• Title/Summary/Keyword: Digital ID

Search Result 212, Processing Time 0.028 seconds

Efficient Digital Signal Processing of DTV TxID Based On Decimated Correlation Scheme (Decimated Correlation 기법을 이용한 DTV TxID수신 신호의 효율적인 신호처리 기법에 관한 연구)

  • Son, Ju-Hee;Lee, Yong-Tae;Park, Seong-Ik;Kim, Heung-Muk;Kim, Seung-Won;Lee, Jae-Young;Cha, Jae-Sang
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.219-222
    • /
    • 2006
  • 최근 들어 ATSC-DTV의 미래형 핵심기술로 손꼽히고 있는 송신기 식별기술(TxID ; Transmitter Identification)이 새로운 신기술로 대두되고 있으며, 이에 대한 구현성 검증은 현재 활발하게 논의 중인 재생중계기(EDOCR)와 연계된 단일주파수망(SFN; Single Frequency Network)기술의 실용화를 위한 핵심적 역할을 한다고 볼 수 있다. 하지만 종래의 TxID기술은 긴 주기의 워터마킹용 확산코드를 사용하므로 수신기 입장에서 하드웨어 부피가 크게 증가되는 문제점을 갖고 있다. 따라서 본 논문에서는 TxID 수신기 하드웨어 부피를 크게 경감시킬 수 있는 새로운 Decimated Correlation 기법을 이용한 DTV TxID 수신 신호의 효율적인 신호처리 기법을 제시하였으며, 모의실험을 통한 성능평가를 통해 제안한 알고리즘의 유용성을 입증하였다.

  • PDF

Design of Electronic ID System Satisfying Security Requirements of Authentication Certificate Using Fingerprint Recognition (지문 인식을 이용하여 공인인증서의 보안 요건을 만족하는 전자 신분증 시스템의 설계)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.610-616
    • /
    • 2015
  • In this paper, an electronic ID system satisfying security requirements of authentication certificate was designed using fingerprint recognition. The proposed electronic ID system generates a digital signature with forgery prevention, confidentiality, content integrity, and personal identification (=non-repudiation) using fingerprint information, and also encrypts, sends, and verify it. The proposed electronic ID system exploits fingerprint instead of user password, so it avoids leakage and hijacking. And it provides same legal force as conventional authentication certificate. The proposed electronic ID consists of 4 modules, i.e. HSM device, verification server, CA server, and RA client. Prototypes of all modules are designed and verified to have correct operation.

Efficient Digital Signal Processing of DTV TxID Based On Decimation Algorithm (Decimation 알고리즘을 이용한 DTV TxID수신 신호의 효율적인 신호처리 기법에 관한 연구)

  • Son, Ju-Hee;Lee, Yong-Tae;Park, Sung-Ik;Kim, Heung-Mook;Seo, Jae-Hyun;Lee, Jae-Young;Cha, Jae-Sang
    • Journal of Broadcast Engineering
    • /
    • v.12 no.3
    • /
    • pp.266-277
    • /
    • 2007
  • Recently, Transmitter Identification(TxID) technology has been issued as a technology of ATSC DTV. ATSC DTV networks are comprised of a plurality of transmitters, broadcasting the same signal sing one frequency network(SFN) connected to EDOCR. In this single frequency network, TxID technology has been recognized as a technology in the ATSC DTV system since it enables the broadcast authorities and classify multiple transmitters. However, conventional TxID uses extremely long spreading sequence to identifying transmitters, so it increases H/W complexity and registers. Thus, to solve those hardware problems, we propose an efficient signal processing technology using decimation algorithm. Furthermore, we certified the availability of the proposed algorithm via various simulations.

A Study on Digital Fingerprinting Technology for the Copyright Protection of the Image Contents Printout (이미지 콘텐츠 출력물의 저작권보호를 위한 디지털 핑거프린팅 기술에 관한 연구)

  • Seo, Yong-Seok;Kim, Won-Gyum;Lee, Seon-Hwa;Suh, Young-Ho;Hwang, Chi-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.242-245
    • /
    • 2006
  • This paper addresses an image fingerprinting scheme for the print-to-capture model performed by a photo printer and digital camera. When capturing an image by a digital camera, various kinds of distortions such as noise, geometrical distortions, and lens distortions are applied slightly and simultaneously. In this paper, we consider several steps to extract fingerprints from the distorted image in print-and capture scenario. To embed ID into an image as a fingerprint, multi-bits embedding is applied. We embed 64 bits ID information as a fingerprint into spatial domain of color images. In order to restore a captured image from distortions a noise reduction filter is performed and a rectilinear tiling pattern is used as a template. To make the template a multi-bits fingerprint is embedded repeatedly like a tiling pattern into the spatial domain of the image. We show that the extracting is successful from the image captured by a digital camera through the experiment.

  • PDF

Research on Success and Failure of Mobile operating system using inductive learning based on ID3 algorithm (ID3 알고리즘 기반의 귀납적 추론을 활용한 모바일 OS의 성공과 실패에 대한 연구)

  • Jin, Dong-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.328-331
    • /
    • 2013
  • As digital ecosystem has been rapidly transforming into the mobile based platform, several mobile operating system, which is in charge of user interface with mobile device has been appeared. This research suggest critical factors affecting success and failure of several commercial mobile operating systems from Palm OS appearing in 1996 to main mobile OSs appearing in 2013. For this, we analyse several mobile operating OS cases, elicit factors affecting success and failure of mobile OS, and conduct ID3 based inductive learning analyses based on elicted factors and values in case dataset. Through this, we draw rules in success and failure of mobile OS and suggest strategic implications for the commercial success of mobile OS.

  • PDF

Self Updatable Pseudonym System for VANET (VANET를 위한 차량자체 갱신가능 익명ID 시스템)

  • Kim, Sang-Jin;Lee, Byeong-Woo;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.93-103
    • /
    • 2009
  • Since message forgery or alteration in VANET may cause severe consequences, authentication of critical messages must be provided. However, using normal digital signature may infringe privacy of drivers. Therefore, VANET requires authentication systems that provide conditional anonymity. In this paper, we propose a new authentication system for VANET. In our proposed system, each vehicle can update its pseudonym using re-encryption technique and digitally sign messages using representation problem on the pseudonym. By limiting the usage period, revocation of individual pseudonym is not required. Moreover, we also provide a way to revoke the vehicle itself. Secureness of our system partially rely on the usage of tamper-resistance hardware.

Mobile Digital Identity Wallet (모바일 전자 ID 지갑 시스템)

  • Soo-Hyung Kim;Seung-Hyun Kim;Deok-Jin Kim;Kawn-Soo Jung;Seung-Hun Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1489-1492
    • /
    • 2008
  • 전자 ID 지갑은 일상생활에서 사용하는 지갑처럼 인터넷 상에서 사용되는 사이버 지갑으로, 사용자의 개인정보(주소, 전화번호 등), 인증정보, 지불정보 등과 같은 사용자의 Identity 정보를 보관하고 있다가 필요한 시점에 저장된 정보를 사용자의 통제 하에 자유롭게 이용할 수 있는 서비스 시스템이다. 모바일 전자 ID 지갑 시스템은 전자 ID 지갑 시스템의 구성 요소 중 하나로 개인의 모바일 단말장치에서 운영될 수 있는 소프트웨어로 구현되었으며, 사용자 인터페이스가 빈약한 모바일 단말장치에서도 사용자의 불편 없이 모바일 인터넷을 보다 안전하게 이용할 수 있는 방법들을 제공한다. 논문에서는 안전하고 신뢰할 수 있는 인터넷 환경 구축을 위해 개발된 기술들 중 하나인 모바일 전자 ID 지갑 시스템을 소개하고자 한다.

Analysis and Design of a Separate Sampling Adaptive PID Algorithm for Digital DC-DC Converters

  • Chang, Changyuan;Zhao, Xin;Xu, Chunxue;Li, Yuanye;Wu, Cheng'en
    • Journal of Power Electronics
    • /
    • v.16 no.6
    • /
    • pp.2212-2220
    • /
    • 2016
  • Based on the conventional PID algorithm and the adaptive PID (AD-PID) algorithm, a separate sampling adaptive PID (SSA-PID) algorithm is proposed to improve the transient response of digitally controlled DC-DC converters. The SSA-PID algorithm, which can be divided into an oversampled adaptive P (AD-P) control and an adaptive ID (AD-ID) control, adopts a higher sampling frequency for AD-P control and a conventional sampling frequency for AD-ID control. In addition, it can also adaptively adjust the PID parameters (i.e. $K_p$, $K_i$ and $K_d$) based on the system state. Simulation results show that the proposed algorithm has better line transient and load transient responses than the conventional PID and AD-PID algorithms. Compared with the conventional PID and AD-PID algorithms, the experimental results based on a FPGA indicate that the recovery time of the SSA-PID algorithm is reduced by 80% and 67% separately, and that overshoot is decreased by 33% and 12% for a 700mA load step. Moreover, the SSA-PID algorithm can achieve zero overshoot during startup.

The Mobile Voting Scheme Providing Voting Fairness Assured by Candidates (후보자들에 의한 선거의 공정성을 제공하는 모바일 투표 기법)

  • Yun, Sung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.161-169
    • /
    • 2012
  • It requires a lot of costs and manpower to manage the election system. The electronic voting scheme is needed to make the election system to be economic and fair. Especially, wide spread use of smart phones and wireless networks makes the mobile voting is of major concern. In mobile voting scheme, a smart phone user can vote regardless of the places. In this paper, the mobile voting scheme is proposed where candidates can guarantee fairness of the election system. We analyze mobile voting requirements and create the mobile ID which has legal binding forces and PKI based digital signature keys. In the proposed scheme, a voter's ballot is signed by all candidates using undeniable multi-signature scheme. During the counting stage, the multi-signature on the ballot is not verified without help of all candidates.

A Design and Implementation of a Network-type Electronic Payment System Optimized for Digital Goods (디지털 상품 거래를 위한 네트워크형 전자결재 시스템 설계 및 구현)

  • Han Jae-Kyun;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1537-1545
    • /
    • 2004
  • As the Internet continues to transform the commerce, the method of payment is one of critical components to conduct successful business across the internet. An electronic cash has all characteristics of traditional commodity cash and ensures security for all transactions. Accordingly an internet billing system based electronic cash is expected as the secure and efficient payment method in future electronic commerce. Digital Contents such as digital goods and services have the special characteristic that both the delivery of the goods and the transfer of money ran be accomplished on the same network. This allows the optimizations in the design of an electronic commerce system. In this paper, we propose an electronic payment protocol which is especially designed to purchase digital contents through internet. The proposed protocol guarantees anonymity by using a virtual ID, and minimizes payment processing steps.