• Title/Summary/Keyword: Descrambling

Search Result 11, Processing Time 0.029 seconds

Parallel Descrambling of Transponder Telegram for High-Speed Train (고속철도용 트랜스폰더 텔레그램의 병렬 디스크램블링 기법)

  • Kwon, Soon-Hee;Park, Sungsoo;Shin, Dong-Joon;Lee, Jae-Ho;Ko, Kyeongjun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.163-171
    • /
    • 2016
  • In order to detect the exact position of high-speed train, it is necessary to obtain location information from the transponder tag installed along the track. In this paper, we proposed parallel descrambling scheme for high-speed railway transponder system, which aims for reducing the processing time required to decode telegram. Since a telegram is stored in a tag after information bits are scrambled by an encoder, decoding procedure includes descrambling of received telegram to recover the original information bits. By analyzing the structure of the descrambling shift register circuit, we proposed a parallel descrambling scheme for fast decoding of telegram. By comparing the required number of clocks, it is shown that the proposed scheme significantly outperforms the original one.

A Study on the Realization of Digital Multimedia Broadcast Receiving System using Conditional Access System (제한수신시스템을 적용한 디지털 멀티미디어방송 수신시스템 구현에 관한 연구)

  • Kim, Young-Bin;Ryu, Kwang-Ryol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.340-343
    • /
    • 2005
  • A realization for digital multimedia receiving system using Conditional Access System is presented in this paper. The key word for descrambling is make from smart card and Conditional Access System, a Stabilization is grow up in the method. It is possible to decoding that of average 15 fame/second of H.264 video format and that 24Khz${\sim}$48Khz audio sample rate using dual processor that of high performance DSP and RISC. This system is evaluated correct descrambling procedure in test stream added that signed user data.

  • PDF

Development of DVS167 OOB Processor in POD Module for OpenCable (OpenCable 용 POD 모듈의 DVS167 OOB Processor 개발)

  • 박부식;위정욱;임기택
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.843-846
    • /
    • 2003
  • In this paper, we have analyzed algorithm of physical layer, data link layer and MAC layer of Out-Of-Band (OOB) specified in the OpenCabl $e^{TM}$SCTE-55-2 2002$^{[3]}$ and designed architecture of the OOB processor. The OOB processor performs fundamental multiple access control for the OOB channel and extracts session key information from a EMM packet for descrambling MPEG-2 streams. In this paper, we have implemented a prototype board for the DVS167 OOB processor and verified it.t.

  • PDF

Neyman-Pearson Test for Descrambling Error Correction (Neyman-Pearson Test를 이용한 Descramble error 보정 기법)

  • 이영호;양승준;유필호
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1739-1742
    • /
    • 2003
  • 본 논문에서는 입력영상의 휘도 신호에 Neyman-pearson Test를 이용하여 descramble error를 효과적으로 보정하는 기법을 제안한다. 아날로그 회로의 오차와 noise 의 영향으로 scramble 된 라인의 오프셋 값을 정확히 보상하지 못할 경우에 발생하는 descramble error를 scrambler/ descrambler 의 기기별 차이에 관계없이, 또한 scrambler 와 descrambler로부터 어떠한 정보 없이 descramble 시에 발생한 error 의 offset 값과 scramble 된 라인을 검출하여 보상하는 방법을 논하였다.

  • PDF

Efficient H.264/AVC Video Scrambling Methods for Digital Rights Management (디지털 저작권 관리를 위한 효율적인 H.264/AVC 비디오 스크램블링 방법)

  • Kim, Soojin;Park, Geun;Cho, Kyeongsoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.187-192
    • /
    • 2012
  • This paper describes efficient H.264/AVC video scrambling methods for digital rights management. The proposed scrambling methods are to scramble level and suffix in entropy encoding and MVD in motion estimation of the H.264 video compression process. Other scrambling methods have been proposed but they degrade the compression efficiency or make it difficult to achieve real-time processing due to the large amount of computational efforts. Since the proposed scrambling methods resolve the drawbacks of other approaches, they do not cause image distortion and the original compression efficiency is maintained. We verified our scrambling methods and evaluated the performance by conducting several experiments with H.264 reference program. Finally, we implemented video player system using USB dongle in order to apply the proposed scrambling/descrambling methods to H.264 video compression.

Design and Implementation of Ensemble Multiplexer for Terrestrial DMB Conditional Access Service (지상파 DMB 제한수신 서비스용 앙상블 다중화기 설계 및 구현)

  • Lee, Yong-Hoon;Lee, Jin-Hwan;Ahn, Chung-Hyun;Lee, Soo-In;Kim, Nam
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.457-458
    • /
    • 2006
  • This paper propose design and implementation methods of ensemble multiplexer which is the purpose of Terrestrial DMB Conditional Access Service. Also transmit ensemble stream which is scrambled through the proposed ensemble multiplexer, by descrambling or decoding received stream as the scramble mode which is applicated through receiving verfication platform and by desplaying it, verificate the performance of ensemble multiplexer.

  • PDF

Access Control of Pay TV Program in Digital Satellite Broadcasting System (디지털 위성방송 시스템에서 유료 TV방송 프로그램 접근제어)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3123-3132
    • /
    • 1997
  • In this paper, we describe access control system for protection of pay TV program in digital DBS(Direct Broadcast satellite) system. We also propose a possible access control system and operation scenario for scrambling and descrambling which are important in access control system. Transport stream structure and option, entitlement checking message and entitlement management message for access control on digital broadcasting system are described in this paper. Especially, the authentication based on Flat-Shamir and Gulllou-Quisquater schemes required for verification of proper subscriber as access control is oriented to smart card number and subscriber ID(Identity). It has less restriction than scheme oriented to descrambler number.

  • PDF

Design and Verification of PCS Transmitting and Receiving Module for 40/100 Gigabit-Ethernet (40G/100G 이더넷을 위한 PCS 송수신부 설계 및 기능 검증)

  • Han, Kyeong-Eun;Kim, Seung-Hwan;Ahn, Kye-Hyun;Kim, Kwang-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1579-1587
    • /
    • 2010
  • In this paper, we design the PCS(Physical Coding Sublayer) transmitting and receiving module for 400/1000 Ethernet and verify the performance of it through logic simulation. In this work, we defined each function module and internal/external control signals and implemented them using HDL programming language. We also designed 64B/66B encoding/decoding, scrambling/descrambling including operation mode, detection of invalid frames, and multi-lane based distribution/arrangement. It was simulated using ModelSim and verified in terms of the operation and timing according to input data. The simulation result shows that all designed modules in 400/100G Ethernet are correctly performed.

A Study on Authentication Protocol for Secure RFID Tag (RFID Tag 보안을 위한 인증 프로토콜에 관한 연구)

  • Jung, Yong-Hoon;Kim, Jung-Jae;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.805-811
    • /
    • 2009
  • Firstly, this dissertation suggests the tag ID transfer method using two-dimensional arrangement. Secondly, provide better and stable security system compare to existing one by transferring tag; ID using established two-dimensional arrangement. Thirdly, provide operating module, which possible to descramble two-dimensional arrangement, with a character set when descrambling in a tag and a server. Lastly, suggest safe key transfer using a character set and two-dimensional arrangement. In order to embody suggested system and assess, transferred two-dimensional arrangement several times to carry out the experiment. Confirmed that it is impossible for suggested system to decode key patterns compare to existing RFID systems.

A New Key Management Mechanism and Performance Improvement for Conditional Access System (제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안)

  • 조현숙;이상호
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.75-87
    • /
    • 2001
  • The Conditional Access System is the complete system for ensuring that broadcasting services are only accessible to those who are entitled to receive them. Four major parts to this system are scrambling, descrambling, authentication and encryption. For the proper operation, which means hard-to- break and uninterrupted service, secure key management and efficient delivery mechanism are very important design factors to this system. Performance analysis is another important factor to this system that is used in massive subscriber environment. In this thesis, one of the secure and efficient key management mechanisms is proposed. For the secrecy of this mechanism, hierarchical stacking of keys and key generation matrix are proposed. For the proof of efficient delivery of those keys, simulation results and performance analysis. which is based on queuing analysis, are presented. Lastly, optimal key generation and delivery period, maximal and minimal key deliver time, and communication capacity for data collection are presented for various subscriber volume.

  • PDF