• Title/Summary/Keyword: Operation key

Search Result 1,738, Processing Time 0.038 seconds

Double Encryption of Binary Image using a Random Phase Mask and Two-step Phase-shifting Digital Holography (랜덤 위상 마스크와 2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 영상 이중 암호화)

  • Kim, Cheolsu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.6
    • /
    • pp.1043-1051
    • /
    • 2016
  • In this paper, double encryption technique of binary image using random phase mask and 2-step phase-shifting digital holography is proposed. After phase modulating of binary image, firstly, random phase mask to be used as key image is generated through the XOR operation with the binary phase image. And the first encrypted image is encrypted again through the fresnel transform and 2-step phase-shifting digital holography. In the decryption, simple arithmetic operation and inverse Fresnel transform are used to get the first decryption image, and second decryption image is generated through XOR operation between first decryption image and key image. Finally, the original binary image is recovered through phase modulation.

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.

Design and Implementation of Security Technique in Electronic Signature System (전자결재 시스템에서 보안기법 설계 및 구현)

  • 유영모;강성수;김완규;송진국
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.491-498
    • /
    • 2001
  • IN this Paper we propose an encryption algorithm for security in data communication. this algorithm acts encryption operation after the compression of data in order to reduce the transmission time and storage an encryption key is generated by using a parameter. as soon as key value is generated the parameter is transmitted and key is recreated every 26 times of parameter changing. the random number which is a constituent unit of encryption key is stored in a table the table is reorganized when the key is generated 40 times in order to intensity the security of encryption key. the encryption of data is made through the operation process of the generated key and sour data and the decryption performs the revers operation of encryption after getting decryption key by searching the transmitted parameter. as this algorithm is performed lastly it is possible to be used in practice.

  • PDF

Towards high-accuracy data modelling, uncertainty quantification and correlation analysis for SHM measurements during typhoon events using an improved most likely heteroscedastic Gaussian process

  • Qi-Ang Wang;Hao-Bo Wang;Zhan-Guo Ma;Yi-Qing Ni;Zhi-Jun Liu;Jian Jiang;Rui Sun;Hao-Wei Zhu
    • Smart Structures and Systems
    • /
    • v.32 no.4
    • /
    • pp.267-279
    • /
    • 2023
  • Data modelling and interpretation for structural health monitoring (SHM) field data are critical for evaluating structural performance and quantifying the vulnerability of infrastructure systems. In order to improve the data modelling accuracy, and extend the application range from data regression analysis to out-of-sample forecasting analysis, an improved most likely heteroscedastic Gaussian process (iMLHGP) methodology is proposed in this study by the incorporation of the outof-sample forecasting algorithm. The proposed iMLHGP method overcomes this limitation of constant variance of Gaussian process (GP), and can be used for estimating non-stationary typhoon-induced response statistics with high volatility. The first attempt at performing data regression and forecasting analysis on structural responses using the proposed iMLHGP method has been presented by applying it to real-world filed SHM data from an instrumented cable-stay bridge during typhoon events. Uncertainty quantification and correlation analysis were also carried out to investigate the influence of typhoons on bridge strain data. Results show that the iMLHGP method has high accuracy in both regression and out-of-sample forecasting. The iMLHGP framework takes both data heteroscedasticity and accurate analytical processing of noise variance (replace with a point estimation on the most likely value) into account to avoid the intensive computational effort. According to uncertainty quantification and correlation analysis results, the uncertainties of strain measurements are affected by both traffic and wind speed. The overall change of bridge strain is affected by temperature, and the local fluctuation is greatly affected by wind speed in typhoon conditions.

Detection of Voltage Sag using An Adaptive Extended Kalman Filter Based on Maximum Likelihood

  • Xi, Yanhui;Li, Zewen;Zeng, Xiangjun;Tang, Xin
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1016-1026
    • /
    • 2017
  • An adaptive extended Kalman filter based on the maximum likelihood (EKF-ML) is proposed for detecting voltage sag in this paper. Considering that the choice of the process and measurement error covariance matrices affects seriously the performance of the extended Kalman filter (EKF), the EKF-ML method uses the maximum likelihood method to adaptively optimize the error covariance matrices and the initial conditions. This can ensure that the EKF has better accuracy and faster convergence for estimating the voltage amplitude (states). Moreover, without more complexity, the EKF-ML algorithm is almost as simple as the conventional EKF, but it has better anti-disturbance performance and more accuracy in detection of the voltage sag. More importantly, the EKF-ML algorithm is capable of accurately estimating the noise parameters and is robust against various noise levels. Simulation results show that the proposed method performs with a fast dynamic and tracking response, when voltage signals contain harmonics or a pulse and are jointly embedded in an unknown measurement noise.

Seismic deformation behaviors of the soft clay after freezing-thawing

  • Zhen-Dong Cui;Meng-Hui Huang;Chen-Yu Hou;Li Yuan
    • Geomechanics and Engineering
    • /
    • v.34 no.3
    • /
    • pp.303-316
    • /
    • 2023
  • With the development and utilization of urban underground space, the artificial ground freezing technology has been widely used in the construction of underground engineering in soft soil areas. The mechanical properties of soft clay changed greatly after freezing and thawing, which affected the seismic performance of underground structures. In this paper, a series of triaxial tests were carried out to study the dynamic response of the freezing-thawing clay under the seismic load considering different dynamic stress amplitudes and different confining pressures. The reduction factor of dynamic shear stress was determined to correct the amplitude of the seismic load. The deformation development mode, the stress-strain relationship and the energy dissipation behavior of the soft clay under the seismic load were analyzed. An empirical model for predicting accumulative plastic strain was proposed and validated considering the loading times, the confining pressures and the dynamic stress amplitudes. The relevant research results can provide a theoretical reference to the seismic design of underground structures in soft clay areas.

Infrared and visible image fusion based on Laplacian pyramid and generative adversarial network

  • Wang, Juan;Ke, Cong;Wu, Minghu;Liu, Min;Zeng, Chunyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1761-1777
    • /
    • 2021
  • An image with infrared features and visible details is obtained by processing infrared and visible images. In this paper, a fusion method based on Laplacian pyramid and generative adversarial network is proposed to obtain high quality fusion images, termed as Laplacian-GAN. Firstly, the base and detail layers are obtained by decomposing the source images. Secondly, we utilize the Laplacian pyramid-based method to fuse these base layers to obtain more information of the base layer. Thirdly, the detail part is fused by a generative adversarial network. In addition, generative adversarial network avoids the manual design complicated fusion rules. Finally, the fused base layer and fused detail layer are reconstructed to obtain the fused image. Experimental results demonstrate that the proposed method can obtain state-of-the-art fusion performance in both visual quality and objective assessment. In terms of visual observation, the fusion image obtained by Laplacian-GAN algorithm in this paper is clearer in detail. At the same time, in the six metrics of MI, AG, EI, MS_SSIM, Qabf and SCD, the algorithm presented in this paper has improved by 0.62%, 7.10%, 14.53%, 12.18%, 34.33% and 12.23%, respectively, compared with the best of the other three algorithms.

Compound-Type Hybrid Energy Storage System and Its Mode Control Strategy for Electric Vehicles

  • Wang, Bin;Xu, Jun;Cao, Binggang;Li, Qiyu;Yang, Qingxia
    • Journal of Power Electronics
    • /
    • v.15 no.3
    • /
    • pp.849-859
    • /
    • 2015
  • This paper proposes a novel compound-type hybrid energy storage system (HESS) that inherits the unique advantages of both battery/supercapacitor (SC) and the SC/battery HESSs for electric vehicles (EVs). Eight operation modes are designed to match this system. A mode control strategy is developed for this HESS on the basis of these modes, and five classes of operation modes are established to simplify this strategy. The mode control strategy focuses on high operating efficiency and high power output. Furthermore, the compound-type HESS is designed such that the SC is the main priority in braking energy absorption. Thus, this HESS can operate efficiently and extend battery life. Simulation results also show that the compound-type HESS can not only supply adequate power to the motor inverter but can also determine suitable operation modes in corresponding conditions. Experimental results demonstrate that this HESS can extend battery life as well. The overall efficiency of the compound-type HESS is higher than those of the battery/SC and the SC/battery HESSs.

A Novel Ramp Method Based on Improved Smoothing Algorithm and Second Recognition for Windshear Detection Using LIDAR

  • Li, Meng;Xu, Jiuzhi;Xiong, Xing-long;Ma, Yuzhao;Zhao, Yifei
    • Current Optics and Photonics
    • /
    • v.2 no.1
    • /
    • pp.7-14
    • /
    • 2018
  • As a sophisticated detection technology, LIDAR has been widely employed to probe low-altitude windshear. Due to the drawbacks of the traditional ramp algorithm, the alarm accuracy of the LIDAR has not been satisfactory. Aiming at settling this matter, a novel method is proposed on the basis of improved signal smoothing and second windshear detection, which essentially acts as a combination of ramp algorithm and segmentation approach, involving the human factor as well as signal fluctuations. Experiments on the real and artificial signals verify our approach.

Three-Party Key Exchange Protocol Providing User Anonymity based on Smartcards (사용자 익명성을 제공하는 스마트카드 기반 3자 참여 키 교환 프로토콜)

  • Choi, Jong-Seok;Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.388-395
    • /
    • 2009
  • Three-party authenticated key exchange protocol based on smartcards using XOR and hash function operation instead of the public key operation has been proposed in 2006. Recently, it is doing for research because of increasing interest in privacy. This paper pointed out that proposed three-party authenticated key exchange protocol in 2006 has some problems; it is user anonymity and slow wrong input detection, and then we proposed new one to overcome these problems.