Digital Media Processing: DSP Algorithms Using C

Digital Media Processing: DSP Algorithms Using C

Hazarathaiah Malepati

Language: English

Pages: 768

ISBN: 1856176789

Format: PDF / Kindle (mobi) / ePub

Multimedia processing demands efficient programming in order to optimize functionality. Data, image, audio, and video processing, some or all of which are present in all electronic devices today, are complex programming environments. Optimized algorithms (step-by-step directions) are difficult to create but can make all the difference when developing a new application.

This book discusses the most current algorithms available that will maximize your programming keeping in mind the memory and real-time constraints of the architecture with which you are working. A wide range of algorithms is covered detailing basic and advanced multimedia implementations, along with, cryptography, compression, and data error correction. The general implementation concepts can be integrated into many architectures that you find yourself working with on a specific project. Analog Devices' BlackFin technology is used for examples throughout the book.

*Discusses how to decrease algorithm development times to streamline your programming
*Covers all the latest algorithms needed for contrained systems
*Includes case studies on WiMAX, GPS, and portable media players

Programming Language Pragmatics (3rd Edition)

Understanding and Using C Pointers

Optimization Techniques for Solving Complex Problems (Wiley Series on Parallel and Distributed Computing)

Machine Learning: The Art and Science of Algorithms that Make Sense of Data

Real-Time Collision Detection













up to 2T errors if we know 2T error locations in advance. How come we know error locations at the receiver in advance? Well, in some receivers using upper layer error check on received data, we can know the error locations. For example, in the DVB-H receivers, the MPE-FEC module (see Section 17.4) design provides the erasure information and allows us to correct up to 2T errors using the RS decoder. We discuss a simple system that generates erasure information for us. Assume that the data is

simulation code for the DES cipher and DES inverse ciphers are given in Pcodes 2.10 and 2.11, respectively. DES Initial Permutation The simulation techniques used for DES initial permutation (IP) is the same as the techniques used for simulating PC-1 function. In IP we permute all 64 input bits and output as 64 permuted bits (unlike in PC-1, where we eliminate the redundant bits from input). The simulation code for IP is given in Pcode 2.12. See Section 2.2.3, DES Simulation Results, for IP

m1 m0 m3 S = M ·S ⎡ ⎤ ⎡ ⎤ ⎡ ⎤ ⎤ ⎡ ⎤ ⎡ ⎤ m3 m1 m2 m3 s0 m0 ⎢m 0 ⎥ ⎢m 1 ⎥ ⎢m 2 ⎥ ⎢ s1 ⎥ ⎢ m 3 ⎥ m2⎥ ⎥·⎢ ⎥ = ⎢ ⎥·s ⊕⎢ ⎥·s ⊕⎢ ⎥·s ⊕⎢ ⎥ m 1 ⎦ ⎣s2 ⎦ ⎣m 2 ⎦ 0 ⎣m 3 ⎦ 1 ⎣m 0 ⎦ 2 ⎣m 1 ⎦ m0 s3 m1 m2 m3 m0 We precompute L i for 0 ≤ i ≤ 3 (Galois field multiplication, · , of si with first column of M) as follows, and store it in memory. L i = {m 0 } · si | {m 3 } · si | {m 2 } · si | {m 1 } · si Now, to compute the mix column transformation for one column of state, we load L i for 0 ≤ i ≤ 3 from memory

Information Processing Standards, 2001), we consume the same number of cycles for decryption of 128 bits of cipher text. We can use the same Pcode 2.27 for the AES inverse-cipher (i.e., for the equivalent inverse cipher) loop as well by simply changing the SR code (as ISR and SR are inversely related) and properly accessing the expanded key data (as the inverse cipher uses keys from the end of the expanded key buffer). We use the sbmc[ ] and isbmc[ ] look-up table in the cipher and inverse

storage capacity, and computing power, are enabling an increasing number of video applications. Digitized video has played an important role in many consumer electronics applications, including DVD, portable media players, HDTV, video telephony, video conferencing, Internet video streaming, and distance learning, among others. As we move to high-definition video, the computing bandwidth required to process video increases manyfold, and more than 80% of total available embedded processor computing

Download sample