• Title/Summary/Keyword: Information input algorithm

Search Result 2,444, Processing Time 0.031 seconds

New Distinguishing Attacks on Sparkle384 Reduced to 6 Rounds and Sparkle512 Reduced to 7 Rounds (6 라운드로 축소된 Sparkle384와 7 라운드로 축소된 Sparkle512에 대한 새로운 구별 공격)

  • Deukjo Hong;Donghoon Chang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.869-879
    • /
    • 2023
  • Sparkle is one of the finalists in the Lightweight Cryptography Standardization Process conducted by NIST. It is a nonlinear permutation and serves as a core component for the authenticated encryption algorithm Schwaemm and the hash function Esch. In this paper, we provide specific forms of input and output differences for 6 rounds of Sparkle384 and 7 rounds of Sparkle512, and make formulas for the complexity of finding input pairs that satisfy these differentials. Due to the significantly lower complexity compared to similar tasks for random permutations with the same input and output sizes, they can be valid distinguishing attacks. The numbers(6 and 7) of attacked rounds are very close to the minimum numbers(7 and 8) of really used rounds.

Design of a Neuro-Fuzzy System Using Union-Based Rule Antecedent (합 기반의 전건부를 가지는 뉴로-퍼지 시스템 설계)

  • Chang-Wook Han;Don-Kyu Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.13-17
    • /
    • 2024
  • In this paper, union-based rule antecedent neuro-fuzzy controller, which can guarantee a parsimonious knowledge base with reduced number of rules, is proposed. The proposed neuro-fuzzy controller allows union operation of input fuzzy sets in the antecedents to cover bigger input domain compared with the complete structure rule which consists of AND combination of all input variables in its premise. To construct the proposed neuro-fuzzy controller, we consider the multiple-term unified logic processor (MULP) which consists of OR and AND fuzzy neurons. The fuzzy neurons exhibit learning abilities as they come with a collection of adjustable connection weights. In the development stage, the genetic algorithm (GA) constructs a Boolean skeleton of the proposed neuro-fuzzy controller, while the stochastic reinforcement learning refines the binary connections of the GA-optimized controller for further improvement of the performance index. An inverted pendulum system is considered to verify the effectiveness of the proposed method by simulation and experiment.

Customized Search System using Real-time Contexts of User (사용자의 실시간 상황정보를 이용한 사용자 맞춤 검색 시스템)

  • Kwon, Mi-Rim;Hong, Kwang-Jin;Jung, Kee-Chul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.5
    • /
    • pp.19-30
    • /
    • 2016
  • In these days, people get information from internet easily. However, there are too many information. It makes interrupt and inefficient for searching data. Therefore, we need user customized web search system which provides appropriate information. In this paper, we propose a searching system that can collect semi-automatically conditions of users such as weather, location and time and provide essential information to users. Using these context data, the proposed system can understand what information users want in specific situations and can provide more useful information to users than existing systems. The proposed system based on 'Production/Sharing Service of Personal Korean Contents with Voluntary Sharing Economy System' and we add data parsing algorithm in each input, store and search part. In the experiments, we compare and analyze the results of existing system and the proposed system using some general key words.

Mdlti-View Video Generation from 2 Dimensional Video (2차원 동영상으로부터 다시점 동영상 생성 기법)

  • Baek, Yun-Ki;Choi, Mi-Nam;Park, Se-Whan;Yoo, Ji-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1C
    • /
    • pp.53-61
    • /
    • 2008
  • In this paper, we propose an algorithm for generation of multi-view video from conventional 2 dimensional video. Color and motion information of an object are used for segmentation and from the segmented objects, multi-view video is generated. Especially, color information is used to extract the boundary of an object that is barely extracted by using motion information. To classify the homogeneous regions with color, luminance and chrominance components are used. A pixel-based motion estimation with a measurement window is also performed to obtain motion information. Then, we combine the results from motion estimation and color segmentation and consequently we obtain a depth information by assigning motion intensity value to each segmented region. Finally, we generate multi-view video by applying rotation transformation method to 2 dimensional input images and the obtained depth information in each object. The experimental results show that the proposed algorithm outperforms comparing with conventional conversion methods.

Background Removal and ROI Segmentation Algorithms for Chest X-ray Images (흉부 엑스레이 영상에서 배경 제거 및 관심영역 분할 기법)

  • Park, Jin Woo;Song, Byung Cheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.105-114
    • /
    • 2015
  • This paper proposes methods to remove background area and segment region of interest (ROI) in chest X-ray images. Conventional algorithms to improve detail or contrast of images normally utilize brightness and frequency information. If we apply such algorithms to the entire images, we cannot obtain reliable visual quality due to unnecessary information such as background area. So, we propose two effective algorithms to remove background and segment ROI from the input X-ray images. First, the background removal algorithm analyzes the histogram distribution of the input X-ray image. Next, the initial background is estimated by a proper thresholding on histogram domain, and it is removed. Finally, the body contour or background area is refined by using a popular guided filter. On the other hand, the ROI, i.e., lung segmentation algorithm first determines an initial bounding box using the lung's inherent location information. Next, the main intensity value of the lung is computed by vertical cumulative sum within the initial bounding box. Then, probable outliers are removed by using a specific labeling and the pre-determined background information. Finally, a bounding box including lung is obtained. Simulation results show that the proposed background removal and ROI segmentation algorithms outperform the previous works.

Development of a Vision Based Fall Detection System For Healthcare (헬스케어를 위한 영상기반 기절동작 인식시스템 개발)

  • So, In-Mi;Kang, Sun-Kyung;Kim, Young-Un;Lee, Chi-Geun;Jung, Sung-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.279-287
    • /
    • 2006
  • This paper proposes a method to detect fall action by using stereo images to recognize emergency situation. It uses 3D information to extract the visual information for learning and testing. It uses HMM(Hidden Markov Model) as a recognition algorithm. The proposed system extracts background images from two camera images. It extracts a moving object from input video sequence by using the difference between input image and background image. After that, it finds the bounding rectangle of the moving object and extracts 3D information by using calibration data of the two cameras. We experimented to the recognition rate of fall action with the variation of rectangle width and height and that of 3D location of the rectangle center point. Experimental results show that the variation of 3D location of the center point achieves the higher recognition rate than the variation of width and height.

  • PDF

Detection of Abnormal Behavior by Scene Analysis in Surveillance Video (감시 영상에서의 장면 분석을 통한 이상행위 검출)

  • Bae, Gun-Tae;Uh, Young-Jung;Kwak, Soo-Yeong;Byun, Hye-Ran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12C
    • /
    • pp.744-752
    • /
    • 2011
  • In intelligent surveillance system, various methods for detecting abnormal behavior were proposed recently. However, most researches are not robust enough to be utilized for actual reality which often has occlusions because of assumption the researches have that individual objects can be tracked. This paper presents a novel method to detect abnormal behavior by analysing major motion of the scene for complex environment in which object tracking cannot work. First, we generate Visual Word and Visual Document from motion information extracted from input video and process them through LDA(Latent Dirichlet Allocation) algorithm which is one of document analysis technique to obtain major motion information(location, magnitude, direction, distribution) of the scene. Using acquired information, we compare similarity between motion appeared in input video and analysed major motion in order to detect motions which does not match to major motions as abnormal behavior.

A Design and Implementation of SpO2 Wearable Device for Companion Animals in PPG Signals

  • Kim, Woo-Chan;Chang, Jin-Wook;Kwon, Hoon;Lee, Won Joo;Kwak, Ho-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.191-198
    • /
    • 2022
  • The most basic thing to measure the condition of a companion animal is to check the breathing and pulse. There are several methods to measure the breathing and pulse of a companion animal, and the PPG method is generally used to measure the oxygen saturation (SpO2) in a companion animal. However, since the input PPG signal is inputted with various information as well as oxygen saturation, it is necessary to separate and extract oxygen saturation information from the PPG signal in order to measure the oxygen saturation. Therefore, in this paper, a wearable measuring device for companion animals that can be measured by applying the PPG method was designed and implemented, and an algorithm for separating oxygen saturation information from the PPG signal input through the wearable measuring device was proposed.

A Robust Vector Quantization Method against Distortion Outlier and Source Mismatch (이상 신호왜곡과 소스 불일치에 강인한 벡터 양자화 방법)

  • Noh, Myung-Hoon;Kim, Moo-Young
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.3
    • /
    • pp.74-80
    • /
    • 2012
  • In resolution-constrained quantization, the size of Voronoi cell varies depending on probability density function of the input data, which causes large amount of distortion outliers. We propose a vector quantization method that reduces distortion outliers by combining the generalized Lloyd algorithm (GLA) and the cell-size constrained vector quantization (CCVQ) scheme. The training data are divided into the inside and outside regions according to the size of Voronoi cell, and consequently CCVQ and GLA are applied to each region, respectively. As CCVQ is applied to the densely populated region of the source instead of GLA, the number of centroids for the outside region can be increased such that distortion outliers can be decreased. In real-world environment, source mismatch between training and test data is inevitable. For the source mismatch case, the proposed algorithm improves performance in terms of average distortion and distortion outliers.

Model Verification Algorithm for ATM Security System (ATM 보안 시스템을 위한 모델 인증 알고리즘)

  • Jeong, Heon;Lim, Chun-Hwan;Pyeon, Suk-Bum
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.72-78
    • /
    • 2000
  • In this study, we propose a model verification algorithm based on DCT and neural network for ATM security system. We construct database about facial images after capturing thirty persons facial images in the same lumination and distance. To simulate model verification, we capture four learning images and test images per a man. After detecting edge in facial images, we detect a characteristic area of square shape using edge distribution in facial images. Characteristic area contains eye bows, eyes, nose, mouth and cheek. We extract characteristic vectors to calculate diagonally coefficients sum after obtaining DCT coefficients about characteristic area. Characteristic vectors is normalized between +1 and -1, and then used for input vectors of neural networks. Not considering passwords, simulations results showed 100% verification rate when facial images were learned and 92% verification rate when facial images weren't learned. But considering passwords, the proposed algorithm showed 100% verification rate in case of two simulations.

  • PDF