• Title/Summary/Keyword: 디지털변조

Search Result 585, Processing Time 0.032 seconds

Fragile Watermarking for Integrity and Authentication (인증과 무결성을 위한 연성 워터마킹)

  • Lee, Hye-Ran;Park, Ji-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.875-878
    • /
    • 2001
  • 본 논문에서는 디지털 영상의 변조를 확인함과 동시에 변조의 위치를 확인하는 연성 워터마킹(fragile watermarking)을 위하여 DCT를 통해 블록의 에너지를 계산한 후, 에너지의 단계별로 워터마크의 삽입량을 조절하는 방법을 제안한다. 디지털 영상의 소유권 확인을 위해 디지털 서명을 사용하며, 영상에 DCT를 수행함으로서 모든 픽셀에 워터마크를 삽입하지 않고서도 변조의 유무를 확인하는 것이 가능하 방식이다. DCT 계수로 각 블록의 에너지를 계산하여 블록의 관계를 분류하며 에너지가 작은 블록들과 큰 블록들은 이간의 시각에 민감한 부분이므로 워터마크의 삽입 양을 줄이고, 중간 단계의 블록일수록 워터마크의 삽입 양을 늘린다. 에너지의 단계 분류에 의해 가변적으로 워터마크를 삽입함으로 워터마크의 비가시성과 연성을 만족시키며 변조의 유무와 위치를 확인할 수 있게 된다.

  • PDF

Limitations of Spectrogram Analysis for Smartphone Voice Recording File Forgery Detection (스마트폰 음성 녹음 파일 위변조 검출을 위한 스펙트로그램 분석의 한계점)

  • Sangmin Han;Yeongmin Son;Jae Wan Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.545-551
    • /
    • 2023
  • As digital information is readily available to everyone today, the adoption of digital evidence is increasing. However, it is virtually impossible to determine the authenticity of forgery in the case of a voice recording file that has gone through a sophisticated editing process along with the spread of various voice file editing tools. This study aims to prove that forgery, which is difficult to distinguish from the original file, is possible by using insertion, deletion, linking, and synthetic editing technologies in voice recording files. This study presents the difficulty of detecting forgery by encoding a forged voice file with the same extension as the original. In addition, it was shown that forgery detection is impossible if additional transition band deletion and secondary encoding are performed only for experiments in which features occurred. Through this, this study is expected to contribute to the establishment of more stringent evidence admissibility criteria for adopting voice recording files as digital evidence.

Investigation of miximum permitted error limits for second order sigma-delta modulator with 14-bit resolution (14 비트 분해능을 갖는 2차 Sigma-Delta 변조기 설계를 위한 구성요소의 최대에러 허용 범위 조사)

  • Cho, Byung-Woog;Choi, Pyung;Sohn, Byung-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.5
    • /
    • pp.1310-1318
    • /
    • 1998
  • Sigma-delta converter is frequently used for conyerting low-frequency anglog to digital signal. The converter consists of a modulator and a digital filer, but our work is concentrated on the modulator. In this works, to design second-order sigma-dalta modulator with 14bit resolution, we define maximumerror limits of each components (operational smplifier, integrator, internal ADC, and DAC) of modulator. It is first performed modeling of an ideal second-order sigma-delta modulator. This is then modified by adding the non-ideal factors such as limit of op-amp output swing, the finit DC gain of op-amp slew rate, the integrator gian error by the capacitor mismatch, the ADC error by the cmparator offset and the mismatch of resistor string, and the non-linear of DAC. From this modeling, as it is determined the specification of each devices requeired in design and the fabrication error limits, we can see the final performance of modulator.

  • PDF

Analysis of Digital Modulation Signal and Phase Noise′s Relation Characteristics in the OFDM Systems (OFDM에서 디지털변조 신호와 위상잡음 관계 특성분석)

  • 윤성하;이영철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.270-274
    • /
    • 2002
  • 본 논문은 고속 무선랜에 적용하고 있는 OFDM시스템에서 국부발진기의 위상잡음에 의해서 기저대역의 채널에서 나타나는 위상변위특성을 해석하고, 국부발진기를 포함하는 PLL시스템에서 위상잡음 변화를 수치적인 해석을 하였다. OFDM신호를 QPSK, 16QAM 변조신호로 전송하였을 경우, 위상잡음에 따른 관계를 변조신호의 성상도 및 BER관계로써 분석하였다.

  • PDF

Design and Performance Evaluation of Fiber Optic Gyro with Digital Closed-loop Processing (디지털 폐루프 신호처리를 적용한 광섬유 자이로 설계 및 성능평가)

  • 도재철;정경호
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.9
    • /
    • pp.97-103
    • /
    • 2006
  • This paper described the design and performance evaluation of fiber optic gyro using digital closed-loop processing. For the feedback to null the gyro input rate, digital serrodyne modulation was employed, and for scale factor stabilization, the control circuits of modulation amplitude and optical power are implemented. Performance tests show that prototype fiber optic gyro has bias stability of 0.34 deg/hr, scale factor non-lineality of about 100ppm, and maximum measurement range of ${\pm}500$ deg/sec.

A Study on the Evidence Investigation of Forged/Modulated Time-Stamp at iOS(iPhone, iPad) (iOS(iPhone, iPad)에서의 타임스탬프 위·변조 흔적 조사에 관한 연구)

  • Lee, Sanghyun;Lee, Yunho;Lee, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • Since smartphones possess a variety of user information, we can derive useful data related to the case from app data analysis in the digital forensic perspective. However, it requires an appropriate forensic measure as smartphone has the property of high mobility and high possibility of data loss, forgery, and modulation. Especially the forged/modulated time-stamp impairs the credibility of digital proof and results in the perplexity during the timeline analysis. This paper provides traces of usage which could investigate whether the time-stamp has been forged/modulated or not within the range of iOS based devices.

ENF based Detection of Forgery and Falsification of Digital Files due to Quadratic Interpolation (이차 보간에 따른 ENF 기반의 위변조 디지털 파일 탐지 기법)

  • Park, Se Jin;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.311-320
    • /
    • 2018
  • Recently, the use of digital audio and video as proof in criminal and all kinds of litigation is increasing, and scientific investigation using digital forensic technique is developing. With the development of computing and file editing technologies, anyone can simply manipulate video files, and the number of cases of manipulating digital data is increasing. As a result, the integrity of the evidence and the reliability of the evidence Is required. In this paper, we propose a technique for extracting the Electrical Network Frequency (ENF) through a grid of power grids according to the geographical environment for power supply, and then performing signal processing for peak detection using QIFFT. Through the detection algorithm using the standard deviation, it was confirmed that the video file was falsified with 73% accuracy and the forgery point was found.

A Digital Input Class-D Audio Amplifier (디지털 입력 시그마-델타 변조 기반의 D급 오디오 증폭기)

  • Jo, Jun-Gi;Noh, Jin-Ho;Jeong, Tae-Seong;Yoo, Chang-Sik
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.11
    • /
    • pp.6-12
    • /
    • 2010
  • A sigma-delta modulator based class-D audio amplifier is presented. Parallel digital input is serialized to two-bit output by a fourth-order digital sigma-delta noise shaper. The output of the digital sigma-delta noise shaper is applied to a fourth-order analog sigma-delta modulator whose three-level output drives power switches. The pulse density modulated (PDM) output of the power switches is low-pass filtered by an LC-filter. The PDM output of the power switches is fed back to the input of the analog sigma-delta modulator. The first integrator of the analog sigma-delta modulator is a hybrid of continuous-time (CT) and switched-capacitor (SC) integrator. While the sampled input is applied to SC path, the continuous-time feedback signal is applied to CT path to suppress the noise of the PDM output. The class-D audio amplifier is fabricated in a standard $0.13-{\mu}m$ CMOS process and operates for the signal bandwidth from 100-Hz to 20-kHz. With 4-${\Omega}$ load, the maximum output power is 18.3-mW. The total harmonic distortion plus noise and dynamic range are 0.035-% and 80-dB, respectively. The modulator consumes 457-uW from 1.2-V power supply.

A Study on Characteristics and Techniques that Affect Data Integrity for Digital Forensic on Flash Memory-Based Storage Devices (플래시 메모리 기반 저장장치에서 디지털 포렌식을 위한 데이터 무결성에 영향을 주는 특성 및 기술 연구)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.7-12
    • /
    • 2023
  • One of the most important characteristics of digital forensics is integrity. Integrity means that the data has not been tampered with. If evidence is collected during digital forensic and later tampered with, it cannot be used as evidence. With analog evidence, it's easy to see if it's been tampered with, for example, by taking a picture of it. However, the data on the storage media, or digital evidence, is invisible, so it is difficult to tell if it has been tampered with. Therefore, hash values are used to prove that the evidence data has not been tampered with during the process of collecting evidence and submitting it to the court. The hash value is collected from the stored data during the evidence collection phase. However, due to the internal behavior of NAND flash memory, the physical data shape may change over time from the acquisition phase. In this paper, we study the characteristics and techniques of flash memory that can cause the physical shape of flash memory to change even if no intentional data corruption is attempted.

A Study on Rivalry Technology of Anti-Digital Forensic (안티 디지털 포렌식에 대한 대응 기술 연구)

  • Lee, Gyu-An;Park, Dae-Woo;Shin, Young-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2008.06a
    • /
    • pp.183-188
    • /
    • 2008
  • 디지털 포렌식이 활성화 되고 수사에서 활용하는 사례가 증가함에 따라 기업과 개인을 비롯한 범죄혐의자들의 이에 대응하기 위한 기술도 증가하고 있다. 이를 안티포렌식 또는 항포렌식이라고 하는데 이는 디지털 자료의 변조, 파괴, 은닉 등으로 나누어 볼 수 있다. 본 논문에서는 범죄 수사현장에서 필요한 안티포렌식에 대응하는 기술인 위 변조된 데이터 추출 기법, 슬랙 영역의 숨겨진 데이터 추출 기법, 스테카노 그래픽 추출 및 분석 기법, 암호 복호화 기법, 삭제된 데이터 및 파괴된 데이터 복원 기법을 소개하고, 이에 대한 대비책을 제시한다. 본 연구를 통하여 첨단 범죄 수사관들이 안티디지털포렌식에 대한 새로운 디지털 증거의 추출과 분석에 기여하여 컴퓨터 및 첨단 범죄에 대한 디지털 포렌식 기술로 새로운 수사의 방향을 제시 할 수 있을 것이다.

  • PDF