2015
DOI: 10.1186/s13640-015-0088-z
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of computation-reduced DCT using a novel method

Abstract: The discrete cosine transform (DCT) performs a very important role in the application of lossy compression for representing the pixel values of an image using lesser number of coefficients. Recently, many algorithms have been devised to compute DCT. In the initial stage of image compression, the image is generally subdivided into smaller subblocks, and these subblocks are converted into DCT coefficients. In this paper, we present a novel DCT architecture that reduces the power consumption by decreasing the com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Security is essential for the application, for example, battlefield, environmental observation, and smart home to be executed. To ensure the data security of WSN, it is important to recognize nodes [21][22]. In any case, it is a test for the nodes to run encryption calculations and store information because of the restricted computational capacity and resources.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Security is essential for the application, for example, battlefield, environmental observation, and smart home to be executed. To ensure the data security of WSN, it is important to recognize nodes [21][22]. In any case, it is a test for the nodes to run encryption calculations and store information because of the restricted computational capacity and resources.…”
Section: Related Workmentioning
confidence: 99%
“…Compare to the Rivest-Shamir-Adleman (RSA), Advanced Encryption Standards (AES) takes lesser time and gives better security than Secure Hash Algorithms (SHA) [20]. To reduce the power consumption altering the data path is suggested several multipliers reduced in [22]. To prove the hardware efficiency the architecture can be implemented in a field-programmable gate array [23].…”
Section: Related Workmentioning
confidence: 99%