Signal Processing for an Ultra Low Power Wireless Video Camera

  • James Goodman
  • Tom Simon
  • Wendi Rabiner
  • Anantha P. Chandrakasan


This paper describes the system design considerations of an ultra low power wireless camera (Figure 1). The function of this camera is to acquire, compress, code and transmit video data over a wireless link. The data rate is variable up to a maximum of 1Mbps (the image sensor has a spatial resolution of 256×256 quantized to 8 bits/pixel). Many of the design issues faced in the context of our wireless camera are common to those in other wireless applications. Total system power (computation as well as transmission) averaged over the normal operating conditions of the device should be minimized to maximize battery lifetime.


Block Cipher Stream Cipher Linear Feedback Shift Register Arithmetic Code Modular Multiplier 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    J. Shapiro, Embedded image coding using zerotrees of wavelet coefficients, IEEE Transactions on Signal Processing, Dec. 1993.Google Scholar
  2. 2.
    T. Meng, B. Gordon, E. Tsern, A. Hung, Portable video on demand in wireless communication, Proceedings of the IEEE, pp. 659–680, April 1995.Google Scholar
  3. 3.
    W.Rabiner, A. Chandrakasan, Network driven motion estimation for portable video terminals, Proceedings of ICASSP ’87, to appear April 1997.Google Scholar
  4. 4.
    C.G. Gunther, Alternating step generators controlled by de bruijn sequences, Advances in Cryptology–EUROCRYPT ’87 Proceedings, Springer-Verlag, 1988, pp. 5–14.Google Scholar
  5. 5.
    D. Coppersmith, H. Krawczyk, Y. Mansour, The shrinking generator, Advances in Cryptology–CRYPTO ’83 Proceedings, Springer-Verlag, 1994, pp. 22–39.Google Scholar
  6. 6.
    W. MEier, O. Staffelbch, The self-shrinking generator, in: Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al., eds., Kluwer Academic Publishers, 1994, pp. 287–295.Google Scholar
  7. 7.
    B. Schneier, Applied Cryptography - Second Edition, Wiley Sons, Inc., New York, 1996, pp. 389, 662–667.Google Scholar
  8. 8.
    L. Blum, M. Blum, M. Shub, A simple unpredictable pseudo-random number generator, SIAM Journal on Computing, v. 15, n. 2, 1986, pp. 364–383.Google Scholar
  9. 9.
    A.M. Odlyzko, The future of integer factorization, Cryptobytes, RSA Laboratories, vol. 1, no. 2, Summer 1995, pp. 5–12.Google Scholar
  10. 10.
    N. Takagi, A radix-4 modular multiplication hardware algorithm for modular exponentiation, IEEE Transactions on Computers, vol. 41, no. 8, August 1992, pp. 949–956.Google Scholar
  11. 11.
    V. Gutnik, A. Chandrakasan, An efficient controller for variable supply-voltage low power processing, Proceedings of the VLSI Circuits Symposium, June 1996.Google Scholar

Copyright information

© Springer Science+Business Media New York 1997

Authors and Affiliations

  • James Goodman
    • 1
  • Tom Simon
    • 1
  • Wendi Rabiner
    • 1
  • Anantha P. Chandrakasan
    • 1
  1. 1.Department of EECSMassachusetts Institute of TechnologyCambridgeUSA

Personalised recommendations