The discrete wavelet transform (DWT) is an essential tool for image and signal processing. The edge-avoiding wavelet (EAW) is an extension for DWT to have edge-preserving property. EAW constructs a basis based on the edge content of input images; thus, the wavelet contains nonlinear filtering. DWT is computationally efficient processing in the scale-space analysis; however, EAW has a complex loop structure. Therefore, parallel computing for EAW is not an easy task. In this paper, we vectorize EAW computing by using single instruction, multiple data (SIMD) parallelization. Especially, the lifting-based wavelet allows the in-place operation, i.e., the source and destination array for DWT can be shared, and the in-place operation improves cache efficiency. However, the EAW prevents the operation in the update processing. Moreover, data interleaving for wavelet computing is the bottleneck for SIMD computing. Therefore, we show the suitable data structure for effective SIMD vectorization for EAW. Experimental results show that our effective implementation accelerates EAW. For the WCDF method, we accelerate more than two times faster, and for the WRB method, we accelerate about three times faster than the simple implementation.
Gaussian filtering (GF) is a fundamental smoothing filter that determines the weights in the kernel according to the Gaussian distribution. GF is an essential tool in image processing and is used in various applications. Therefore, accelerating GF is essential in various situations. The sliding DCT-based GF is one of the fastest methods for approximating GF. The Gaussian kernel is decomposed into multiple cosine kernels using the DCT transform and is approximated by the limited number of kernels. When calculating the period of the DCT for fitting the best length, a linear search method is used; however, the brute-force search has a significant impact on the filtering processing time. In this paper, we accelerate the period estimation by polynomial fitting. Experimental results show that the proposed method has almost the same accuracy as the brute-force approach.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.