2003 IEEE International Solid-State Circuits Conference, 2003. Digest of Technical Papers. ISSCC. 2003
DOI: 10.1109/isscc.2003.1234201
|View full text |Cite
|
Sign up to set email alerts
|

Image processor capable of block-noise-free JPEG2000 compression with 30 frames/s for digital camera applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2004
2004
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(19 citation statements)
references
References 1 publication
0
19
0
Order By: Relevance
“…Different from other implementations using quantization method such as [10], the proposed architecture adopts the truncation method in order to obtain three targets: 1)…”
Section: B the Experimental Results And Fpga Verification Of Ebcot Amentioning
confidence: 99%
See 1 more Smart Citation
“…Different from other implementations using quantization method such as [10], the proposed architecture adopts the truncation method in order to obtain three targets: 1)…”
Section: B the Experimental Results And Fpga Verification Of Ebcot Amentioning
confidence: 99%
“…These three targets are achieved at a sacrifice of the amount of computational efforts which put impedance on high throughput, for example, the throughput of this encoder (5.3Mbits/(MHz·s)) is a bit lower than H. Yamauchi [10] (720*480*16*30/27=6.1Mbits/(MHz·s)). However, compared with quantization method which reduces the entropy of wavelet coefficients before AE, implicit quantization adopted by this architecture leaves much more details and room for truncation to control the quality.…”
Section: B the Experimental Results And Fpga Verification Of Ebcot Amentioning
confidence: 99%
“…Instead, we can retransmit the required data at the block boundary from the frame memory. The block-based scheme in [12] is generalized to the overlapped block-based scan method, as shown in Fig. 10(b), where .…”
Section: ) Nonoverlappedmentioning
confidence: 99%
“…Instead, we can retransmit the required data at the block boundary from the frame memory. The block-based scheme in [9] is generalized to the overlapped block-based scan method as shown in Fig. 1(b), where…”
Section: Non-overlapped and Overlapped Block-based Scanmentioning
confidence: 99%
“…However, the internal buffer would occupy much die area. Many 2-D DWT architectures using different memory structures have been proposed [6,7,8,9,10]. In this paper, we discuss two independent issues of the 2-D DWT architectures.…”
Section: Introductionmentioning
confidence: 99%