• Title/Summary/Keyword: BITs

Search Result 1,631, Processing Time 0.026 seconds

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability

  • Qin, Chuan;Chang, Chin-Chen;Hsu, Tai-Jung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2941-2956
    • /
    • 2013
  • In this paper, we propose an effective fragile image watermarking scheme for tampering detection and content recovery. Cover image is divided into a series of non-overlapping blocks and a block mapping relationship is constructed by the secret key. Several DCT coefficients with direct current and lower frequencies of the MSBs for each block are used to generate the reference bits, and different coefficients are assigned with different bit numbers for representation according to their importance. To enhance recovery performance, authentication bits are generated by the MSBs and the reference bits, respectively. After LSB substitution hiding, the embedded watermark bits in each block consist of the information of itself and its mapping blocks. On the receiver side, all blocks with tampered MSBs can be detected and recovered using the valid extracted reference bits. Experimental results demonstrate the effectiveness of the proposed scheme.

FPGA implementation of overhead reduction algorithm for interspersed redundancy bits using EEDC

  • Kim, Hi-Seok
    • Journal of IKEEE
    • /
    • v.21 no.2
    • /
    • pp.130-135
    • /
    • 2017
  • Normally, in data transmission, extra parity bits are added to the input message which were derived from its input and a pre-defined algorithm. The same algorithm is used by the receiver to check the consistency of the delivered information, to determine if it is corrupted or not. It recovers and compares the received information, to provide matching and correcting the corrupted transmitted bits if there is any. This paper aims the following objectives: to use an alternative error detection-correction method, to lessens both the fixed number of the required redundancy bits 'r' in cyclic redundancy checking (CRC) because of the required polynomial generator and the overhead of interspersing the r in Hamming code. The experimental results were synthesized using Xilinx Virtex-5 FPGA and showed a significant increase in both the transmission rate and detection of random errors. Moreover, this proposal can be a better option for detecting and correcting errors.

On Recovering Erased RSA Private Key Bits

  • Baek, Yoo-Jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.11-25
    • /
    • 2018
  • While being believed that decrypting any RSA ciphertext is as hard as factorizing the RSA modulus, it was also shown that, if additional information is available, breaking the RSA cryptosystem may be much easier than factoring. For example, Coppersmith showed that, given the 1/2 fraction of the least or the most significant bits of one of two RSA primes, one can factorize the RSA modulus very efficiently, using the lattice-based technique. More recently, introducing the so called cold boot attack, Halderman et al. showed that one can recover cryptographic keys from a decayed DRAM image. And, following up this result, Heninger and Shacham presented a polynomial-time attack which, given 0.27-fraction of the RSA private key of the form (p, q, d, $d_p$, $d_q$), can recover the whole key, provided that the given bits are uniformly distributed. And, based on the work of Heninger and Shacham, this paper presents a different approach for recovering RSA private key bits from decayed key information, under the assumption that some random portion of the private key bits is known. More precisely, we present the algorithm of recovering RSA private key bits from erased key material and elaborate the formula of describing the number of partially-recovered RSA private key candidates in terms of the given erasure rate. Then, the result is justified by some extensive experiments.

Design and Implement of 50MHz 10 bits DAC based on double step Thermometer Code (50MHz 2단 온도계 디코더 방식을 사용한 10 bit DAC 설계)

  • Jung, Jun-Hee;Kim, Young-Sik
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.6
    • /
    • pp.18-24
    • /
    • 2012
  • This paper reports the test results of a 50MHz/s 10 bits DAC developed with $0.18{\mu}m$ CMOS process for the wireless sensor network application. The 10bits DAC, not likely a typical segmented type, has been designed as a current driving type with double step thermometer decoding architecture in which 10bits are divided into 6bits of MSB and 4bits of LSB. MSB 6bits are converted into 3 bits row thermal codes and 3 bits column thermal codes to control high current cells, and LSB 4 bits are also converted into thermal codes to control the lower current cells. The high and the lower current cells use the same cell size while a bias circuit has been designed to make the amount of lower unit current become 1/16 of high unit current. All thermal codes are synchronized with output latches to prevent glitches on the output signals. The test results show that the DAC consumes 4.3mA DC current with 3.3V DC supply for 2.2Vpp output at 50MHz clock. The linearity characteristics of DAC are the maximum SFDR of 62.02dB, maximum DNL of 0.37 LSB, and maximum INL of 0.67 LSB.

A Study on Vibration Analysis and Estimation of Vibration Damping of Tricone-Bits Drilling Machine (Tricone-Bits 천공장비의 진동 분석 및 진동 거리감쇠 추정에 관한 연구)

  • Cho, Seongkyu;Seo, Sung Chul;Park, Hyung Keun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.4
    • /
    • pp.493-499
    • /
    • 2023
  • Recently, with the development of construction machinery, low-vibration construction machine such as Tricone-Bits, which can drill both soil and rock layers and minimize vibration, is being used frequently. However, although many studies have been conducted on the prediction of vibration values for earth augers and pile drivers, the reality is that studies on the effects of vibration on low-vibration drilling equipment are lacking. In this paper, ground vibration values for Tricone-Bits were measured, and a vibration distance damping formula was proposed using this. In addition, after predicting the vibration of the earth auger and pile driver using the previously proposed vibration distance damping formula, the degree of vibration damping for the Tricone-Bits was evaluated by comparing and analyzing it. As a result, the Tricone-Bits showed a vibration reduction effect of 97% and 93% compared to these machine and It will help with management and prediction of the ground vibration effects evaluation on the low-vibration equipment such as Tricone-Bits.

An Accurate Bitrate Control Algorithm for MPEG-2 Video Coding (MPEG-2 비디오 부호화를 위한 정확한 비트율 제어 알고리즘)

  • Lee, Jeong-U;Ho, Yo-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.2
    • /
    • pp.218-226
    • /
    • 2001
  • The MPEG-2 Test Model 5 (TM5) algorithm is widely used for bit rate control. In TM5, however, the target number of bits and the number of actual coding bits for each picture do not match well. Therefore, buffer overflow and picture quality degradation may occur at the end of the GOP. In this paper, we propose a new bit rate control algorithm for matching the target and the actual coding bits based on accurate bit allocation. The key idea of the proposed algorithm is to determine quantization Parameters which enable us to generate the number of actual coding bits close to the target number of bits for each picture, while maintaining uniform picture quality and supporting real-time processing. The proposed algorithm exploits the relationship between the number of actual coding bits and the number of estimated bits of the previous macroblock.

  • PDF

Improved variable bits M-ary QT conflict resolution algorithm for discrete m-bits recognition in RFID system (RFID 시스템에서 불연속 m-bits 인식을 위한 개선된 가변비트 M-ary QT 충돌해소 알고리즘)

  • Kim, Kwan-woong;Kim, Byun-gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1887-1894
    • /
    • 2016
  • In the RFID system, the reader transmits a query message to tags in order to identify a unique ID of tags within its detection range. The procedures for arbitrating a collision is essential because the multiple tags can response simultaneously in the same to the query of the Reader. This procedure is known as conflict resolution algorithm and it is a key technology in the RFID system. In this paper, we proposed a variable bits M-ary QT algorithm based on Manchester coding techniques. The proposed algorithm use the location information of the collision bits in the reader and tags. The proposed algorithm can reduce the number of the query-response cycle because it is capable of recognizing discontinuous bits and a variable number of bits. From computer simulation, the proposed method give better performance than the conventional M-ary QT techniques in terms of response, recognition efficiency, communication overhead.

A Study on Process Simulation Analysis of the Water Jet Cleaning Robot System for Micro Drill-bits (마이크로 드릴비트의 워터젯 세척 로봇시스템의 공정 시뮬레이션 분석에 관한 연구)

  • Kuk, Youn-Ho;Park, Sang-Rok;Park, Kee-Jin;Choi, Hyun-Jin
    • Korean Journal of Computational Design and Engineering
    • /
    • v.20 no.3
    • /
    • pp.291-297
    • /
    • 2015
  • A water jet cleaning robot system for micro drill bits is to refurbish micro drill bits used for the PCB manufacturing process. It can refurbish drill bits with the minimum diameter of ${\phi}0.15{\sim}0.075mm$ of which the total quantity have been discarded before. Micro drill bits with the minimum diameter of ${\phi}0.075mm$ can be cleaned by applying the water jet cleaning robot system out of the manual ultrasonic cleaning in the past for the cleaning equipment as the initial process in refurbishing. This study analyzed problems, while applying the apparatus mechanism for the workability such as the robot traces of Transfer Robot I and II, drill bit loading and unloading, and cleaning tasks in the water jet cleaning robot system in an effort to carry out simulations. In addition, the cleaning work process was optimized as the work process was verified in advance and the production quantity was analyzed through simulations.

Wear assessment of the WC/Co cemented carbidetricone drillbits in an open pit mine

  • Saeidi, Omid;Elyasi, Ayub;Torabi, Seyed Rahman
    • Geomechanics and Engineering
    • /
    • v.8 no.4
    • /
    • pp.477-493
    • /
    • 2015
  • In rock drilling, the most important characteristic to clarify is the wear of the drill bits. The reason that the rock drill bits fail with time is wear. In dry sliding contact adhesive wear deteriorates the materials in contact, quickly, and is the result of shear fracture in the momentary contact joins between the surfaces. This paper aims at presenting an overview of the assessment of WC/Co cemented carbide (CC) tricone bit in rotary drilling. To study wear of these bits, two approaches have been used in this research. Firstly, the new bits were weighted before they mounted on the drill rigs and also after completion their useful life to obtain bit weight loss percentage. The characteristics of the rock types drilled by using such this bit were measured, simultaneously. Alternatively, to measure contact wear, namely, matrix wear a micrometer has been used with a resolution of 0.02 mm at different direction on the tricone bits. Equivalent quartz content (EQC), net quartz content (QC), muscovite content (Mu), coarseness index (CI) of drill cuttings and compressive strength of rocks (UCS) were obtained along with thin sections to investigate mineralogical properties in detail. The correlation between effective parameters and bit wear were obtained as result of this study. It was observed that UCS shows no significant correlation with bit wear. By increasing CI and cutting size of rocks wear of bit increases.

Study on the coding rule of Characters by 1 byte of 3×4 bits with consideration for the transmission efficiency of data communications (데이터 전송 효율을 고려한 3×4비트 1 바이트 문자 부호화 규칙에 관한 연구)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.499-504
    • /
    • 2011
  • This paper propose the rule of coding for the characters and symbol, etc which are used in computer, information devices, etc. When they use the rule of coding, they may improve the efficiency of transmission in data communications by reducing the number of scrambling during the line coding in the coder in the transmitter. The paper considered the codes of one byte of 3bits column ${\times}$ 4bits rows. ASCII code is one of the representative code for the codes of one byte of 3bits column ${\times}$ 4bits rows. Therefore, this paper applied ASCII code to study the coding rule of the characters and symbols, etc.