• Title/Summary/Keyword: 디지털변조

Search Result 586, Processing Time 0.034 seconds

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.

Color Laser Printer Identification through Discrete Wavelet Transform and Gray Level Co-occurrence Matrix (이산 웨이블릿 변환과 명암도 동시발생 행렬을 이용한 컬러 레이저프린터 판별 알고리즘)

  • Baek, Ji-Yeoun;Lee, Heung-Su;Kong, Seung-Gyu;Choi, Jung-Ho;Yang, Yeon-Mo;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.17B no.3
    • /
    • pp.197-206
    • /
    • 2010
  • High-quality and low-price digital printing devices are nowadays abused to print or forge official documents and bills. Identifying color laser printers will be a step for media forensics. This paper presents a new method to identify color laser printers with printed color images. Since different printer companies use different manufactural systems, printed documents from different printers have little difference in visual. Analyzing this artifact, we can identify the color laser printers. First, high-frequency components of images are extracted from original images with discrete wavelet transform. After calculating the gray-level co-occurrence matrix of the components, we extract some statistical features. Then, these features are applied to train and classify the support vector machine for identifying the color laser printer. In the experiment, total 2,597 images of 7 printers (HP, Canon, Xerox DCC400, Xerox DCC450, Xerox DCC5560, Xerox DCC6540, Konica), are tested to classify the color laser printer. The results prove that the presented identification method performs well with 96.9% accuracy.

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.

XSS Attack and Countermeasure: Survey (XSS 공격과 대응방안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.327-332
    • /
    • 2013
  • XSS is an attacker on the other party of the browser that is allowed to run the script. It is seized session of the users, or web site modulation, malicious content insertion, and phishing attack which is available. XSS attacks are stored XSS and reflected XSS. In that, two branch attacks. The form of XSS attacks are cookie sniffing, script encryption, bypass, the malignant cord diffusion, Key Logger, Mouse Sniffer, and addition of lie information addition. XSS attacks are target of attack by script language. Therefore, the countermeasure of XSS is presented and proposed to improve web security.

A Study on the Development of Radio Data Receiver System(I) (라디오 데이터 수신 시스템 개발에 관한 연구(I))

  • 김기근;허동규;김주광;유흥균;배현덕;박우용;차홍인;이종하
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.8
    • /
    • pp.758-769
    • /
    • 1991
  • We have investigaed the radio data system which is used for the VHF/FM streo broadcasting system. The RDS system has the I6 important service features which is given by the digital multiplexed modulation method above the FM stereo baseband spectrum. The related cicuit system and general-purpose micro-controller have been applicated for the demodulation and processing of transmitted digital information at the rate of 1187.5bps, and we have developed the receiver system which performs the primary 5 features. The develpoed system has the complete compatibility with the conventional FM-car stereo receiver, we have analyzed the received RDS signal via the hardware implementation.

  • PDF

Transmission of Image Embedded with Robust Watermark through OFDM/16QAM System (OFDM/16QAM 시스템에서 강건한 워터마크가 삽입된 영상의 전송)

  • Won, Gi-Sup;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2004
  • In this paper, we have studied the reliable scheme for transmission of digital watermarking-inserted image data through wireless channel. Multimedia data and watermarking data are degraded because of the high BER (Bit Error Rate) and the effect of fading in wireless channel. We adapt the error correction scheme for mitigating the degradation in watermarking data. We have evaluated the error performance of watermarking data modulated by OFDM/16QAM and sent through Rician fading channel. The simulation results show that when error correcting scheme is used the watermarking data can be detected without severe error even though watermarking-inserted image data is suffered from severe damage.

  • PDF

Evaluation of image Quality for Radiographic positioning using IEC Radiation Quality & Clinical condition (IEC 선질과 임상조건을 이용한 방사선영상의 품질평가)

  • An, Hyeon;Kim, Changsoo;Kim, Jung-Hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.177-178
    • /
    • 2015
  • 디지털방사선영상시스템의 영상 품질을 비교하기 위해 영상의 정량적인 분해능을 나타내는 변조전달함수(MTF), 노이즈 특성을 나타내는 잡음력 스펙트럼(NPS)을 이용하여 영상 품질평가를 하였다. IEC61267 선질을 사용하여 IEC62220-1에서 제시하는 기하학적인 조건과 실제 임상에서 사용되어지는 기하학적인 조건을 사용하여 그리드 및 부가필터, 임상선량을 이용하여 edge 팬텀을 사용하여 MTF, NPS값을 측정하였다. 그리드사용 유 무, 부가필터사용 유 무, kV, 임상선량(mAs), 영상검출기까지의 거리에 따른 MTF 결과는 임상조건 100cm, 180cm과 IEC62220-1 기하학적인 조건 150cm에서 MTF 공간주파수 측정값은 비슷하게 나타났으며, 오히려 임상조건 100cm에서 공간주파수가 높게 나타나는 경우도 있었다. NPS 결과는 선량(mAs)이 증가함에 따라 감소함을 나타내었다. IEC61267 선질을 이용한 영상품질평가에서는 IEC62220-1기하학적인 조건을 이용한 품질평가보다 임상조건 기하학적인 조건을 사용한 영상의 품질이 좋았다. 본 논문의 영상특성 평가 연구 결과들을 바탕으로 향후 IEC 표준의 영상평가에서 제시하는 평가방법보다는 임상 조건을 적용한 영상특성 평가방법을 적용한다면 실제 임상의 디지털방사선영상시스템의 영상품질을 적절하게 유지할 수 있을 것으로 사료된다.

  • PDF

Improved Visual Cryptography Using Cover Images (커버영상을 이용한 개선된 시각암호)

  • Jang, Si-Hwan;Choi, Yong Soo;Kim, Hyoung Joong
    • Journal of Digital Contents Society
    • /
    • v.13 no.4
    • /
    • pp.531-538
    • /
    • 2012
  • Visual cryptography is a scheme that recovers secret image through human vision by overlapping distributed share images without cryptographic operations. Distribution methods are still being developed for improving quality of shared images keeping size of images invariant and enhancing robustness against resize of images. Since visual cryptography only uses shared images, this fact is exploited to attack. From this fact, a scheme safe for sharing distributed images is needed. In this paper, a new visual cryptographic scheme using cover image is proposed. This scheme reduces the chance of detection against steganalysis and increases security. In addition, this paper shows that the proposed scheme can completely decrypt secret image without creating noise.

Sigma-Delta Modulator using a novel FDPA(Feedback Delay Path Addition) Technique (새로운 FDPA 기법을 사용한 시그마-델타 변조기)

  • Jung, Eui-Hoon;Kim, Jae-Bung;Cho, Seong-Ik
    • Journal of IKEEE
    • /
    • v.17 no.4
    • /
    • pp.511-516
    • /
    • 2013
  • This paper presents a SDM using the FDPA technique. The FDPA technique is the added feedback path which is the delayed path of DAC output. The designed SDM increases the SNR by adding the delayed digital feedback path. The proposed SDM is easily implemented by eliminating the analog feedback path. Through the MATLAB modeling, the optimized coefficients are obtained to design the SDM. The designed SDM has a power consumption of $220{\mu}W$ and SNR(signal to noise ratio) of 81dB at the signal-bandwidth of 20KHz and sampling frequency of 2.56MHz. The SDM is designed using the $0.18{\mu}m$ standard CMOS process.

Design of 5GHz High Efficiency Frequency Multiplier and Digital Linearization (5GHz 대역 고효율 주파수 체배기 설계 및 디지털 선형화)

  • Roh, Hee-Jung;Jeon, Hyun-Jin;Koo, Kyung-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.846-853
    • /
    • 2009
  • This paper presents the design of a high efficiency frequency multiplier with load-pull simulation and analyses the nonlinear distortion of the frequency multiplier. The frequency multiplier shows serious distortion of multiplying signal bandwidth because of nonlinearity when modulated signal is applied, so a digital predistortion with look up table (LUT) is applied to compensate for the distortion of the frequency multiplier. The frequency multiplier is designed to produce 5.8GHz output by doubling the input frequency to be operating at IEEE 802.11a standard wireless LAN. The output spectrum shows 12dB ACPR improvement both at +11MHz, +20MHz offset from center frequency after linearization.

  • PDF