The Community for Technology Leaders
Green Image
Issue No. 01 - January-March (2005 vol. 2)
ISSN: 1545-5971
pp: 57-75
The JPEG 2000 image compression standard is designed for a broad range of data compression applications. The new standard is based on wavelet technology and layered coding in order to provide a rich feature compressed image stream. The implementations of the JPEG 2000 codec are susceptible to computer-induced soft errors. One situation requiring fault tolerance is remote-sensing satellites, where high energy particles and radiation produce single event upsets corrupting the highly susceptible data compression operations. This paper develops fault tolerance error-detecting capabilities for the major subsysyems that constitute a JPEG 2000 standard. The nature of the subsystem dictates the realistic fault model where some parts have numerical error impacts whereas others are properly modeled using bit-level variables. The critical operations of subunits such as Discrete Wavelet Transform (DWT) and quantization are protected against numerical errors. Concurrent error detection techniques are applied to accommodate the data type and numerical operations in each processing unit. On the other hand, the Embedded Block Coding with Optimal Truncation (EBCOT) system and the bitstream formation unit are protected against soft-error effects using binary decision variables and cyclic redundancy check (CRC) parity values, respectively. The techniques achieve excellent error-detecting capability at only a slight increase in complexity. The design strategies have been tested using Matlab programs and simulation results are presented.
Fault-tolerant source coding, Soft errors, JPEG 2000 standard, data compression, Discrete Wavelet Transform (DWT), algorithm-based fault tolerance, error control codes, Huffman coding, error-checking, concurrent error detection, hardware reliability, weighted sum parity.
Cung Nguyen, G. Robert Redinbo, "Fault Tolerance Design in JPEG 2000 Image Compression System", IEEE Transactions on Dependable and Secure Computing, vol. 2, no. , pp. 57-75, January-March 2005, doi:10.1109/TDSC.2005.11
99 ms
(Ver )