adaptive filter - ksu · •user identification. •authenticity determination. •automated...
TRANSCRIPT
![Page 1: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/1.jpg)
Adaptive Filter
A digital filter that automatically adjusts its coefficients to adapt input signal via an adaptive algorithm.
Applications:
Signal enhancement
Active noise control
Noise cancellation
Telephone echo cancellation
1
Text: Digital Signal Processing by Li Tan, Chapter 10
![Page 2: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/2.jpg)
Simplest Noise Canceller
n(n) is a linear filtered (delayed) version of x(n). Controls speed of convergence
2
![Page 3: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/3.jpg)
Simplest Noise Canceller – contd.
Initial coefficient
Measured
3
![Page 4: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/4.jpg)
Wiener Filter & LMS Algorithm
Clean signal
Consider, single weight case,
Error signal,
Now we have to solve for the best weight w*
4
![Page 5: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/5.jpg)
5
LMS Algorithm
Taking Expectation of squared error signal
For large N,
Optimal w* is found when minimum J is achieved
![Page 6: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/6.jpg)
6
LMS Algorithm - Example
Given MSE function for the Wiener filter:
Solving for optimal, we get
Finally we get
large N
Makes real-time implementation difficult
R-1: Matrix inversion
![Page 7: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/7.jpg)
7
Steepest Decent Algorithm
= constant controlling the speed of convergence.
![Page 8: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/8.jpg)
8
Steepest Decent Algorithm: Example
Given:
Iteration three times
Find optimal solution for w*
For n = 0,
Solution:
For n = 1,
For n = 2,
![Page 9: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/9.jpg)
9
Steepest Decent Algorithm – contd1.
To make it sample-based processing, we need to take out estimation.
Updating weight
For multiple tap FIR filter:
Choose convergence constant as
Px : maximum input power
![Page 10: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/10.jpg)
10
Steepest Decent Algorithm – contd2.
Steps:
![Page 11: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/11.jpg)
11
Noise Canceller Using Adaptive Filter-1
Perform adaptive filtering to obtain outputs
Given:
Initial weights:
Solution:
Filtering:
Output:
Updating weights:
![Page 12: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/12.jpg)
12
Noise Canceller Using Adaptive Filter-2
![Page 13: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/13.jpg)
13
Noise Canceller Using Adaptive Filter-3
Output (noise-cleaned signal):
Practice: Textbook by Li Tan, Chapter 10.
10.3, 10.5, 10.7
![Page 14: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/14.jpg)
14
Digital Signal Processors - IntroductionProcessors dedicated to DSP
Off-line processing: all the data needs to be in the memory at the same time. The output is produced after all the input data is in the memory.
On-line processing: the output is produced as the same time the input is coming. No delay or little delay.
Circular Buffer Operation:
Start Pointer
End Pointer
Step size of memory = 1
Pointer to most recent sample
![Page 15: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/15.jpg)
15
Microprocessors Architecture
Normal microprocessors
DSP uses these ideas
Most recent instructions
![Page 16: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/16.jpg)
16
Typical DSP ArchitectureFor circular buffering
Operations are divided
![Page 17: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/17.jpg)
Application of DSP in Image Processing: Basic Intensity Transfer Functions
• Linear• Logarithmic• Power-law
17
Grey Image has intensity in the range [0 – 255] i.e. it uses 8 bits.
Intensity is transformed for better viewing.
![Page 18: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/18.jpg)
rLs 1
Intensity level: [0, L - 1]
Original Image Negative Image
Negative Transformation
18
![Page 19: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/19.jpg)
Log Transformation
Original Image (Fourier Spectrum) Log Transformed Image
)1log( rcs
Compresses the dynamic range of images with large variations in pixel values.
Loss of details in low pixel values
19
![Page 20: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/20.jpg)
Contrast manipulation: Power-Law
MRI of a fracturedspine. 6.0
3.04.0
Best contrast Washed out
crs
20
![Page 21: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/21.jpg)
Filter Mask
9
1
992211 ...k
T
kk zwzwzwzwR zw
Smoothing Filter (low pass) mask:
Equal weight Weighted average
a
as
b
bt
a
as
b
bt
tsw
tysxftsw
yxg
),(
),(),(
),(
Normalization factor
21
![Page 22: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/22.jpg)
Smoothing Effect
Original image 3 X 3 mask
35 X 35 mask
5 X 5 mask
Noise is less pronounced.
Completely blurred!
22
![Page 23: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/23.jpg)
Median Filtering
Find the median in the neighborhood, then assign the center pixel value to that median.
23
![Page 24: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/24.jpg)
Digital (Image) Watermarking
Inserting information (watermark) into images in such a way that the watermark is inseparable from the images.
• Copyright identification.• User identification.• Authenticity determination.• Automated monitoring.• Copy protection.
wffw )1(
Watermarked image
WatermarkOriginal image
24
![Page 25: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/25.jpg)
Example of Watermarking - I
α= 0.3
Visible
Textbook: Digital Image Processing by Gonzalez and Woods
25
![Page 26: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/26.jpg)
Example of Watermarking - II Invisible
Watermark is inserted in image’s two LSBs.
6444
wffw
Sets two LSBs of image to 00.
Shifts two MSBs into two LSBs.
By zeroing 6 MSB and scaling the remains to full intensity level,
we get
26
![Page 27: Adaptive Filter - KSU · •User identification. •Authenticity determination. •Automated monitoring. •Copy protection. f w (1 D) f Dw Watermarked image Original Watermark image](https://reader034.vdocuments.net/reader034/viewer/2022043007/5f93dc8c45fb416d6f323d95/html5/thumbnails/27.jpg)
Image Watermarking System
Private / restricted key system: fi and wi are used.
Public / unrestricted key system: fi and wi are unused.
27