• Title/Summary/Keyword: Encrypted signal

Search Result 43, Processing Time 0.023 seconds

Simulation of GNSS Spoofing Detection Method Using Encrypted Ranging Signal (암호화 신호원을 이용한 위성항법 기만 검출기법 모의)

  • So, Hyoungmin
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.5
    • /
    • pp.394-400
    • /
    • 2016
  • It is well known that the encrypted ranging signal, such as GPS P(Y) code, is immune to spoofing attack. However, in order for users to use the signal, there needs permission from the operator. And also there are many restrictions for use because of security issues. In this paper, a ground reference station equipped with high-gain directional antenna and a user receiver were simulated. In the reference station, the encrypted code can be demodulated from the high-gain signal. And then the code can be used to detect spoofing attack in the user receiver. This paper proposes the spoofing detection method using the encrypted signal and deals with simulation results.

Signal-Dependent Chaotic-State-Modulated Digital Secure Communication

  • Farooq, Omar;Datta, Sekharjit
    • ETRI Journal
    • /
    • v.28 no.2
    • /
    • pp.250-252
    • /
    • 2006
  • In this letter, a discrete state, discrete time chaotic pseudo random number generator (CPRNG) is presented for stream ciphering of text, audio, or image data. The CPRNG is treated as a finite state machine, and its state is modulated according to the input bit sequence of the signal to be encrypted. The modulated state sequence obtained can be transmitted as a spread spectrum or encrypted data.

  • PDF

Correlation Property of Encrypted Spreading Code for Design of LPI Applied GNSS Signal (저피탐 위성항법 신호 설계를 위한 암호화된 확산부호의 상관 특성에 관한 연구)

  • Park, Ki-Hyeon;Song, Min Kyu;Song, Hong-Yeop;Lee, Jang-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.264-272
    • /
    • 2015
  • In this paper, we analyze the statistical characteristic and describe the anti-interference performance of the signal for the LPI-applied GNSS using encrypted spreading code. To do this, we analyze the correlation property of encrypted sequences theoretically having various symbol sets over complex root of unity. We derive the degradation of anti-interference performance of encrypted sequences comparing with Gold and Zadoff-Chu sequences using theoretical and experimental methods.

Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching

  • Hamza, Ali;Shehzad, Danish;Sarfraz, Muhammad Shahzad;Habib, Usman;Shafi, Numan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1051-1077
    • /
    • 2021
  • The secure communication of information is a major concern over the internet. The information must be protected before transmitting over a communication channel to avoid security violations. In this paper, a new hybrid method called compressed encrypted data embedding (CEDE) is proposed. In CEDE, the secret information is first compressed with Lempel Ziv Welch (LZW) compression algorithm. Then, the compressed secret information is encrypted using the Advanced Encryption Standard (AES) symmetric block cipher. In the last step, the encrypted information is embedded into an image of size 512 × 512 pixels by using image steganography. In the steganographic technique, the compressed and encrypted secret data bits are divided into pairs of two bits and pixels of the cover image are also arranged in four pairs. The four pairs of secret data are compared with the respective four pairs of each cover pixel which leads to sixteen possibilities of matching in between secret data pairs and pairs of cover pixels. The least significant bits (LSBs) of current and imminent pixels are modified according to the matching case number. The proposed technique provides double-folded security and the results show that stego image carries a high capacity of secret data with adequate peak signal to noise ratio (PSNR) and lower mean square error (MSE) when compared with existing methods in the literature.

Optical Decryption System of Binary Image Using Two-Wave Mixing in Photorefractive Crystal (광굴절 매질에서 2광파 혼합을 이용한 이진 영상 복호화 시스템)

  • 최상규;신창목;서동환;김철수;김수중
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.83-86
    • /
    • 2002
  • We suggest binary image decryption system using two-wavc mixing in Photorefractive crystal. Compared with a conventional method, this method can make optical alignment easily, and brighten the encrypted image even if a small input signal, by index grating of photorefractive crystal. Also it can reconstruct the encrypted image by only reference beam in real time.

  • PDF

Optical Decryption System of Binary Image Using Two-Wave Mixing in Photorefractive Crystal (광굴절 매질에서 2광파 혼합을 이용한 이진 영상 복호화 시스템)

  • 최상규;신창목;서동환;김철수;김수중
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.207-210
    • /
    • 2002
  • We suggest binary image decryption system using two-wave mixing in photorefractive crystal. Compared with a conventional method, this method can make optical alignment easily, and brighten the encrypted image even if a small input signal, by index grating of photorefractive crystal. Also it can reconstruct the encrypted image by only reference beam in real time.

  • PDF

Optical Encryption based on Visual Cryptography and Interferometry (시각 암호와 간섭계를 이용한 광 암호화)

  • 이상수;서동환;김종윤;박세준;신창목;김수중;박상국
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2000.08a
    • /
    • pp.126-127
    • /
    • 2000
  • In this paper, we proposed an optical encryption method based in the concept of visual cryptography and interferometry. In our method a secret binary image was divided into two sub-images and they were encrypted by 'XOR' operation with a random key mask. Finally each encrypted image was changed into phase mask. By interference of these two phase masks the original image was obtained. Compared with general visual encryption method, this optical method had good signal-to-noise ratio due to no need to generate sub-pixels like visual encryption.

  • PDF

Performance Comparison of Different GPS L-Band Dual-Frequency Signal Processing Technologies

  • Kim, Hyeong-Pil;Jeong, Jin-Ho;Won, Jong-Hoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.7 no.1
    • /
    • pp.1-14
    • /
    • 2018
  • The Global Positioning System (GPS) provides more accurate positioning estimation performance by processing L1 and L2 signals simultaneously through dual frequency signal processing technology at the L-band rather than using only L1 signal. However, if anti-spoofing (AS) mode is run at the GPS, the precision (P) code in L2 signal is encrypted to Y code (or P(Y) code). Thus, dual frequency signal processing can be done only when the effect of P(Y) code is eliminated through the L2 signal processing technology. To do this, a codeless technique or semi-codeless technique that can acquire phase measurement information of L2 signal without information about W code should be employed. In this regard, this paper implements L2 signal processing technology where two typical codeless techniques and four typical semi-codeless techniques of previous studies are applied and compares their performances to discuss the optimal technique selection according to implementation environments and constraints.

Optical security system using multi-phase separation and phase-wrapping method (다중 위상 분할과 위상 랩핑 방법을 이용한 광 암호화 시스템)

  • Shin Chang Mok;Kim Soo Joong;Seo Dong Hoan
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.6 s.336
    • /
    • pp.31-38
    • /
    • 2005
  • In this paper, we proposed an optical security system based on a gray-image exclusive-OR encryption using multi-phase separation and phase-wrapping method. For encryption, a gray image is sliced into binary images, which have the same pixel value, and these images are encrypted by modified XOR rules with binary random images. The XORed images and the binary images respectively combined and converted into full phase images, called an encrypted image and a key image. For decryption, when the encrypted image and key image are used as inputs on optical elements, Practically due to limited controllability of phase range in optical elements, the original gray image cannot be efficiently reconstructed by these optical elements. Therefore, by decreasing the phase ranges of the encrypted image and key image using a phase-wrapping method and separating these images into low-level phase images using multi-phase separation, the gray image can be reconstructed by optical elements which have limited control range. The decrytion process is simply implemented by interfering a multiplication result of encrypted image and key image with reference light. The validity of proposed scheme is verified and the effects, which are caused by phase limitation in decryption process, is analyzed by using computer simulations.

A Study on the Audio watermarking for High Quality Digital Audio (고음질 오디오를 위한 디지털 오디오 워터마킹에 관한 연구)

  • 김정태;구대성;이강현
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.125-128
    • /
    • 2000
  • In this paper, we proposed the high quality digital audio watermarking algorithm in the frequency domain. The spread spectrum technique is used to encrypted a stream of information by spreading the data as much of the frequency spectrum as possible. It's technique adapt well to data hiding in audio signal. We have used the perceptual model and MDCT/IMDCT for the high qualify digital audio watermarking. The proposed watermark algorithm preserved high quality audio data from watermark signal.

  • PDF