• Title/Summary/Keyword: PN 수열

Search Result 33, Processing Time 0.023 seconds

A Study on Effective Digital Watermark Generation Method to Overcome Capacity Limit (저장 한계를 극복한 효율적인 디지털 워터마크 생성 방법 연구)

  • Kim Hee-Sun;Cho Dae-Jea
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.343-350
    • /
    • 2005
  • During the design of a successful digital watermarking systems, Pseudo-Noise(PN) sequences are widely used to modulate information bits into watermark signals. In this method, the number of bits that can be hidden within a small image by means of frequency domain watermarking is limited. In this paper, we show the possibility of introducing chaotic sequences into digital watermarking systems as potential substitutes to commonly used PN-sequences. And we propose a method that transforms the text to chaotic sequence. In our current implementation, we show how the sample text is expressed by an implied unit data(watermark) and the implied unit data is regenerated into the original left. Because we use this implied data as watermark for information hiding, we can insert much more watermark compared with previous method.

  • PDF

Algorithm for The Relative Phase Shifts between PN Sequences Generated by 90/150 Cellular Automata (90/150 셀룰라 오토마타에 의해 생성되는 PN 수열들 사이의 상대적 위상이동차에 대한 알고리즘)

  • Cho, Sung-Jin;Choi, Un-Sook;Kim, Han-Doo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.3-10
    • /
    • 2005
  • Every cell position of a maximum-length 90/150 cellular automata(CA) generates the same pseudo-noise(PN) sequence corresponding to the characteristic polynomial of the CA with a phase shift. Unlike LFSRs, the phase shift is generally different between stages of a CA. In this paper, we propose an algorithm to compute relative phase shifts between stage of a CA. Our algorithm does not need Shank's algorithm to compute relative phase shifts and does not need any previous phase shifts to compute a phase shift. Moreover it is done in time $O(2^n)$.

Image Encryption using Cellular Automata Sequence with Two Maximum Cycle (두 개의 최대 주기를 갖는 셀룰라 오토마타 수열을 이용한 영상 암호화)

  • Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1201-1208
    • /
    • 2010
  • In this paper, we propose an image encryption method using two linear MLCA(Maximum Length Cellular Automata). The encryption method first sets arbitrary 8 bit initial values. Next, we create high quality PN(pseudo noise) sequences by converting rows and columns with the set initial values. hen we generate a basis image using the set PN sequences. Lastly, the final image with high encryption level is produced by XOR operation of the basis image and the original image. In order to verify that the proposed method has the high encryption level, we performed histogram and stability analysis.

Non-linear Extended Binary Sequence with Low Cross-Correlation (낮은 상호 상관관계를 갖는 비선형 확장 이진 수열)

  • Choi, Un-Sook;Cho, Sung-Jin;Kwon, Sook-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.730-736
    • /
    • 2012
  • PN(Pseudo Noise) sequences play an important role in wireless communications, such as in a CDMA(code division multiple access) communication system. If there is a crash when multiple users simultaneously connected to a system, then PN sequences with low correlation help to minimize multiple access interference in such communication system. In this paper we propose a family of non-linear extended binary sequences with low cross-correlations and the family include $m$-sequence, GMW sequence, Kasami sequence and No sequence with optimal cross-correlation in terms of Welch bound. And we analyze cross-correlation of these sequences.

Image Encryption using 90/150 NBCA structure (90/150 NBCA 구조를 이용한 영상 암호화)

  • Nam, Tae-Hee;Kim, Seok-Tae;Cho, Sung-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.152-155
    • /
    • 2009
  • In this paper, we propose the image encryption method using complemented MLCA based on 90/150 NBCA(Null Boundary Cellular Automata). The encryption method is processed in the following order. First, complemented MLCA, which is derived from linear LFSR, is used to produce a PN(pseudo noise) sequence, which matches the size of the original image. Then, the created complemented MLCA sequence goes through a XOR operation with the original image to become encrypted. Lastly, an experiment is processed to verify the effectiveness of this method.

  • PDF

Nonparametric PN code acquisition in DS/CDMA systems (직접수열 부호분할 다중접속 계통에서의 비모수 의사잡음 부호 획득)

  • 송익호;이성로
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.6
    • /
    • pp.372-372
    • /
    • 2000
  • In this paper, we propose to use nonparametric detector for the PN code acquisition in DS/CDMA systems. Because the detector is nonparametric, we can decide the threshold of the detector without first haying to estimate the valiance of time-varying interference. We compare the proposed detector with the conventional detector by showing both analytic and simulation results. From these results, we can observe that the DS/CDMA system with the proposed detector have better performance than that with the conventional detector when the exact estimation of the interference variance is not possible.

DS/CDMA Signature Sequences for 4-phase Signaling (4-위상 신호 방식에 알맞은 직접수열 부호분할 다중접속 서명수열)

  • Park So Ryoung;Song Iickho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.313-319
    • /
    • 2005
  • In this paper, we propose a class of polyphase signature sequences, whose general odd correlation properties are useful for 4-phase signaling systems. The performance of the direct sequence code division multiple access (DS/CDMA) systems using the proposed sequences is compared with that using binary pseudo-noise sequences. The performance of the system using the proposed sequence is shown to be better than that using other conventional sequences both from the worst-case analysis and bit error rate simulations.

Image Encryption Using Two Linear MLCA (두 개의 선형 MLCA을 이용한 영상 암호화)

  • Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.953-955
    • /
    • 2009
  • In this paper, we propose an image encryption method using two linear MLCA(Maximum Length Cellular Automata). The encryption method first sets arbitrary 8 bit initial values. Next, we create high quality PN(pseudo noise) sequences by converting rows and columns with the set initial values. Then we generate a basis image using the set PN sequences. Lastly, the final image with high encryption level is produced by XOR operating the basis image and the original image. In order to verify that the proposed method has the high encryption level, we performed histogram and stability analysis.

  • PDF

Attack using Phase Shifts of Shrunken Sequence (수축수열의 위상이동차 공격법)

  • Choi, Un-Sook;Cho, Sung-Jin;Hwang, Yoon-Hee;Kim, Han-Doo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.97-104
    • /
    • 2011
  • Pseudo-random sequences with high linear complexity and low correlation function values are widely used in communication and cryptology. In this paper, we study the properties of interleaved sequences generated by shrinking generator. And we give a method for obtaining the shrunken sequence from a partial description of the shrunken sequence by using the phase shifting of PN sequences generated by shrinking generator.