei Su, "An Improved Iris Recognition System Based on Gabor Filters," IEEE International Conference on Network Infrastructure and Digital Content, pp. 823-827, 2009.
[5] Lahouari Ghouti and Fares S. Al-Qunaieer, "Color Iris Recognition Using Quaternion Phase Correlation," IEEE Symposium on Bio-Inspired Learning and Intelligent Systems for Security, pp. 20-25, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Development of Personal Weather Report for Home Security |
Country | : | India |
Authors | : | Richa Gupta || Dhruv Garg |
: | 10.9790/4200-0701011619 |
ABSTRACT: With the fast growing technology, it is a great need to get to know about our surrounding weather parameters (temperature, humidity, atmospheric pressure, gas and light intensity) for better development of living community. A complete weather report can easily access the rarest and the farthest information at one's own fingertips. It is based on IoT (Internet of Things), which is an emerging field in which all the devices are connected to a channel and collect the data to gather a complete information through a personnel devices. It is generally used to view the weather parameters............
Keywords: API keys, AT commands, IoT
[1]. Brown, Eric (13 September 2016). "Who Needs the Internet of Things?". Linux.com. Retrieved 23 October 2016.
[2]. Brown, Eric (20 September 2016). "21 Open Source Projects for IoT". Linux.com. Retrieved 23 October 2016.
[3]. "Internet of Things Global Standards Initiative". ITU. Retrieved 26 June 2015.
[4]. "Internet of Things: Science Fiction or Business Fact?" (PDF). Harvard Business Review. November 2014. Retrieved 23 October 2016.
[5]. Evans, Dave. "The Internet of Things: How the Next Evolution of the Internet Is Changing Everything" (PDF). (April 2011) Cisco. Retrieved 15 February 2016.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Multiresolution SVD based Image Fusion |
Country | : | India |
Authors | : | Dr. G.A.E. Satish Kumar || Jaya Krishna Sunkara |
: | 10.9790/4200-0701012027 |
ABSTRACT: Image fusion is the process of combining two or more images with specific objects with more precision. It is very common that when one object is focused remaining objects will be less highlighted. To get an image highlighted in all areas, a different means is necessary. This is done by the Image Fusion. In remote sensing, the increasing availability of Space borne images and synthetic aperture radar images gives a motivation to different kinds of image fusion algorithms. In the literature a number of time domain image fusion techniques are available............
Keywords: Image fusion, Laplacian Pyramid, SVD, Wavelet.
[1] Pajares, Gonzalo & Manuel, Jesus de la Cruz, A wavelet based image fusion tutorial, Pattern Recognition, 37, 1855-872, 2007.
[2] Varsheny, P.K., Multi-sensor data fusion, Elec. Comm. Engg., Journal, 9(12), 245-53, 1997.
[3] Burt, P.J. & Lolczynski, R.J. Enhanced image capture through fusion, Proc. of 4th International Conference on Computer Vision, Berlin, Germany, 173-82, 1993.
[4] Mallet, S.G. A theory for multiresolution signal decomposition: The wavelet representation. IEEE Trans. Pattern Anal. Mach. Intel., 11(7), 674-93, 1989.
[5] Wang, H.; Peng, J. & W. Wu. Fusion algorithm for multi-sensor image based on discrete multiwavelet transform, IEEE Pro. Vis. Image Signal Process, 149(5), 2002.
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: Most of the digital image processing application uses various domain transformation technique to convert time domain information to transform domain which will help to simplify the mathematical modeling. Discrete Wavelet Transform is one of the best transformation techniques. The time-frequency resolution makes this transform sensitive to both time and frequency which will give very good compression and decompression. In this paper, we propose FPGA implementation............
Keywords: CDF-5/3, Digital Filters, FPGA Implementation, Image Processing and Wavelet Transform etc.
[1] Tinku Acharya and Chaitali Chakrabarti, "A Survey on Lifting-Based Discrete Wavelet Transform Architectures", International Journal of VLSI Signal Processing, Springer, Vol. 42, pp. 321–339, 2006.
[2] Kishore Andra, Chaitali Chakrabarti and Tinku Acharya, "A VLSI Architecture for Lifting-Based Forward and Inverse Wavelet Transform", IEEE Transaction on Signal Processing, Vol. 50, No. 4, pp. 966–977, April 2002.
[3] H. Liao, M. K. Mandal and B. F. Cockburn, "Efficient Architectures for 1-D and 2-D Lifting-Based Wavelet Transforms", IEEE Transaction on Signal Processing, Vol. 52, No. 5, pp. 1315–1326, May 2004.
[4] S. Barua, J. E. Carletta, K. A. Kotteri and A. E. Bell, "An Efficient Architecture for Lifting-Based Two-Dimensional Discrete Wavelet Transform", Integration VLSI Journal, Vol. 38, No. 3, pp. 341–352, 2005
[5] Maria E. Angelopoulou, Peter Y.K. Cheung, Konstantions and Yiannis Andreopouos, "Implementation and Comparison of the 5/3 Lifting 2D Discrete Wavelet Transform Computation Schedules on FPGAs", International Journal of Signal Processing Systems, Springer, Vol.51, pp. 3–21, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Hybrid Steganography Technique Based On LSBMR And OPAP |
Country | : | India |
Authors | : | Varun sangwan |
: | 10.9790/4200-0701013337 |
ABSTRACT: This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study.
Keywords: Steganography, imperceptibility, least-significant-bit matching revisited (LSBMR), Optimal-pixel-adjustment process (OPAP).
[1] F. Petitcolas, R. Anderson, and M. Kuhn, "Information hiding- a survey," Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078, 1999.
[2] C.K. Chan, L.M. Cheng, "Hiding data in image by simple LSB substitution", pattern recognition, vol. 37, no. 3, 2004, pp. 469-474.
[3] J. Mielikainen, "LSB matching revisited," IEEE Signal Process. Lett., vol. 13, no. 5, 2006, pp. 285-287.
[4] D. C. Wu and W. H. Tsai, "A steganographic method for images by pixel-value-differencing," Pattern Recognit. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003.
[5] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, "Image steganographic scheme based on pixel-value-differencing and LSB replacement methods," Proc. Inst. Elect. Eng.,Vis. Images Signal Process., vol. 152, no. 5, pp. 611-615, 2005.
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations.
Keywords: Pixel-value differencing (PVD), imperceptibility, steganography, PSNR, HVS, least significant bit (LSB) substitution.
[1]. F. Petitcolas, R. Anderson, M. Kuhn, "Information hiding - a survey", Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078,1999.
[2]. A.A.J. Altaay, S. bin Sahib, M. zamani, "An introduction to image steganography techniques," Int. Conf. Advanced Computer Science Applications and Technologies, pp. 122-126, 2012.
[3]. C.K.Chan, L.M. Cheng, " Hiding data in image by simple LSB substitution", pattern recognition, vol. 37, no. 3, pp. 469-474, 2004.
[4]. M. Khodaei, K. Faez, "New adaptive steganographic method using least-significant- bit substitution and pixel value differencing," IET Image Process.,vol.6, iss.6, pp. 677-686, 2012.
[5]. H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods", IEE Proc.Vis. Image SignalProcess., vol. 152, no. 5, pp. 611-615, 2005.
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: In Cooley–Tukey algorithm the Radix-2 decimation-in-time Fast Fourier Transform is the easiest form. The Fast Fourier Transform is the mostly used in digital signal processing algorithms. Discrete Fourier Transform (DFT) is computing by the FFT. DFT is used to convert a time domain signal into its frequency spectrum domain. FFT algorithm use many applications for example, OFDM, Noise reduction, Digital audio broadcasting, Digital video broadcasting. It's used to design butterflies for different point FFT. In this paper given to design and power measurement 2 and 8 point FFT by using VHDL. Simulation and synthesis of design is done using Xilinx ISE 14.2.
Keywords: Fast Fourier transform (FFT),Discrete Fourier transform (DFT), DIT, Radix-2, VHDL, FPGA.
[1]. Harpreet Kaur , Tarandip Singh ‗Design and Simulation of 32-Point FFT Using Mixed Radix Algorithm for FPGA Implementation International Journal of Engineering Trends and Applications (IJETA) – Volume 2 Issue 3, May-June 2015.
[2]. Remya Ramachandran,Vanmathi.k―simulation of radix-2 fast fourier transform using Xilinx‖ Remya Ramachandran et al. / International Journal of Computer Science Engineering (IJCSE) ISSN
[3]. Waqar Hussain, Tapani Ahonen, Roberto Airoldi, Jari Nurmi ―Energy and Power Estimation of Coarse-Grain Reconfigurable Array based Fast Fourier Transform Accelerators‖ 2012 - ieeexplore.ieee.org
[4]. Prof.Vaishali Tehre Pooja pantwane ―Low power coarse grain architecture for SoC‖ International conference on Quality up-gradating in engineering ,science & Technology (ICQUEST-2016).
[5]. Alan V. Oppenheim, Ronald W. Schafer, and John R. Buck, Discrete-Time Signal Processing, 2nd edition (Upper Saddle River, NJ: Prentice Hall, 1989)
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: Restoration process of the holes resulting from insects damage is one of the most difficult things in front of the conservators during the restoration process. conservators were either replace the damaged wood by insects or restore it with mixture of filler and mineral Oxides. However, this paper discusses using the new mixture consisted of (Beva 371, medical cotton filler, Haematoxylin dye) to complete holes which caused by damage insects and were found in sabil Al Kazlar in Cairo. So this paper used some methods of examination and different analysis which represented in (naked eye - Optical microscope............
Keywords: Dye, Blood wood, Restoration, Sabil Al Kazlar, Ottoman Period
[1]. Abdel Magid,A. Plant Atlas of Botanigal gardens in Cairo and Giza, General counsel, Cairo Egypt,2004,p.229.
[2]. Derrick,M.,et.al.Infrared Spectroscopy in Conservation Science, The Getty Conservation Institute,Los Angeles,USA,1999.P.32.
[3]. Elsonbaty,A., Treatment of Wood Against Biodeterioration, Ph. D. degree, Cracow University of Economic-Faculty of Commodity Science,Cracow – Poland,1997,P.13.,P.101.
[4]. Ibrahim,S.,et.al,Statical Method for Determining the Levelness Parameters of Different Colour Polymeric Fabrics,International Journal of Chemistry,Vol.3,No.3;2011,P.11.
[5]. Kaszowska,Z.,et.al, Modern Chemical imaging techniques in the analysis of paint cross-sections,Interdisciplinary Resarch on the Works of Art, edited by Justyna Olszewska -Swietlik, Joanna M. Arsynska Szmelter – Fausek,Torun,2012.
- Citation
- Abstract
- Reference
- Full PDF
ABSTRACT: The first aid has been applied on a mummy cover of colored cartonnage, with a detailed study of its components. The cover was found in Saqqara area, belongs back to the Late Age, and has been stored in Saqqara warehouses since 2010.The first aid is represented in mechanical cleaning and initial sterilization using transparent ethyl alcohol, as well as making a new holder for initial conservation of the Mummy cartonnage cover until conducting the final restoration processes. The study of the mummy cartonnage cover components was applied using optical..............
[1]. Aceto,M.,et.al.,Thecartonnage on papyrus plasters , colors and inks excavations of museoegizio of turinat at Assiut (1905-1910),4th international congress on (science and technology) for the safuard of cultural heritage in the mediterraneans Basin Vol.II,Cairo ,Egypt , p.530
[2]. Aceto,M.,et.al., the pigments of Egyptians blue and green ,new research and analysis at the museoEglizio of torino,4th international congress on (science and technology) for the safuard of cultural heritage in the mediterraneans Basin Vol.II,Cairo ,Egypt ,2009, p.552.
[3]. Acton,K.,et.al.Stabilising stuff A Guide for conservaing Archaeological finds in the field .Heritage council, NSW, 2012,p.19.
[4]. Ali,N., Study of Deterioration and Degradation of Overlaid Wooden Doors in Ottoman Caravansary in Bulaq ,Cairo , Egypt EJARS,VOL.1,ISSUE.2,2011,p.34.
[5]. Amin,E.,&Rashed,S.,Preservation and restoration of a piece of textile at the Egyptian textile museum,vol.3,ISSUE .1,2013,p.33.