• Title/Summary/Keyword: 이진위상변조

Search Result 31, Processing Time 0.028 seconds

Optical encryption system using phase-encoded virtual image (가상 위상 영상을 이용한 광학적 암호화 시스템)

  • 서동환;신창목;김수중;배장근;김철수;도양회
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.249-254
    • /
    • 2003
  • In this paper, we propose an improved image encryption and decryption method using a phase-encoded virtual image and interference. An original image is simply decrypted by interfering a reference wave with the wave passing through a decrypting key and the encrypted image, where every image has grey level. The proposed encryption is performed by the multiplication of an encrypting key and a phase-encoded virtual image which dose not contain any information for the original image. Therefore even if unauthorized people analyze the encrypted image, they cannot reconstruct the original image. Also grey image encryption can improve the encryption level compared to binary image encryption. Computer simulation and optical experiments confirmed that the proposed technique is a simple for optical encryption.

Amplitude and Phase Variant SLM Scheme for PAPR Reduction in QAM Modulated OFDM Signals (직교 주파수 분할 다중화 신호의 최대전력 대 평균전력의 비 감소를 위한 크기 및 위상 변이 선택 사상 기법)

  • Jeon, Hyun-Bae;Kim, Ki-Hoon;No, Jong-Seon;Shin, Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.203-209
    • /
    • 2010
  • In this paper, we propose a new selected mapping (SLM) scheme for reducing peak to average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) signals modulated with quadrature amplitude modulation (QAM), called amplitude and phase variant SLM (APSLM). Contrary to the conventional SLM which rotates the phases of QAM symbols in the frequency domain, the proposed scheme changes the magnitudes as well as the phases of QAM symbols by applying binary sequences to the binary data sequence before mapped to QAM symbols. Simulation results show that the proposed scheme has better PAPR reduction performance than the conventional SLM scheme for the QAM modulated OFDM signals, especially for the small number of subcarriers.

Fully Phase-based Optical Encryption System Using Computer Holography and Fresnel Diffraction (컴퓨터 홀로그래피와 프레넬 회절을 이용한 위상 영상 광 암호화 시스템)

  • 윤경효;신창목;조규보;김수중;김철수;서동환
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.11
    • /
    • pp.43-51
    • /
    • 2004
  • In this paper, we propose a high-level optical encryption system, which is tolerant with noises and cropping, by encrypting the phase-encoded CGH pattern of original image with the phase-encoded Fresnel diffraction pattern of random key images. For encryption, the phase-encoded CGH pattern of original image is multiplied by conjugate components which are the phase-encoded Fresnel diffraction patterns of random key images. The original information can be reconstructed by multiplying encrypted image by phase-encoded Fresnel diffraction pattern of random key images and performing Fourier transform of the multiplication result. The proposed system is robust to noises and cropping due to characteristics of CGH pattern and can guarantee high-level encryption by using Fresnel diffraction information. We verified the validity of proposed system by computer simulations, numerical analysis of noises and cropping effect and optical experiment.

Multi-code Bipolar Transorthogonal Code Keying with Constant Amplitude preceding (정 진폭 부호화를 사용한 다중코드 양극 Transorthgonal 변조 방식)

  • Kim, Sung-Pil;Kim, Myoung-Jin
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.2
    • /
    • pp.61-71
    • /
    • 2004
  • Transorthogonal 코드를 블록 단위로 확장해서 얻은 코드 집합을 적절하게 부집합으로 나누고 부호화기의 코드집합으로 할당한다. 이러한 부초화기를 병렬로 구성하고 정보 비트에 의해 선택된 부호화기의 각 출력 코드들을 합산하여 전송하는 다중코드 transorthogonal 변조 방식이 제안되어 있다. 본 논문에서는 다중코드 transorthogonal 변조 시스템의 부호화기로부터의 각 출력 코드를 또 다른 정보 비트로 이진 위상 변조한 후 합산하여 전송하는 시스템을 제안한다. 다중코드 transorthogonal 변조 시스템에서 적용된 정 진폭 부호화 알고리즘과정 전폭 부호화에 사용된 잉여비트를 이용한 수신 에러 정정 알고리즘을 제안된 시스템에 수정 없이 적용할 수 있으며 다중코드 transorthogonal 변조 방식에 비해 대역폭 효율이 개선됨을 보인다.

  • PDF

Holographic storage of binary amplitude data patterns via their random phase modulation (이진진폭데이타 영상의 랜덤위상변조를 통한 홀로그래픽 저장)

  • 오용석;신동학;장주석
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2001.02a
    • /
    • pp.62-63
    • /
    • 2001
  • We studied a method to use a variable discrete random phase mask in 2-D binary data representation for efficient holographic data storage. The variable phase mask is realized by use of a liquid crystal display.

  • PDF

PWM 압전 변압기의 위상 및 펄스폭 제어

  • Yun, Seok-Taek;Park, Hong-Won;Won, Yeong-Jin;Lee, Jin-Ho;Kim, Jin-Hui
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2009.11a
    • /
    • pp.223-223
    • /
    • 2009
  • 압전 변압기(PT)는 전자제품의 전원 공급 장치에서 마그네틱 변압기의 대안으로서 소형화와 높은 절연 내압의 특성 등을 가지고 있다. 이는 시스템의 소형화와 절연 특성을 크게 높일수있는 장점을 지니고있다. 본 논문에서는 고정주파수 펄스폭 변조 압전 변압기의 구동을 위해, AM modulation을 이용한, 한 점에서의 센싱을 통한 위상제어와 펄스폭 변조 제어를 제안하였다. 이를 위해 EDF 소신호 분석을 하였고, 루프를 설계하여 검증하여 보았다.

  • PDF

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.

CACB-Q2PSK Modulation for Efficient Bandwidth Utilization and Constant Amplitude Signal Transmission (효율적인 대역폭 이용과 정진폭 신호 전송을 위한 CACB-Q2PSK 변조)

  • Hong, Dae-Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.1
    • /
    • pp.93-99
    • /
    • 2008
  • In this paper, we propose new modulation schemes using the conventional CACB modulation with constant amplitude property. Also the proposed modulation schemes supports high transmission data rate by increasing the spectral efficiency. In order to obtain the high spectral efficiency, the $Q^2$PSK and CA-$Q^2$PSK are used. We explain the simplest combining modulation scheme of CACB and $Q^2$PSK (i.e., CACB-$Q^2$PSK). However, this modulation scheme cannot support the constant amplitude property. Hence the first CACB-CA-$Q^2$PSK (or CACB-CA-$Q^2$PSK I) modulation scheme is proposed for the constant amplitude property. In the modulation scheme, the redundant constant amplitude encoding (spectral efficiency decrease) is required. Therefore, the second CACB-CA-$Q^2$PSK (or CACB-CA-$Q^2$PSK II) modulation scheme is proposed retaining the constant amplitude and the spectral efficiency. Computer simulations show that the proposed CACB-CA-$Q^2$PSK II is the efficient modulation scheme.

CACB-Q2AM Modulation for High Bandwidth Efficiency and Constant Amplitude Signal Transmission (높은 대역폭 효율과 정진폭 신호 전송을 위한 CACB-Q2AM 변조)

  • Hong, Dae-Ki;Kang, Sung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • In this paper, we propose new modulation schemes using the conventional CACB (Constant Amplitude Coded Multicode Biorthogonal) modulation with constant amplitude property. Also the proposed modulation schemes supports high transmission data rate by increasing the spectral efficiency, In order to obtain the high spectral efficiency, the $Q^2$AM (Quadrature-Quadrature Amplitude Modulation) and CA-$Q^2$AM (Constant Amplitude-$Q^2$AM) are used. We explain the simplest combining modulation scheme of CACB and $Q^2$AM (i.e., CACB-$Q^2$AM). However, this modulation scheme cannot support the constant amplitude property. Hence the first CACB-CA-$Q^2$AM (or CACB-CA-$Q^2$AM I) modulation scheme is proposed for the constant amplitude property. In the modulation scheme, the redundant constant amplitude encoding (spectral efficiency decrease) is required. Therefore, the second CACB-CA-$Q^2$AM (or CACB-CA-$Q^2$AM II) modulation scheme is proposed retaining the constant amplitude and the spectral efficiency. Computer simulations show that the proposed CACB-CA-$Q^2$AM II is the efficient modulation scheme.

  • PDF