Block-Level Discrete Cosine Transform Coefficients for Autonomic Face Recognition Willie L

Total Page:16

File Type:pdf, Size:1020Kb

Block-Level Discrete Cosine Transform Coefficients for Autonomic Face Recognition Willie L Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2003 Block-level discrete cosine transform coefficients for autonomic face recognition Willie L. Scott, II Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the Engineering Science and Materials Commons Recommended Citation Scott, II, Willie L., "Block-level discrete cosine transform coefficients for autonomic face recognition" (2003). LSU Doctoral Dissertations. 4059. https://digitalcommons.lsu.edu/gradschool_dissertations/4059 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. BLOCK-LEVEL DISCRETE COSINE TRANSFORM COEFFICIENTS FOR AUTONOMIC FACE RECOGNITION A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Interdepartmental Program in Engineering Science by Willie L. Scott, II B.S., Louisiana State University, 1998 M.S., Louisiana State University, 2001 May 2003 ACKNOWLEDGEMENTS First and foremost, I would like to thank God for blessing me to complete my research; without His divine help, I would have never made it this far. I would like to express my sincere appreciation and thanks to my advisor and major professor, Dr. Subhash Kak, for his constant guidance and valuable comments, without which, this dissertation would not have been successfully completed. My gratitude also goes out to Dr. Jianhua Chen, Dr. Gerald Knapp, and Dr. Suresh Rai, for serving on my defense committee, and special thanks to Dr. Donald Kraft for his willingness to lend a hand. I also wish to thank the members of my family, my caring mom, my encouraging dad, and my cool little brother, for always being there for me and motivating me to stay focused. Last but certainly not least, I want to thank Michele for always being very supportive and reminding me that everything would turn out fine. ii TABLE OF CONTENTS ACKNOWLEDGEMENTS.................................................................................... ii LIST OF TABLES................................................................................................. vi LIST OF FIGURES .............................................................................................. vii ABSTRACT........................................................................................................... ix CHAPTER 1. INTRODUCTION ...........................................................................1 1.1 Network of Networks Model ......................................................................1 1.2 Hierarchical Processing of Face Images in the Human Vision System.......7 1.2.1 The Human Capacity for Face Recognition........................................8 1.2.2 Spatial Vision......................................................................................9 1.2.3 The Contrast Sensitivity Function ......................................................9 1.2.4 Channels............................................................................................11 1.2.5 Interaction of Channels in Human Vision ........................................16 1.3 Image Transforms ......................................................................................18 1.3.1 Discrete Fourier Transform...............................................................21 1.3.2 Karhunen-Loeve Transform..............................................................22 1.3.3 The Discrete Cosine Transform........................................................24 1.3.3.1 One-dimensional DCT.........................................................27 1.3.3.2 Two-dimensional DCT ........................................................28 1.3.3.3 JPEG Compression ..............................................................29 1.3.3.4 MPEG Compression ............................................................31 1.4 Summary....................................................................................................32 CHAPTER 2. FACE RECOGNITION AS PATTERN RECOGNITION ...........33 2.1 Introduction................................................................................................33 2.2 A General Probabilistic Framework ..........................................................36 2.2.1 Subtasks of Face Recognition...........................................................36 2.2.1.1 Face Classification Tasks......................................................36 2.2.1.2 Face Verification Tasks ........................................................37 2.2.2 Functional Modules ..........................................................................38 2.2.3 Feature Extraction.............................................................................38 2.2.4 Pattern Recognition...........................................................................39 2.3 Groundwork and Literature Review ..........................................................40 2.3.1 Introduction.......................................................................................40 2.3.2 Segmentation.....................................................................................40 2.3.3 Recognition.......................................................................................43 2.3.3.1 Introduction...........................................................................43 2.3.3.2 Classical Approaches............................................................44 2.3.3.3 Feature Based Approaches....................................................45 iii 2.3.3.4 Neural Network Approaches.................................................46 2.3.3.5 Statistical Approaches...........................................................50 2.4 Summary....................................................................................................53 CHAPTER 3. RECENT RESEARCH IN FACE RECOGNITION .....................55 3.1 Introduction................................................................................................55 3.2 AT&T Cambridge Laboratories Face Database ........................................55 3.3 Comparison of Results...............................................................................56 3.4 Discussion..................................................................................................57 3.4.1 Methods.............................................................................................57 3.4.2 Biological Motivation .......................................................................62 3.5 Summary....................................................................................................63 CHAPTER 4. FEATURE SPACES......................................................................64 4.1 Feature Vectors and Related Topics ..........................................................64 4.1.1 Introduction.......................................................................................64 4.1.2 Features.............................................................................................65 4.1.3 Feature Selection and Extraction ......................................................66 4.1.4 Dimension Minimization ..................................................................68 4.1.5 Non-linear Features...........................................................................71 4.1.6 Motivation for DCT-based Features in the NoN Approach..............72 4.2 Network of Networks Hierarchical Clustering ..........................................73 4.3 Summary..........................................................................................................75 CHAPTER 5. TWO-LEVEL DCT COEFFICIENT BASED NoN SYSTEM.....76 5.1 Introduction................................................................................................76 5.2 NoN Face Recognition System Description ..............................................76 5.3 DCT Use in Related Areas.........................................................................78 5.3.1 DCT in Face Recognition .................................................................78 5.3.2 DCT in Text Region Location ..........................................................79 5.4 Motivation for Block-level DCT Coefficients in the NoN System ...........80 5.4.1 Analogy with Biological Processing of Faces by Humans...............80 5.4.2 Existing Efficient Algorithms for the DCT ......................................83 5.5 Level 1: Nested Family of Locally Operating Networks...........................85 5.5.1 Properties of Algorithms...................................................................85 5.5.2 Biologically Motivated Algorithms ..................................................86 5.5.2.1 Direct Accumulation.............................................................87 5.5.2.2 Direct Accumulation with Averaging...................................88 5.5.2.3 Average Absolute Deviation.................................................89 5.6 Level 2: Hierarchically Superior Backpropagation Network ...................90 5.6.1 Backpropagation ...............................................................................90
Recommended publications
  • Title: Communicating with Light: from Telephony to Cell Phones Revision
    Title: Communicating with Light: From Telephony to Cell Phones Revision: February 1, 2006 Authors: Jim Overhiser, Luat Vuong Appropriate Physics, Grades 9-12 Level: Abstract: This series of six station activities introduces the physics of transmitting "voice" information using electromagnetic signals or light. Students explore how light can be modulated to encode voice information using a simple version of Bell's original photophone. They observe the decrease of the intensity of open-air signals by increasing the distance between source and receiver, and learn the advantage of using materials with different indices of refraction to manipulate and guide light signals. Finally, students are introduced to the concept of bandwidth by using two different wavelengths of light to send two signals at the same time. Special Kit available on loan from CIPT lending library. Equipment: Time Required: Two 80-minute periods NY Standards 4.1b Energy may be converted among mechanical, electromagnetic, Met: nuclear, and thermal forms 4.1j Energy may be stored in electric or magnetic fields. This energy may be transferred through conductors or space and may be converted to other forms of energy. 4.3b Waves carry energy and information without transferring mass. This energy may be carried by pulses or periodic waves. 4.3i When a wave moves from one medium into another, the waves may refract due a change in speed. The angle of refraction depends on the angle of incidence and the property of the medium. 4.3h When a wave strikes a boundary between two media, reflection, transmission, and absorption occur. A transmitted wave may be refracted.
    [Show full text]
  • IP Telephony Fundamentals: What You Need to Know to “Go to Market”
    IP Telephony Fundamentals: What You Need to Know to “Go To Market” Ken Agress Senior Consultant PlanNet Consulting What Will Be Covered • What is Voice over IP? • VoIP Technology Basics • How Do I Know if We’re Ready? • What “Real” Cost Savings Should I Expect? • Putting it All Together • Conclusion, Q&A 2 What is Voice Over IP? • The Simple Answer – It’s your “traditional” voice services transported across a common IP infrastructure. • The Real Answer – It’s the convergence of numerous protocols, components, and requirements that must be balanced to provide a quality voice experience. 3 Recognize the Reality of IP Telephony • IP is the catalyst for convergence of technology and organizations • There are few plan templates for convergence projects • Everybody seems to have a strong opinion • Requires an educational investment in the technology (learning curve) – Requires an up-front investment in the technology that can be leveraged for subsequent deployments • Surveys indicate deployment is usually more difficult than anticipated • Most implementations are event driven (that means there is a broader plan) 4 IP Telephony vs. VoIP • Voice over IP – A broad technology that encompasses many, many facets. • IP Telephony – What you’re going to implement to actually deliver services across your network – Focuses more on features than possibilities – Narrows focus to specific implementations and requirements – Sets appropriate context for discussions 5 Why Does Convergence Matter? • Converged networks provide a means to simplify support structures and staffing. • Converged networks create new opportunities for a “richer” communications environment – Improved Unified Messaging – Unified Communications – The Promise of Video • Converged networks provide methods to reduce costs (if you do things right) 6 The Basics – TDM (vs.
    [Show full text]
  • What Is the Impact of Mobile Telephony on Economic Growth?
    What is the impact of mobile telephony on economic growth? A Report for the GSM Association November 2012 Contents Foreword 1 The impact of mobile telephony on economic growth: key findings 2 What is the impact of mobile telephony on economic growth? 3 Appendix A 3G penetration and economic growth 11 Appendix B Mobile data usage and economic growth 16 Appendix C Mobile telephony and productivity in developing markets 20 Important Notice from Deloitte This report (the “Report”) has been prepared by Deloitte LLP (“Deloitte”) for the GSM Association (‘GSMA’) in accordance with the contract with them dated July 1st 2011 plus two change orders dated October 3rd 2011 and March 26th 2012 (“the Contract”) and on the basis of the scope and limitations set out below. The Report has been prepared solely for the purposes of assessing the impact of mobile services on GDP growth and productivity, as set out in the Contract. It should not be used for any other purpose or in any other context, and Deloitte accepts no responsibility for its use in either regard. The Report is provided exclusively for the GSMA’s use under the terms of the Contract. No party other than the GSMA is entitled to rely on the Report for any purpose whatsoever and Deloitte accepts no responsibility or liability or duty of care to any party other than the GSMA in respect of the Report or any of its contents. As set out in the Contract, the scope of our work has been limited by the time, information and explanations made available to us.
    [Show full text]
  • Voice Over Internet Protocol (VOIP): Overview, Direction and Challenges 1 U
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by International Institute for Science, Technology and Education (IISTE): E-Journals Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5782 (print) ISSN 2225-0506 (online) Vol.3, No.4, 2013 Voice over Internet Protocol (VOIP): Overview, Direction And Challenges 1 U. R. ALO and 2 NWEKE HENRY FIRDAY Department of Computer Science Ebonyi State University Abakaliki, Nigeria 1Email:- [email protected] 2Email: [email protected] ABSTRACT Voice will remain a fundamental communication media that cuts across people of all walks of life. It is therefore important to make it cheap and affordable. To be reliable and affordable over the common Public Switched Telephone Network, change is therefore inevitable to keep abreast with the global technological change. It is on this basis that this paper tends to critically review this new technology VoIP, x-raying the different types. It further more discusses in detail the VoIP system, VoIP protocols, and a comparison of different VoIP protocols. The compression algorithm used to save network bandwidth in VoIP, advantages of VoIP and problems associated with VoIP implementation were also critically examined. It equally discussed the trend in VoIP security and Quality of Service challenges. It concludes by reiterating the need for a cheap, reliable and affordable means of communication that would not only maximize cost but keep abreast with the global technological change. Keywords: Voice over Internet Protocol (VoIP), Public Switched Telephone Network (PSTN), Session Initiation Protocol (SIP), multipoint control unit 1. Introduction Voice over Internet Protocol (VoIP) is a technology that makes it possible for users to make telephone calls over the internet or intranet networks.
    [Show full text]
  • Telecommunications Electronics Technician Competency Listing
    Telecommunications Electronics Technician Competency Listing Telecommunications Electronics Technician - TCM Competency Requirements Telecommunications electronics technicians are expected to obtain knowledge of wired and wireless communications basic concepts which are then applicable to various types of voice, data and video systems. Once the CET has acquired these skills, abilities and knowledge, he or she will be able to enter employment in any part of the telecommunications field. With minimal training in areas unique to specific products, the CET should become a profitable and efficient part of the electronics-communications workforce. Telecommunications Electronics Technicians must be knowledgeable and have abilities in the following technical areas: 1.0 CABLES AND CABLING 1.1 Describe unshielded twisted pair (UTP) - List common usage locations and capabilities 1.2 Demonstrate installation and troubleshooting of RJ45/48 telephone connectors and fittings 1.3 CAT 5 wiring—Explain the differences vs.: single twisted pair and where it is most used 1.4 10 base T-explain where it is commonly used and its frequency capabilities 1.5 Describe the T568A / T568B standards 1.6 Explain how Cable TV wiring is used for data and voice services 1.7 Explain the differences between coax types RG 58, RG 59 and RG 6 1.8 Describe required grounding of electronics equipment 1.10 Describe the differences in Single and Multi-mode fiber optics 2.0 ANALOG TELEPHONY 2.1. Give a brief history of the telephone industry 2.2 Explain how basic phone systems work 2.3 Define POTS, DID, OPX, tie lines and WATS lines 2.4 Explain the benefits and usage of multiple phone lines 2.5 Define PBX and explain basic switching method 2.6 Sketch a local loop map 2.7 Define Key service units 2.8 Define Central Office and list it purposes 2.9 Explain the terms and usage of tones, loop start, ground start and wink start 2.10 Define CO, CPE.
    [Show full text]
  • A Novel Speech Enhancement Approach Based on Modified Dct and Improved Pitch Synchronous Analysis
    American Journal of Applied Sciences 11 (1): 24-37, 2014 ISSN: 1546-9239 ©2014 Science Publication doi:10.3844/ajassp.2014.24.37 Published Online 11 (1) 2014 (http://www.thescipub.com/ajas.toc) A NOVEL SPEECH ENHANCEMENT APPROACH BASED ON MODIFIED DCT AND IMPROVED PITCH SYNCHRONOUS ANALYSIS 1Balaji, V.R. and 2S. Subramanian 1Department of ECE, Sri Krishna College of Engineering and Technology, Coimbatore, India 2Department of CSE, Coimbatore Institute of Engineering and Technology, Coimbatore, India Received 2013-06-03, Revised 2013-07-17; Accepted 2013-11-21 ABSTRACT Speech enhancement has become an essential issue within the field of speech and signal processing, because of the necessity to enhance the performance of voice communication systems in noisy environment. There has been a number of research works being carried out in speech processing but still there is always room for improvement. The main aim is to enhance the apparent quality of the speech and to improve the intelligibility. Signal representation and enhancement in cosine transformation is observed to provide significant results. Discrete Cosine Transformation has been widely used for speech enhancement. In this research work, instead of DCT, Advanced DCT (ADCT) which simultaneous offers energy compaction along with critical sampling and flexible window switching. In order to deal with the issue of frame to frame deviations of the Cosine Transformations, ADCT is integrated with Pitch Synchronous Analysis (PSA). Moreover, in order to improve the noise minimization performance of the system, Improved Iterative Wiener Filtering approach called Constrained Iterative Wiener Filtering (CIWF) is used in this approach. Thus, a novel ADCT based speech enhancement using improved iterative filtering algorithm integrated with PSA is used in this approach.
    [Show full text]
  • IP Telephony Glossary of Terms
    Cisco IP Telephony Glossary of Terms A helpful guide to the terminology you need to know as you investigate the advantages of a converged network. Cisco Systems All contents are Copyright © 1992–2001 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 30 IP Telephony Glossary of Terms A helpful guide to the terminology you need to know as you investigate the advantages of a converged network. To find a specific term by letter of the alphabet, please click on the letter to the left. A abandoned A call in which the caller hangs up before the call is call answered. access On a PBX, a dialing number, such as 9, used to access an digit outside line. Also called access code. access A gateway that allows the IP PBX to communicate with the gateway PSTN or traditional PBX systems. See also IP, PBX, and PSTN. access Part of ISO-OSI layered protocol model. layer access line A transmission line that provides access to a larger system or network. access link The local access connection between a customer's premises and a carrier's point of presence (POP), which is the carrier's central switching office or closest point of local termination. access The technique for moving data, voice, or video between method storage and input/output devices. access port Connects a network device to an IP device. For example, a computer can be connected to an IP phone through an access port. access A set of specific procedures that enable a user to obtain protocol services from a telephone company or network.
    [Show full text]
  • History of Mobile Telephony MAS 490: Theory and Practice of Mobile Applications
    History of Mobile Telephony MAS 490: Theory and Practice of Mobile Applications Professor John F. Clark Everything I know about mobile telephony, I learned from: Evolution is not a theory when it concerns cell phones Early History of Radiophones Nicola Tesla and Guglielmo Marconi were the founders of wireless technology Ship to shore radiotelegraphy employed wireless use of Morse Code Later, radiophones and radiotelephony transmitted speech In 1900 Reginald Fessenden invented early broadcasting, transatlantic two-way voice communication, and later television Tesla, Marconi, and Fessenden The Great Wireless Fiasco Early History of Radiophones In 1926 radiophones connected people traveling on trains in Europe A little later, they were introduced in planes, but this was too late for World War I Radiophones made a huge difference in WWII – planes, tanks, and field communication via backpack radios and walkie-talkies. Later, in the 1950s, radiophones made civil and commercial services possible Military Field Communications Civil Field Communications Civil Field Communications, pt. 2 Early History of Mobile Telephony The 60s and 70s saw a variety of commercial car services – the earliest weighed 90-100 pounds These services operated using high power transmissions The concept of low power transmission in hexagonal cells was introduced in 1947 The electronics were advanced enough by the 60s to pull it off, but there was no method for handoffs from one cell to the next High Power Mobile Phone Low Power Mobile Phone System Early History of Mobile Telephony That problem was solved with the first functioning cell system and first real cell phone call in 1973. The phone, which weighed about six pounds, was developed by Martin Cooper of Motorola Bell Labs and Motorola were the main competitors in the US.
    [Show full text]
  • Telecom Policy Forum: a Chance to Push Ip Telephony, Data Services
    P A U L, W E I S S, R I F K I N D, W H A R T O N & G A R R I S O N TELECOM POLICY FORUM: A CHANCE TO PUSH IP TELEPHONY, DATA SERVICES LAURA B. SHERMAN PUBLISHED IN TELECOMMUNICATIONS REPORTS INTERNATIONAL JANUARY 2001 PAUL, WEISS, RIFKIND, WHARTON & GARRISON The upcoming World Telecommunication Policy Forum (WTPF-01) will present an opportunity for all companies in the Internet value chain—equipment manufacturers, content providers, and network and service suppliers—to head off unneeded and unwanted regulation of the Internet. The International Telecommunication Union (ITU) is hosting the forum in early March for executives and regulators from the developed countries to explain the positive aspects of IP (Internet protocol) telephony and data services to their counterparts from the developed world. WTPF-01 is the third in a series of ITU forums on emerging policy and regulatory matters arising from the changing telecom environment. These forums do not result in legally binding obligations or commitments. Rather, they build understanding and set a direction for governments and regulators. The first policy forum, on global mobile satellite services, led to the establishment of an ITU registry and marking process for global mobile satellite terminals. A memorandum of understanding designed to facilitate the mutual recognition and cross- border transport of terminals also emerged. The second forum dealt with trade in telecom services. Participants reviewed the World Trade Organization’s negotiations on basic telecommunications services and the marketplace changes that resulted from the agreement. The ITU Council last year set the agenda for the upcoming forum’s discussion of IP telephony.
    [Show full text]
  • Phoneypot: Data-Driven Understanding of Telephony Threats
    Phoneypot: Data-driven Understanding of Telephony Threats Payas Gupta Bharat Srinivasan Vijay Balasubramaniyan Mustaque Ahamad New York University Georgia Institute of Technology Pindrop Security Georgia Institute of Technology Abu Dhabi [email protected] [email protected] New York University Abu Dhabi [email protected] [email protected] Abstract—Cyber criminals are increasingly using robocalling, the telephony channel can be attributed to the availability of voice phishing and caller ID spoofing to craft attacks that are IP telephony (Voice over Internet Protocol). Such calls can being used to scam unsuspecting users who have traditionally be made at no or low cost at scale in an automated fashion trusted the telephone. It is necessary to better understand similar to email spam, and criminals are already exploiting telephony threats to effectively combat them. Although there the telephony channel to craft attacks such as voice phishing exist crowd sourced complaint datasets about telephony abuse, (vishing). Unfortunately, attacks that utilize the telephone as a such complaints are often filed after a user receives multiple calls over a period of time, and sometimes they lack important resource are more successful because people in the past have information. We believe honeypot technologies can be used to trusted the telephony channel. In fact, telephony has reportedly augment telephony abuse intelligence and improve its quality. become the weak link even for web security because cyber However, a telephony honeypot presents several new challenges criminals have used social engineering over the phone to reset that do not arise in other traditional honeypot settings. We online banking credentials to steal money [48].
    [Show full text]
  • Voice Transmission --Basic Concepts Basic Concepts
    Voice Transmission ----BasicBasic ConceptsConcepts---- Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics : Amplitude Frequency Phase EE4367 Telecom. Switching & Transmission Prof. Murat Torlak Voice Digitization in the POTS Traditional POTS was analog. The current telephone system of the POTS combines both analog and digital transmission technologies. Why Voice digitization: Ensures better quality (than analog) Provides higher capacity (than analog) Deals with longer distance (than analog) EE4367 Telecom. Switching & Transmission Prof. Murat Torlak Voice DigitizationDigitization——How!How! Digitization is just a discrete electrical voltage. Electrical pulses can be varied to represent characteristics of an analog voice signal. 5-different VD-techniques: PAM = pulse amplitude modulation PDM = pulse duration modulation PPM = Pulse position modulation PCM = Pulse code modulation ADPCM = Adaptive differential PCM EE4367 Telecom. Switching & Transmission Prof. Murat Torlak Pulse Amplitude Modulation First step in digitizing an analog waveform Establishes a set of discrete times at which the input signal waveform is sampled. The sampling process is equivalent to amplitude modulation of a constant amplitude pulse train, thus, PAM. Nyquist Sampling Rate : The minimum sampling frequency required to extract all information in a continuous, time- varying waveform. Nyquist Criterion: f s>2 ×BW fs: sampling rate, BW: bandwidth of the input signal PAM samples Input signal Output signal Amplitude Low-pass Pulse train modulation filter EE4367 Telecom. Switching & Transmission Prof. Murat Torlak Spectrum of PAM Signal The PAM spectrum can be derived by observing that a continuous train of impulses has a frequency spectrum consisting of discrete terms at multiples of the sampling frequency. Source: Digital Telephony by Bellamy EE4367 Telecom.
    [Show full text]
  • Low-Complexity Pruned 8-Point DCT Approximations for Image Encoding
    Low-complexity Pruned 8-point DCT Approximations for Image Encoding † ‡ V´ıtor A. Coutinho ∗ Renato J. Cintra F´abio M. Bayer Sunera Kulasekera Arjuna Madanayake.§ Abstract Two multiplierless pruned 8-point discrete cosine transform (DCT) approximation are presented. Both trans- forms present lower arithmetic complexity than state-of-the-art methods. The performance of such new methods was assessed in the image compression context. A JPEG-like simulation was performed, demonstrating the adequate- ness and competitiveness of the introduced methods. Digital VLSI implementation in CMOS technology was also considered. Both presented methods were realized in Berkeley Emulation Engine (BEE3). Keywords Approximate discrete cosine transform, pruning, pruned DCT, HEVC 1 INTRODUCTION Orthogonal transforms are useful tools in many scientific applications [1]. In particular, the discrete cosine transform (DCT) [2] plays an important role in digital signal processing. Due to the energy compaction property, which are close related to the Karuhnen-Lo`eve transform (KLT) [3], the DCT is often used in data compression [4]. In fact, the DCT is adopted in many image and video compression standards, such as JPEG [5], MPEG [6–8], H.261 [9,10], H.263 [7,11], H.264/AVC [12,13], and the high efficiency video coding (HEVC) [14,15]. Due to its range of applications, efforts have been made over decades to develop fast algorithms to compute the DCT efficiently [4]. The theoretical multiplicative complexity minimum for the N-point DCT was derived by Winograd in [16]. For the 8-point DCT, such minimum consists of 11 multiplications, which is achieved by Loeffler DCT algorithm [17].
    [Show full text]