• Title/Summary/Keyword: Amount of mutual information

Search Result 57, Processing Time 0.024 seconds

Ultra-light Mutual Authentication Scheme based on Text Steganography Communication

  • Lee, Wan Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.11-18
    • /
    • 2019
  • Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.

Mutual information analysis of EEG in stimuli of odors (향 자극에 대한 뇌파의 상호 정보량 분석)

  • 민병찬;강인형;최지연;정순철;김철중
    • Science of Emotion and Sensibility
    • /
    • v.6 no.2
    • /
    • pp.17-20
    • /
    • 2003
  • The present study analyzed and compared the mutual information obtained by stimulating saleswomen with 6 natural fragrances 100% basil oil, Lavender oil, lemon oil, jasmine oil, ylang-ylang oil (KIMEX Co., Ltd.), and skatole. When stimulated with basil and skatole, which were less favored fragrances, the women produced a greater amount of mutual information than when not stimulated with any fragrance. In addition, a comparison among the effects of the fragrances revealed that the subjects tended to produce more mutual information regarding less favored fragrances than regarding more favored ones. This is because the amount of mutual information in the cerebrum is linked to the women's preference regarding fragrances. Consequently, less favored fragrances have been demonstrated clearly to produce more mutual information among the subjects.

  • PDF

Deformable Registration for MRI Medical Image

  • Li, Binglu;Kim, YoungSeop;Lee, Yong-Hwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.2
    • /
    • pp.63-66
    • /
    • 2019
  • Due to the development of medical imaging technology, different imaging technologies provide a large amount of effective information. However, different imaging method caused the limitations of information integrity by using single type of image. Combining different image together so that doctor can obtain the information from medical image comprehensively. Image registration algorithm based on mutual information has become one of the hotspots in the field of image registration with its high registration accuracy and wide applicability. Because the information theory-based registration technology is not dependent on the gray value difference of the image, and it is very suitable for multimodal medical image registration. However, the method based on mutual information has a robustness problem. The essential reason is that the mutual information itself is not have enough information between the pixel pairs, so that the mutual information is unstable during the registration process. A large number of local extreme values are generated, which finally cause mismatch. In order to overcome the shortages of mutual information registration method, this paper proposes a registration method combined with image spatial structure information and mutual information.

ONLINE TEST BASED ON MUTUAL INFORMATION FOR TRUE RANDOM NUMBER GENERATORS

  • Kim, Young-Sik;Yeom, Yongjin;Choi, Hee Bong
    • Journal of the Korean Mathematical Society
    • /
    • v.50 no.4
    • /
    • pp.879-897
    • /
    • 2013
  • Shannon entropy is one of the widely used randomness measures especially for cryptographic applications. However, the conventional entropy tests are less sensitive to the inter-bit dependency in random samples. In this paper, we propose new online randomness test schemes for true random number generators (TRNGs) based on the mutual information between consecutive ${\kappa}$-bit output blocks for testing of inter-bit dependency in random samples. By estimating the block entropies of distinct lengths at the same time, it is possible to measure the mutual information, which is closely related to the amount of the statistical dependency between two consecutive data blocks. In addition, we propose a new estimation method for entropies, which accumulates intermediate values of the number of frequencies. The proposed method can estimate entropy with less samples than Maurer-Coron type entropy test can. By numerical simulations, it is shown that the new proposed scheme can be used as a reliable online entropy estimator for TRNGs used by cryptographic modules.

Maximum mutual information estimation linear spectral transform based adaptation (Maximum mutual information estimation을 이용한 linear spectral transformation 기반의 adaptation)

  • Yoo, Bong-Soo;Kim, Dong-Hyun;Yook, Dong-Suk
    • Proceedings of the KSPS conference
    • /
    • 2005.04a
    • /
    • pp.53-56
    • /
    • 2005
  • In this paper, we propose a transformation based robust adaptation technique that uses the maximum mutual information(MMI) estimation for the objective function and the linear spectral transformation(LST) for adaptation. LST is an adaptation method that deals with environmental noises in the linear spectral domain, so that a small number of parameters can be used for fast adaptation. The proposed technique is called MMI-LST, and evaluated on TIMIT and FFMTIMIT corpora to show that it is advantageous when only a small amount of adaptation speech is used.

  • PDF

Correlation Measure for Big Data (빅데이터에서의 상관성 측도)

  • Jeong, Hai Sung
    • Journal of Applied Reliability
    • /
    • v.18 no.3
    • /
    • pp.208-212
    • /
    • 2018
  • Purpose: The three Vs of volume, velocity and variety are commonly used to characterize different aspects of Big Data. Volume refers to the amount of data, variety refers to the number of types of data and velocity refers to the speed of data processing. According to these characteristics, the size of Big Data varies rapidly, some data buckets will contain outliers, and buckets might have different sizes. Correlation plays a big role in Big Data. We need something better than usual correlation measures. Methods: The correlation measures offered by traditional statistics are compared. And conditions to meet the characteristics of Big Data are suggested. Finally the correlation measure that satisfies the suggested conditions is recommended. Results: Mutual Information satisfies the suggested conditions. Conclusion: This article builds on traditional correlation measures to analyze the co-relation between two variables. The conditions for correlation measures to meet the characteristics of Big Data are suggested. The correlation measure that satisfies these conditions is recommended. It is Mutual Information.

Saliency Detection using Mutual Information of Wavelet Subbands (웨이블릿 부밴드의 상호 정보량을 이용한 세일리언시 검출)

  • Moon, Sang Whan;Lee, Ho Sang;Moon, Yong Ho;Eom, Il Kyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.72-79
    • /
    • 2017
  • In this paper, we present a new saliency detection algorithm using the mutual information of wavelet subbands. Our method constructs an intermediate saliency map using the power operation and Gaussian blurring for high-frequency wavelet coefficients. After combining three intermediate saliency maps according to the direction of wavelet subband, we find the main directional components using entropy measure. The amount of mutual information of each subband is obtained centering on the subband having the minimum entropy The final saliency map is detected using Minkowski sum based on weights calculated by the mutual information. As a result of the experiment on CAT2000 and ECSSD databases, our method showed good detection results in terms of ROC and AUC with few computation times compared with the conventional methods.

Similarity Comparison Among Open API Parameters Using Open API Description Document (Open API 기술문서를 이용한 Open API 파라미터 유사도 비교)

  • Kim, Sang-il;Kim, Hwa-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.241-243
    • /
    • 2016
  • The recent spread of smart devices has led to creating a variety of services based on the smart device, and the needs for the user-centric services that fit the individual users according to their situations and characteristics are increasing. However, current services can not fulfil the individual requirement of individual user, because these services are intended for unspecified individual. This paper, as a key technology of automatic user-centric service mash-up considering the situation of individual user, investigated the similarity comparison method between the Open API parameters by calculating the amount of mutual information of the parameters extracted from the Open API documents.

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.

A Measurement Allocation for Reliable Data Gathering in Spatially Corrected Sensor Networks (공간상관 센서필드에서 측정 스케쥴링)

  • Byun, Sang-Seon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.399-402
    • /
    • 2017
  • We consider an sensor partitioning problem for energy-efficient measurement scheduling in a spatially correlated sensor field where sensors are located randomly. We divide the whole sensors into subsets of k sensors in the way of letting each subset give similar amount of mutual information. Then it allows more prolonged life time of the sensor field than measuring the sensors that gives most information only. To this end, we compute the Shapley value of each sensor and compose the subsets so that each subset can have total Shapley value similar with the other subsets.

  • PDF