• 제목/요약/키워드: Network Transmission

검색결과 4,579건 처리시간 0.027초

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.

Internet Interconnection settlement model under Asymmetric Network Value Environment (비대칭적 네트워크 가치 환경에서의 인터넷망 대가정산 모형)

  • Lee, Sang Woo;Ko, Chang Youl;Choi, Sun Me
    • Journal of Internet Computing and Services
    • /
    • 제15권5호
    • /
    • pp.123-132
    • /
    • 2014
  • Internet is composed of many independent networks referred to as Internet Service Providers (ISPs) and each provider is generally interconnected based on a commercial agreement. Though many countries are engaged in deregulation in internet interconnection, there is still debate whether the large ISPs are unwilling to peer with small providers, have incentives to lower the quality of data transmission of transit operators or set the interconnection charge regarding the actual costs incurred by the interconnection. Korean government introduced regulations in internet interconnection after observing noticeable anti-competitive behaviors from 2005. This paper analyzes whether there is margin squeeze problem/market concentration, and suggests political proposals in Korean regulation status.

Node scheduling algorithm for energy efficiency and delay reduction in mobile sensor networks (모바일 센서 망에서 효율적인 에너지 사용과 전송지연 감소를 위한 노드 스케쥴링 알고리즘)

  • Son, Jae-Hyun;Byun, Hee-Jung
    • Journal of Internet Computing and Services
    • /
    • 제15권4호
    • /
    • pp.111-118
    • /
    • 2014
  • In mobile sensor networks, a large number of sensor nodes with battery powered are deployed randomly in a region. They monitor the environmental states and transmit data to its neighboring nodes. For mobile sensor networks, It is needed to maintain the connectivity autonomously among nodes as the sensor node moves. However, the existing works have focused on the energy savings in the fixed sensor networks. A specific algorithm considering node mobility is required in the mobile sensor networks. Along with energy efficiency, the transmission delay should be considered. In this paper, we propose an autonomous configuration scheme and a node scheduling algorithm when a moving node joins into the existing network. Through simulations, we show a superior performance of the proposed algorithm to the existing protocol.

One-round Protocols for Two-Party Authenticated Key Exchange (1-라운드 양자간 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • 제33권1_2호
    • /
    • pp.110-118
    • /
    • 2006
  • Cryptographic protocol design in a two-party setting has of tel ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending their messages (i.e., assuming a bidirectional half-duplex channel). However, by taking advantage of the communication characteristics of the network it may be possible to design protocols with improved latency. This is the focus of the present work. We present three provably-secure protocols for two-party authenticated key exchange (AKE) which require only a single round. Our first, most efficient protocol provides key independence but not forward secrecy. Our second scheme additionally provides forward secrecy but requires some additional computation. Security of these two protocols is analyzed in the random oracle model. Our final protocol provides the same strong security guarantees as our second protocol, but is proven secure in the standard model. This scheme is only slightly less efficient (from a computational perspective) than the previous ones. Our work provides the first provably- secure one-round protocols for two-party AKE which achieve forward secrecy.

Effects of Pipe Network Composition and Length on Power Plant Waste Heat Utilization System Performance for Large-scale Horticulture Facilities (발전소 온배수를 적용한 대규모 시설원예단지용 난방시스템의 열원이송 배관 재질 및 거리에 따른 성능평가)

  • Lee, Keum ho;Lee, Jae Ho;Lee, Kwang Ho
    • Journal of the Korean Society for Geothermal and Hydrothermal Energy
    • /
    • 제11권4호
    • /
    • pp.14-21
    • /
    • 2015
  • Korean government plans to establish large-scale horticulture facility complexes using reclaimed land in order to improve the national competitiveness of agriculture at the government level. One of the most significant problems arising from the establishment of those large-scale horticulture facilities is that these facilities still largely depend on a fossil fuel and they require 24 h a day heating during the winter season in order to provide the necessary breeding conditions for greenhouse crops. These facilities show large energy consumption due to the use of coverings with large heat transmission coefficients such as vinyl and glass during heating in the winter season. This study investigated the applicability of waste heat from power plant for large-scale horticulture facilities by evaluating the waste heat water temperature, heat loss and energy saving performance as a function of distance between power plant and greenhouse. As a result, utilizing power plant waste heat can reduce the energy consumption by around 85% compared to the conventional gas boiler, regardless of the distance between power plant and greenhouse.

An Efficient MAC Protocol for Supporting Multimedia Services in APON (APON에서 멀티미디어 전송을 위한 효율적인 MAC 프로토콜)

  • 은지숙;이호숙;윤현정;소원호;김영천
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제25권1A호
    • /
    • pp.132-141
    • /
    • 2000
  • In this paper, we proposed the MAC protocol of APON supporting multi-class traffic such as CBBUVBR, ABR, UBR, to guarantee the required QoS of each service. For this, we analyze the performance of variousrequest mechanisms and employee the different request mechanism for each traffic classes. Upstream anddownstream frame structures to minimize transmission overhead are proposed based on our request mechanism.The proposed MAC protocol applies the different priority to permit distribution process. CBBWBR traffic, withthe stringent requirements on CDV or delay, is allocated prior to any other class. ABR traffic, which hasnon-strict CDV or delay criteria, uses flexibly the available bandwidth but ensures a minimum cell rate (MCR).UBR traffic is allocated with lowest priority for the remaining capacity. The performance of proposed protocol isevaluated in terms of transfer delay and 1-point CDV with various offered load. The result of simulation showsthat the proposed protocol guarantees the required QoS of the corresponding category, while making use of theavailable resources in both an efficient and dynamical way.

  • PDF

UHD Video Stitching Method for Enhanced User Experience (사용자 경험을 극대화한 UHD 영상 합성 기술)

  • Gankhuyag, Ganzorig;Hong, Eun Gi;Kim, Giyeol;Choe, Yoonsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제40권7호
    • /
    • pp.1387-1394
    • /
    • 2015
  • Along with the development of network transmission technology, the IPTV market is growing in fast pace. Additionally the UHD resolution broadcasting system along with user experience (UX) that provides better service to user has attracted attention recently since there are not enough research has been done with differentiated the UX that can enhance the UX yet. Therefore we proposed a low complexity syntax level image stitching implementation technique that run with multi-view services, which makes possibility to view multiple channel or video contents on the screen at the same time. Simulation results have demonstrated the liability and effectiveness of the proposed algorithm by showing that capability of generating more than 80 frames per second by stitching four Full-HD size videos into UHD frame.

Analysis and Design a Optimum Protocol for TICN Tactical Backbone (TICN 전술백본망 최적의 프로토콜 분석 및 설계)

  • Kwon, Tae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제36권12B호
    • /
    • pp.1722-1727
    • /
    • 2011
  • The Korea Army are developing the TICN(Tactical Information Communication Network) which is the next army tactical communication system. The TICN tactical backbone's ability is very important. So analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, previous paper analysed routing protocol efficiency index and compared to superiority of the OSPF and IS-IS protocols in the tactical environment and conclusively IS-IS protocol was more suitable for TICN backbone routing protocol. And We got the result that It could improve the performance of IS-IS protocol as a TICN tactical backbone protocol under the tactical environments by adjusting some time parameters of IS-IS protocol. This paper modified and designed the IS-IS protocol in order to support the QoS strategies of TICN and analyzed it's adaptability through simulation.

A Novel Frequency Planning and Power Control Scheme for Device-to-Device Communication in OFDMA-TDD Based Cellular Networks Using Soft Frequency Reuse (OFDMA-TDD 기반 셀룰러 시스템에서 디바이스간 직접통신을 위한 SFR 자원할당 및 전송 전력조절 방법)

  • Kim, Tae-Sub;Lee, Sang-Joon;Lim, Chi-Hun;Ryu, Seungwan;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제37A권10호
    • /
    • pp.885-894
    • /
    • 2012
  • Currently, Demand of data traffic has rapidly increased by popular of smart device. It is very difficult to accommodate demand of data traffic by limited resource of base station (BS). To solve this problem, method has proposed that the Device-to-Device (D2D) reduce frequency overload of the BS and all of the user equipment (UE) inside the BS and neighbor BS don't allow communicating directly to BS. However, in LTE-Advance system cellular link and sharing radio resources of D2D link, the strong interference of the cellular network is still high. So we need to eliminate or mitigate the interference. In this paper, we use the transmission power control method and Soft Frequency Reuse (SFR) resource allocation method to mitigate the interference of the cellular link and D2D link. Simulation results show that the proposed scheme has high performance in terms of Signal to Noise Ratio (SINR) and system average throughput.

Point-to-Point Communication of Cognitive Radios via Underlay Spectrum Sharing (언더레이 주파수 공유를 이용한 인지무선 통신장치의 점대점 통신방법)

  • Lee, Hye-Won;Han, Kwang-Hun;Hwang, Young-Woo;Choi, Sung-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제34권9A호
    • /
    • pp.697-703
    • /
    • 2009
  • Cognitive radios are typically known to exploit vacant spectrum resources in order not to interfere with primary communication systems. However, cognitive radios may not be able to secure a clear spectrum band in a bustling spectrum band. Underlay spectrum sharing provides a way to cope with such a spectrum sharing problem. Cognitive radios share the same spectrum band with the spectrum licensees, i.e., primary users, by adjusting signal transmission power so as not to severely deteriorate the performance of the primary users. We propose an underlay spectrum sharing policy leveraging uplink spectrum resource to be used in a cellular network. A pair of end terminals attempts to establish a direct point-to-point link, and perform as cognitive radios in the sense that they share the uplink radio resource of other primary users. We formulate the transmit power constraints of the cognitive radios and propose a practical uplink band sharing framework. Our simulation results demonstrate that such an uplink sharing underlay direct link can enhance the throughput performance of point-to-point link with low overhead.