Browsing by Author "Peplow, Roger Charles Samuel."
Now showing 1 - 15 of 15
- Results Per Page
- Sort Options
Item An application specific low bit-rate video compression system geared towards vehicle tracking.(2003) Spicer, Ryan David.; Peplow, Roger Charles Samuel.The ability to communicate over a low bit-rate transmission channel has become the order of the day. In the past, transmitted data over a low bit-rate transmission channel, such as a wireless link, has typically been reserved for speech and data. However, there is currently a great deal of interest being shown in the ability to transmit streaming video over such a link. These transmission channels are generally bandwidth limited hence bit-rates need to be low. Video on the other hand requires large amounts of bandwidth for real-time streaming applications. Existing Video Compression standards such as MPEG-l/2 have succeeded in reducing the bandwidth required for transmission by exploiting redundant video information in both the spatial and temporal domains. However such compression systems are geared towards general applications hence they tend not to be suitable for low bit-rate applications. The objective of this work is to implement such a system. Following an investigation in the field of video compression, existing techniques have been adapted and integrated into an application specific low bit-rate video compression system. The implemented system is application specific as it has been designed to track vehicles of reasonable size within an otherwise static scene. Low bit-rate video is achieved by separating a video scene into two areas of interest, namely the background scene and objects that move with reference to this background. Once the background has been compressed and transmitted to the decoder, the only data that is subsequently transmitted is that that has resulted from the segmentation and tracking of vehicles within the scene. This data is normally small in comparison with that of the background scene and therefore by only updating the background periodically, the resulting average output bit-rate is low. The implemented system is divided into two parts, namely a still image encoder and decoder based on a Variable Block-Size Discrete Cosine Transform, and a context-specific encoder and decoder that tracks vehicles in motion within a video scene. The encoder system has been implemented on the Philips TriMedia TM-1300 digital signal processor (DSP). The encoder is able to capture streaming video, compress individual video frames as well as track objects in motion within a video scene. The decoder on the other hand has been implemented on the host PC in which the TriMedia DSP is plugged. A graphic user interface allows a system operator to control the compression system by configuring various compression variables. For demonstration purposes, the host PC displays the decoded video stream as well as calculated rate metrics such as peak signal to noise ratio and resultant bit-rate. The implementation of the compression system is described whilst incorporating application examples and results. Conclusions are drawn and suggestions for further improvement are offered.Item Data base optimisation for an I.C. design layout package on the VAX.(1987) Figg, Peter Gerald.; Peplow, Roger Charles Samuel.The performance of an interactive graphics/computer aided design system, such as the IC layout and rule checking package implemented as part of the schematic drawing application on the Gerber Systems Technology IDS-80, is very closely related to the performance of the system's data base. This is due to the fact that most editing functions on an interactive graphics/CAD system are data base intensive functions and the data base and its management routines form one of the major building blocks of a CAD system. It can therefore be said that the performance of a CAD system is directly dependent on the data base access time and the efficiency of the managing routines. The primary objective of this project was to enhance the performance of the IC layout and rule checking package. This was done by improving the performance of the data base of the system. This was achieved by following two mutually supportive paths. The first was the transportation of the software to a new host machine which had a 32-bit processor and virtual memory capabilities. The second was to try and improve the performance of the transported data base by utilising sophisticated data base structures and memory management·techniques facilitated by the larger available memory of the new host to optimise the data base operations. The effectiveness of the two paths in achieving their respective goals was evaluated using evaluation programs which simulated characteristic data base activities.This thesis documents the above process, as well as expounds on some of the background related theory which was instrumental in the progress of the project and the drawing of the final conclusions.Item Granting privacy and authentication in mobile ad hoc networks.(2012) Balmahoon, Reevana.; Peplow, Roger Charles Samuel.The topic of the research is granting privacy and authentication in Mobile Ad Hoc Networks (MANETs) that are under the authority of a certificate authority (CA) that is often not available. Privacy is implemented in the form of an anonymous identity or pseudonym, and ideally has no link to the real identity. Authentication and privacy are conflicting tenets of security as the former ensures a user's identity is always known and certified and the latter hides a user's identity. The goal was to determine if it is possible for a node to produce pseudonyms for itself that would carry the authority of the CA while being traceable by the CA, and would be completely anonymous. The first part of the dissertation places Vehicular Ad Hoc Networks (VANETs) into context, as this is the application of MANETs considered. This is followed by a detailed survey and analysis of the privacy aspects of VANETs. Thereafter, the solution is proposed, documented and analysed. Lastly, the dissertation is concluded and the contributions made are listed. The solution implements a novel approach for making proxies readily available to vehicles, and does indeed incorporate privacy and authentication in VANETs such that the pseudonyms produced are always authentic and traceable.Item A graphic rasterizer IC.(1987) Izzard, Martin John.; Poole, Kelvin F.; Peplow, Roger Charles Samuel.A single chip line-rasterizer that overcomes the major bottleneck in graphics display systems has been designed by the author on a 4408 element gate array marketed by Plessey Semiconductors limited. The rasterizer was fabricated by Plessey using their 2 micron, double-level metal ISO CMOS process, in the United Kingdom. Two identifiable bottlenecks in the redraw speed on a general graphics display system are video memory bandwidth and rasterization speed (in dots produced per second). The rasterizer described here is capable of working in parallel with other rasterizers to overcome the rasterization bottleneck. Systems incorporating it are flexible and expandable. The rasterizer requests a primitive from a host or master part of the system. Once it has a primitive to work on, it begins rasterization. The rasterizer queues requests to write dots to the video memory part of the system. The device accepts two ordered pairs of 16-bit numbers as start-of-line and end-of-line coordinates, on an 8-bit bus; the dot addresses are in the form of two 16-bit numbers on a 32-bit bus. Simulation with CLASSIC showed that the device could be clocked at up to 8 MHz and would then produce dots at between 2 MHz and 4 MHz (dependent on the type of line) after the initial analysis overheads. This means that any video memory bandwidth may be fully used with this device and any improvements in memory bandwidth may be taken advantage of in a system using the parallel rasterization scheme. The Plessey test engineers exercised the device to prove the success of the fabrication. Further tests were performed by the author. In these, the rasterizer was seen to gather data correctly. The rasterization of a range of different types of lines, manhattan and general, short and long and lines of different direction, was tested. The various algorithm terminations were verified and all branches exercised. The flow control on the pixel bus was checked. The device used for all the tests, performed correctly at 10 MHz (design specification 8 MHz) which corresponds to a maximum rasterization speed of 5 MHz for 0° and 90° lines and between 2.5 MHz and 3.3 MHz for general lines. The results show that the rasterizer performance will allow full use of the memory bandwidth of the system and hence overcome the major bottleneck in many graphics display systems.Item High ratio wavelet video compression through real-time rate-distortion estimation.(2003) Jackson, Edmund Stephen.; Peplow, Roger Charles Samuel.The success of the wavelet transform in the compression of still images has prompted an expanding effort to exercise this transform in the compression of video. Most existing video compression methods incorporate techniques from still image compression, such techniques being abundant, well defined and successful. This dissertation commences with a thorough review and comparison of wavelet still image compression techniques. Thereafter an examination of wavelet video compression techniques is presented. Currently, the most effective video compression system is the DCT based framework, thus a comparison between these and the wavelet techniques is also given. Based on this review, this dissertation then presents a new, low-complexity, wavelet video compression scheme. Noting from a complexity study that the generation of temporally decorrelated, residual frames represents a significant computational burden, this scheme uses the simplest such technique; difference frames. In the case of local motion, these difference frames exhibit strong spatial clustering of significant coefficients. A simple spatial syntax is created by splitting the difference frame into tiles. Advantage of the spatial clustering may then be taken by adaptive bit allocation between the tiles. This is the central idea of the method. In order to minimize the total distortion of the frame, the scheme uses the new p-domain rate-distortion estimation scheme with global numerical optimization to predict the optimal distribution of bits between tiles. Thereafter each tile is independently wavelet transformed and compressed using the SPIHT technique. Throughout the design process computational efficiency was the design imperative, thus leading to a real-time, software only, video compression scheme. The scheme is finally compared to both the current video compression standards and the leading wavelet schemes from the literature in terms of computational complexity visual quality. It is found that for local motion scenes the proposed algorithm executes approximately an order of magnitude faster than these methods, and presents output of similar quality. This algorithm is found to be suitable for implementation in mobile and embedded devices due to its moderate memory and computational requirements.Item The implementation of a CDMA system on a FPGA-based software radio.(2000) Ellis, Timothy.; Peplow, Roger Charles Samuel.This dissertation exammes two of the rlsing technologies in the world of wireless, cellular communications - CDMA and the software radio. This thesis covers many of the issues related to these two emerging field s of wireless communications, establish ing a theoretical framework for the broader issues of implementation. To this end, the thesis covers many of the basic issues of spread spectrum communications, in addition to establishing the need for, and defining the role of, the software radio. Amalgamation of these two key areas of interest is embellished in a presentation of many of the concerns of implementing a specific CDMA system on a particular type of software radio - the Alcatel Altech Telecomms Flexible Radio Platform. Of primary concern in the research methodology embraced in this thesis is the mastering of a variety of analysis and implementation tools. Once the theoretical background has been substantiated by current expositions, the thesis launches along a highly deterministic route. First, the research issues are tested in a mathematical environment for suitability to the given task. Second, an analysis of the appropriateness of the technique for the software radio environment is undertaken, culminating in the attempted deployment within the hardware environmenl. Rigorous testing of the input/output mapping characteristics of the hardware instantiations created in this manner complements the research methodology with a viability study. This procedure is repeated with many elements of the CDMA system design as they are examined, simu lated, deployed and tested.Item Implementation of a proprietary CAD graphics subsystem using the GKS standard interface.(1989) Davies, Trevor Rowland.; Peplow, Roger Charles Samuel.This project involved porting a Graphical Software Package (GSP) from the proprietary IDS-BO Gerber CAD system onto a more modern computer that would allow student access for further study and development. Because of the popularity of Unix as an "open systems environment", the computer chosen was an HP9000 using the HP-UX operating system. In addition, it was decided to implement a standard Graphical Kernel System (GKS) interface to provide further portability and to cater for the expected growth of the GKS as an international standard. By way of introduction, a brief general overview of computer graphics, some of the essential considerations for the design of a graphics package and a description of the work undertaken are presented. Then follows a detailed presentation of the two systems central to this project i) the lDS-8O Gerber proprietary CAD system, with particular attention being paid to the Graphical Software Package (GSP) which it uses and ii) the Graphical Kernel System (GKS) which has become a widely accepted international graphics standard. The major differences between the lDS-8O Gerber GSP system and the GKS system are indicated. Following the theoretical presentation of the GSP and GKS systems, the practical work involved in first implementing a "skeleton" GKS interface on the HP9000 Unix System, incorporating the existing Advanced Graphics Package (AGP) is presented. The establishment of a GKS interface then allows an lDS-8O Gerber GSP interface to be developed and mapped onto this. Detailed description is given of the methods employed for this implementation and the reasons for the data structures chosen. The procedures and considerations for the testing and verification of the total .system implemented on the HP9000 then follow. Original lDS-8O Gerber 2-D .applications software was used for the purpose of testing. The implementation of the data base that this software uses is also presented. Conclusions on system performance are finally presented as well as suggested areas for possible further work.Item Implementation of an application specific low bit rate video compression scheme.(2001) McIntosh, Ian James.; Peplow, Roger Charles Samuel.The trend towards digital video has created huge demands all the link bandwidth required to carry the digital stream, giving rise to the growing research into video compression schemes. General video compression standards, which focus on providing the best compression for any type of video scene, have been shown to perform badly at low bit rates and thus are not often used for such applications. A suitable low bit rate scheme would be one that achieves a reasonable degree of quality over a range of compression ratios, while perhaps being limited to a small set of specific applications. One such application specific scheme. as presented in this thesis, is to provide a differentiated image quality, allowing a user-defined region of interest to be reproduced at a higher quality than the rest of the image. The thesis begins by introducing some important concepts that are used for video compression followed by a survey of relevant literature concerning the latest developments in video compression research. A video compression scheme, based on the Wavelet transform, and using an application specific idea, is proposed and implemented on a digital signal processor (DSP), the Philips Trimedia TM·1300. The scheme is able to capture and compress the video stream and transmit the compressed data via a low bit· rate serial link to be decompressed and displayed on a video monilor. A wide range of flexibility is supported, with the ability to change various compression parameters 'on-the-fly', The compression allgorithm is controlled by a PC application that displays the decompressed video and the original video for comparison, while displaying useful rate metrics such as Peak Signal to Noise Ratio (PSNR), Details of implementation and practicality are discussed. The thesis then presents examples and results from both implementation and testing before concluding with suggestions for further improvement.Item An improved randomization of a multi-blocking jpeg based steganographic system.(2010) Dawoud, Peter Dawoud Shenouda.; Peplow, Roger Charles Samuel.; Naidoo, Bashan.Steganography is classified as the art of hiding information. In a digital context, this refers to our ability to hide secret messages within innocent digital cover data. The digital domain offers many opportunities for possible cover mediums, such as cloud based hiding (saving secret information within the internet and its structure), image based hiding, video and audio based hiding, text based documents as well as the potential of hiding within any set of compressed data. This dissertation focuses on the image based domain and investigates currently available image based steganographic techniques. After a review of the history of the field, and a detailed survey of currently available JPEG based steganographic systems, the thesis focuses on the systems currently considered to be secure and introduces mechanisms that have been developed to detect them. The dissertation presents a newly developed system that is designed to counter act the current weakness in the YASS JPEG based steganographic system. By introducing two new levels of randomization to the embedding process, the proposed system offers security benefits over YASS. The introduction of randomization to the B‐block sizes as well as the E‐block sizes used in the embedding process aids in increasing security and the potential for new, larger E‐block sizes also aids in providing an increased set of candidate coefficients to be used for embedding. The dissertation also introduces a new embedding scheme which focuses on hiding in medium frequency coefficients. By hiding in these medium frequency coefficients, we allow for more aggressive embedding without risking more visual distortion but trade this off with a risk of higher error rates due to compression losses. Finally, the dissertation presents simulation aimed at testing the proposed system performance compared to other JPEG based steganographic systems with similar embedding properties. We show that the new system achieves an embedding capacity of 1.6, which represents round a 7 times improvement over YASS. We also show that the new system, although introducing more bits in error per B‐block, successfully allows for the embedding of up to 2 bits per B‐block more than YASS at a similar error rate per B‐block. We conclude the results by demonstrating the new systems ability to resist detection both through human observation, via a survey, as well as resist computer aided analysis.Item An intelligent multi-terminal interface.(1987) Peplow, Roger Charles Samuel.; Nattrass, Henry Lee.The document describes the development of a micro-processor based terminal multiplexer to connect four terminals to a standard Hewlett Packard series 1000 mini-computer. The project was required to fulfill the dual roll of both increasing the number of terminals that the HPI000 could support and of reducing the peripheral load on the host CPU. The final product occupied a standard 200mm square HP size interface card and used an 8085 micro-processor and several 8085 family peripheral chips to provide four full duplex serial channels and a high speed data link with the host. A multi-tasking executive was written to control the multiplexer software which was finally implemented as 15 independent tasks occupying 8 kilo-bytes of eprom. The software was written to perform all terminal interaction and editing in order to reduce the host CPU involvement to a single interrupt per record. The resultant interface proved capable of handling an aggregate throughput in excess of 4000 characters per second which was sufficient to cope with all four terminals running at 9600 bits per second, even when all four were transferring in burst mode. The interface also proved to be between five and eighteen times less demanding on the host than the two standard Hewlett Packard interfaces then available. When compared to the low cost HP12531 interface, the multiplexer increased the 9600b/s terminal handling capability of the host from 3 terminals to 52.Item Maritime tracking using level sets with shape priors.(2012) Frost, Duncan Peter.; Tapamo, Jules-Raymond.; Bachoo, Asheer Kasar.; Peplow, Roger Charles Samuel.Piracy is still a significant threat to ships in a maritime environment. Areas such as the coast of Somalia and the Strait of Malacca are still plagued by pirates, and the total international cost of piracy numbers in the billions of dollars. The first line of defence against these threats is early detection and thus maritime surveillance has become an increasingly important task over the years. While surveillance has traditionally been a manual task using crew members in lookout positions on parts of the ship, much work is being done to automate this task using digital cameras equipped with computer vision software. While these systems are beneficial in that they do not grow tired like their human counterparts, the maritime environment is a challenging task for computer vision systems. This dissertation aims to address some of these challenges by presenting a system that is able to use prior knowledge of an object’s shape to aid in detection and tracking of the object. Additionally, it aims to test this system under various environmental conditions (such as weather). The system is based around the segmentation technique known as the level set method, which uses a contour in the image that is evolved to separate regions of interest. The system is split into two parts, comprising of an object detection stage that initially finds objects in a scene, and an object tracking stage that tracks detected objects for the rest of the sequence. The object detection stage uses a kernel density estimation-based background subtraction and a binary image level set filter, while the object tracker makes use of a tracking level set algorithm for its functionality. The object detector was tested using a group of 4 sequences, of which it was able to find a prior-known object in 3. The object tracker was tested on a group of 10 sequences for 300 frames a sequence. In 6 of these sequences the object tracker was able to successfully track the object in every single frame. It is shown that the developed video tracking system outperforms level set–based systems that don’t use prior shape knowledge, working well even where these systems fail.Item Quantifying steganographic embedding capacity in DCT-based embedding schemes.(2012) Zawilska, Anna.; Peplow, Roger Charles Samuel.Digital image steganography has been made relevant by the rapid increase in media sharing over the Internet and has thus experienced a renaissance. This dissertation starts with a discussion of the role of modern digital image steganography and cell-based digital image stego-systems which are the focus of this work. Of particular interest is the fact that cell-based stego-systems have good security properties but relatively poor embedding capacity. The main research problem is stated as the development of an approach to improve embedding capacity in cell-based systems. The dissertation then tracks the development of digital image stego-systems from spatial and naïve to transform-based and complex, providing the context within which cell-based systems have emerged and re-states the research problem more specifically as the development of an approach to determine more efficient data embedding and error coding schemes in cell-based stego-systems to improve embedding capacity while maintaining security. The dissertation goes on to describe the traditional application of data handling procedures particularly relating to the likely eventuality of JPEG compression of the image containing the hidden information (i.e. stego-image) and proposes a new approach. The approach involves defining a different channel model, empirically determining channel characteristics and using them in conjunction with error coding systems and security selection criteria to find data handling parameters that optimise embedding capacity in each channel. Using these techniques and some reasoning regarding likely cover image size and content, image-global error coding is also determined in order to keep the image error rate below 1% while maximising embedding capacity. The performance of these new data handling schemes is tested within cell-based systems. Security of these systems is shown to be maintained with an up to 7 times improvement in embedding capacity. Additionally, up to 10% of embedding capacity can be achieved versus simple LSB embedding. The 1% image error rate is also confirmed to be upheld. The dissertation ends with a summary of the major points in each chapter and some suggestions of future work stemming from this research.Item A slotted-CDMA based wireless-ATM link layer : guaranteeing QoS over a wireless link.(2000) Parry, Gareth Ross.; Peplow, Roger Charles Samuel.Future wireless networks will have to handle varying combinations of multimedia traffic that present the network with numerous quality of service (QoS) requirements. The continuously growing demand for mobile phones has resulted in radio spectrum becoming a precious resource that cannot be wasted. The current second-generation mobile networks are designed for voice communication and, even with the enhancements being implemented to accommodate data, they cannot efficiently handle the multimedia traffic demands that will be introduced in the near future. This thesis begins with a survey of existing wireless ATM (WATM) protocols, followed by an examination of some medium access control (MAC) protocols, supporting multimedia traffic, and based on code division multiple access (CDMA) physical layers. A WATM link layer protocol based on a CDMA physical layer, and incorporating techniques from some of the surveyed protocols, is then proposed. The MAC protocol supports a wide range of service requirements by utilising a flexible scheduling algorithm that takes advantage of the graceful degradation of CDMA with increasing user interference to schedule cells for transmission according to their maximum bit error rate (BER) requirements. The data link control (DLC) accommodates the various traffic types by allowing virtual channels (VCs) to make use of forward error correction (FEc) or retransmission techniques. The proposed link layer protocol has been implemented on a Blue Wave Systems DSP board that forms part of Alcatel Altech Telecoms' software radio platform. The details and practicality of the implementation are presented. A simulation model for the protocol has been developed using MIL3 's Opnet Modeler. Hence, both simulated and measured performance results are presented before the thesis concludes with suggestions for improvements and future work.Item Using a terminal switching exchange for computer peripheral sharing and other purposes.(1988) Barrett, Alan Peter.; Levy, David C.; Peplow, Roger Charles Samuel.Several computers and several tens of terminals at the University of Natal are linked to a terminal switching exchange network known as NUNET, which is in fact part of a countrywide network known as NllNET. This thesis describes software that was written to enhance the usefulness of the network, particularly in the Department of Electronic Engineering. The enhancements include a simple facility to provide help to users of the network, and programs that allow various computers in the Department of Electronic Engineering to create and close network connections. The programs that create and close network connections are used to provide access to printers and plotters that are connected to the network and shared by several computers. Access to peripherals through the network has been integrated into existing printer and plotter driver programs on some of the computers, thus allowing the network to be completely transparent to the user. The same network access programs also allow connections to be made between computers for the purpose of file transfers.Item Video object segmentation and tracking.(2005) Murugas, Themesha.; Peplow, Roger Charles Samuel.; Tapamo, Jules-Raymond.One of the more complex video processing problems currently vexing researchers is that of object segmentation. This involves identifying semantically meaningful objects in a scene and separating them from the background. While the human visual system is capable of performing this task with minimal effort, development and research in machine vision is yet to yield techniques that perform the task as effectively and efficiently. The problem is not only difficult due to the complexity of the mechanisms involved but also because it is an ill-posed problem. No unique segmentation of a scene exists as what is of interest as a segmented object depends very much on the application and the scene content. In most situations a priori knowledge of the nature of the problem is required, often depending on the specific application in which the segmentation tool is to be used. This research presents an automatic method of segmenting objects from a video sequence. The intent is to extract and maintain both the shape and contour information as the object changes dynamically over time in the sequence. A priori information is incorporated by requesting the user to tune a set of input parameters prior to execution of the algorithm. Motion is used as a semantic for video object extraction subject to the assumption that there is only one moving object in the scene and the only motion in the video sequence is that of the object of interest. It is further assumed that there is constant illumination and no occlusion of the object. A change detection mask is used to detect the moving object followed by morphological operators to refine the result. The change detection mask yields a model of the moving components; this is then compared to a contour map of the frame to extract a more accurate contour of the moving object and this is then used to extract the object of interest itself. Since the video object is moving as the sequence progresses, it is necessary to update the object over time. To accomplish this, an object tracker has been implemented based on the Hausdorff objectmatching algorithm. The dissertation begins with an overview of segmentation techniques and a discussion of the approach used in this research. This is followed by a detailed description of the algorithm covering initial segmentation, object tracking across frames and video object extraction. Finally, the semantic object extraction results for a variety of video sequences are presented and evaluated.