2017
DOI: 10.17706/ijcee.2017.9.2.403-420
|View full text |Cite
|
Sign up to set email alerts
|

A New Lightweight and High Fault Tolerance Sobel Edge Detection Using Stochastic Computing

Abstract: Abstract:A new Stochastic Computing (SC) circuit design paradigm for image processing system is presented in this work. Two improved SC computational functions are derived, which are namely the stochastic scaled addition and stochastic absolute value of difference. Data correlation is also incorporated in the design for effective circuit size reduction without imposing accuracy degradation in the hardware implementations. The proposed SC functions are next employed to design the new and lightweight Sobel edge … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Table 1 compares the outlined schemes in the given research papers on the basis of the logic elements being used. A minimum area of 2059 slices is obtained by four stage pipelining of S‐box 5 which is implemented on Cyclone IVE. The 32‐bit datapath encryption method 7 covers an area of 2106 slices on TCMS 65 nm technology, while it was 2444 slices for a non‐pipelined style of implementation on Virtex‐7 18 .…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 1 compares the outlined schemes in the given research papers on the basis of the logic elements being used. A minimum area of 2059 slices is obtained by four stage pipelining of S‐box 5 which is implemented on Cyclone IVE. The 32‐bit datapath encryption method 7 covers an area of 2106 slices on TCMS 65 nm technology, while it was 2444 slices for a non‐pipelined style of implementation on Virtex‐7 18 .…”
Section: Resultsmentioning
confidence: 99%
“…It is ideal for both software and hardware applications that require low latency and good throughput as it is a highly secure algorithm due to usage of longer key lengths, enabling faster encryption. However, AES still needs attention for optimizing the algorithm further by establishing a trade-off between various parameters like area and throughput 4 ; rate of operation and area 5 ; speed and capacity 6 ; energy and power consumed 7 ; and finally data security and area. 8 In this paper, area metric is considered for optimization to reduce the size of processor on which the current AES is implemented.…”
Section: F I G U R E 1 Basic Cryptographic Processmentioning
confidence: 99%
See 1 more Smart Citation
“…(Latifi) The following activities are required: SubByte transformation: AES uses 128-bit data blocks; therefore, each database item is 16 bytes. The Rijndael S-box, which has an 8-bit resolution, is used to turn each data record entity into a distinct type of data (Wong et al, 2018). First, the data in the remaining three rows of the state are shifted from one cycle to another using the ShiftRows transformation.…”
Section: Introductionmentioning
confidence: 99%