Signal Processing for an Ultra Low Power Wireless Video Camera
- 66 Downloads
This paper describes the system design considerations of an ultra low power wireless camera (Figure 1). The function of this camera is to acquire, compress, code and transmit video data over a wireless link. The data rate is variable up to a maximum of 1Mbps (the image sensor has a spatial resolution of 256×256 quantized to 8 bits/pixel). Many of the design issues faced in the context of our wireless camera are common to those in other wireless applications. Total system power (computation as well as transmission) averaged over the normal operating conditions of the device should be minimized to maximize battery lifetime.
KeywordsBlock Cipher Stream Cipher Linear Feedback Shift Register Arithmetic Code Modular Multiplier
Unable to display preview. Download preview PDF.
- 1.J. Shapiro, Embedded image coding using zerotrees of wavelet coefficients, IEEE Transactions on Signal Processing, Dec. 1993.Google Scholar
- 2.T. Meng, B. Gordon, E. Tsern, A. Hung, Portable video on demand in wireless communication, Proceedings of the IEEE, pp. 659–680, April 1995.Google Scholar
- 3.W.Rabiner, A. Chandrakasan, Network driven motion estimation for portable video terminals, Proceedings of ICASSP ’87, to appear April 1997.Google Scholar
- 4.C.G. Gunther, Alternating step generators controlled by de bruijn sequences, Advances in Cryptology–EUROCRYPT ’87 Proceedings, Springer-Verlag, 1988, pp. 5–14.Google Scholar
- 5.D. Coppersmith, H. Krawczyk, Y. Mansour, The shrinking generator, Advances in Cryptology–CRYPTO ’83 Proceedings, Springer-Verlag, 1994, pp. 22–39.Google Scholar
- 6.W. MEier, O. Staffelbch, The self-shrinking generator, in: Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al., eds., Kluwer Academic Publishers, 1994, pp. 287–295.Google Scholar
- 7.B. Schneier, Applied Cryptography - Second Edition, Wiley Sons, Inc., New York, 1996, pp. 389, 662–667.Google Scholar
- 8.L. Blum, M. Blum, M. Shub, A simple unpredictable pseudo-random number generator, SIAM Journal on Computing, v. 15, n. 2, 1986, pp. 364–383.Google Scholar
- 9.A.M. Odlyzko, The future of integer factorization, Cryptobytes, RSA Laboratories, vol. 1, no. 2, Summer 1995, pp. 5–12.Google Scholar
- 10.N. Takagi, A radix-4 modular multiplication hardware algorithm for modular exponentiation, IEEE Transactions on Computers, vol. 41, no. 8, August 1992, pp. 949–956.Google Scholar
- 11.V. Gutnik, A. Chandrakasan, An efficient controller for variable supply-voltage low power processing, Proceedings of the VLSI Circuits Symposium, June 1996.Google Scholar