Explore chapters and articles related to this topic
Wafer-Scale Rapid Electronic Systems Prototyping Platform
Published in Laurent A. Francis, Krzysztof Iniewski, Novel Advances in Microsystems Technologies and Their Applications, 2017
Mikaël Guillemot, Hai Nguyen, Mohammed Bougataya, Yves Blaquière, Ahmed Lakhssassi, Mary Shields, Yvon Savaria
As previously stated, each WaferIC™ reticule is configured using a JTAG-based serial protocol. The JTAG bitstream is compressed and encapsulated into frames and forwarded through the BottomPCB, to each PowerBlock’s field-programmable gate array (FPGA) from which they are uncompressed and then sent to WaferIC™ (Figure 4.5). The WaferIC™ configuration is carried out, reticule by reticule, and processed in two steps. At first, a JTAG configuration path is constructed, then the WaferIC™ configuration registers are set. Each PowerBlock is independent of the others, which allows for parallel configurations. When a particular JTAG configuration path is diagnosed as defective, a different path can be set up or the reticule can be configured from any adjacent functional reticule. Defect tolerance is effectively a must for wafer-scale circuits. This redundancy feature provides a great flexibility to operate the proposed platform and is automatically handled by the communication mechanism in order to make it transparent to users and developers.
Digital Watermarking Fundamentals
Published in Frank Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, 2017
Substitutive watermarking in the spatial domain is the simplest watermarking algorithm [3,4]. Basically, the embedding locations, such as the specific bits of all pixels, are predefined before watermark embedding. Once the recipient obtains the watermarked image, they know the exact locations from which to extract the watermark. During the watermark-embedding procedure, the watermark is first converted into a bitstream. Then, each bit of the bitstream is embedded into the specific bit of the selected locations for the host image. Figure 4.1 shows an example of substitutive watermarking in the spatial domain, in which there are three least-significant-bit (LSB) substitutions performed (i.e., embedding 1, 0, and 1 into 50, 50, and 48, respectively).
Digital Watermarking Fundamentals
Published in Frank Y. Shin, Digital Watermarking and Steganography, 2017
Substitution watermarking in the spatial domain is the simplest watermarking algorithm [3, 4]. Basically, the embedding locations, such as the specific bits of all pixels, are predefined before watermark embedding. Once the recipient obtains the watermarked image, she knows the exact locations from which to extract the watermark. During the watermark embedding procedure, the watermark is first converted into a bitstream. Then, each bit of the bitstream is embedded into the specific bit of selected locations for the host image. Figure 4.1 shows an example of substitution watermarking in the spatial domain, in which there are three least-significant-bit (LSB) substitutions performed (i.e., embedding 1, 0, and 1 into 50, 50 and 48, respectively).
FPGA Implementation of True Random Number Generator Architecture Using All Digital Phase-Locked Loop
Published in IETE Journal of Research, 2022
Huirem Bharat Meitei, Manoj Kumar
The quality of the random number produced by the proposed design is assessed by a set of statistic tests. Digital Oscilloscope (DSO-X3012A) has been used to capture the generated output waveform and FFT waveform of the random bitstream and to analyze the Jitter produced from the different entropy source. To evaluate the randomness of the output data generated, we collect the data sequence of output Random bitstream. The statistical analysis of the generated bitstream is done by using the NIST suite (SP 800-22). ND-1 (Single ADPLL) design takes a data path delay of 1.469 ns producing a maximum frequency of 680.7 MHz which generates an overall throughput of 680.7Mbps. But ND-2 (Two ADPLL) design allowed a data path delay of 1.479 ns with a maximum frequency of 676 MHz that produced a throughput of 676 Mbps. For NIST test a P-value greater than or equal to 0.001 of a sequence is considered as a pass with a randomness confidence level of 99.9% [23]. NIST test of the proposed TRNG is shown in Table 2 for ND-1 (single ADPLL) and Table 3 for ND-2 (Two ADPLL) confirms that the generated sequence is Random data sequence.
High-capacity separable reversible data-Hiding method in encrypted images based on block-level encryption and Huffman compression coding
Published in Connection Science, 2021
Kai-Meng Chen, Chin-Chen Chang
After compression, the contents of the 8th bit-plane are replaced with the record of the bit-planes that are compressed, the auxiliary information of the Huffman codewords for the 8th bit-plane, and the compressed bitstream of the 8th bit-plane. The content of the other compressed bit-planes are replaced with the auxiliary information of their own Huffman codewords and the compressed bitstream. The auxiliary information of the Huffman codewords is constructed as, where refer to the Huffman codewords of the symbols “0000”, “0001”, … , “1111” and is the length of . To achieve more embedding space, the data hider can consider further compressing the auxiliary information by a bit stream compression algorithm.
Optimal weighed Holoentropy for video compression: an advanced HEVC
Published in The Imaging Science Journal, 2020
K. Santhakumar, P. Ranjith kumar
The major motivation of the digital video coding standard is the optimization aspect of coding efficacy. The efficiency in coding is nothing but the capability of a coding standard for minimizing the bit rate, which denotes a video content with the required quality level of the video. Further, it is determined as the capability of the coding standard to increase the video quality with a restricted bit rate. The foremost version of High-Efficiency Video HEVC standard [24] is accepted as ISO/IEC 23008-2 as well as ITU-T H.265 as the initial motive and later the extension is carried out to make them capable on various broad new applications. In fact, the elder version of the HEVC standard has its better scope; however, the model hasn’t given much significance on the key features on core element design. The current work intends to divide under three areas: the scalability extensions, the range extensions, and the 3D video extensions. Here, both the colour sampling format, as well as bit depth ranges, are enlarged. This also spots the performance of screen-content coding, high-quality coding along with the lossless coding. The extension of scalability permits the usability of embedded bitstream subsets that represent in the form of minimal-bit-rate. Both the stereoscopic as well as multi-view representations get maximized through the extension of 3D video in terms of depth maps as well as view-synthesis methodologies [25].