• Title/Summary/Keyword: bit mask

Search Result 61, Processing Time 0.023 seconds

StegoWaveK based on the Correlation Relation (Cover-data의 유사성을 고려한 StegoWaveK)

  • 김영실;김영미;김륜옥;최진용
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.155-164
    • /
    • 2002
  • A design implemented the $\delta$SAcc234bit Mask Data Insertion algorithm that can let the Mask which commercialized Wave Steganography had improved the problem that a filter ring was able to easily become and raised Capacity and extend the width that Cover-data was alternative. Also, it applied 3-Tier file encryption algorithm with a proposal in order to improve a security level of Mask. 3-Tier file encryption algorithm is the algorithm that a specific pattern improved the problem that appeared in Ciphertext according to a file. A design implemented the StegoWaveK model carried out Wave Steganography, using $\delta$SAcc234bit Mask Data Insertion algorithm and the 3-Tier file encryption algorithm that proposed in this paper.

  • PDF

A 512 Bit Mask Programmable ROM using PMOS Technology (PMOS 기술을 이용한 512 Bit Mask Programmable ROM의 설계 및 제작)

  • 신현종;김충기
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.18 no.4
    • /
    • pp.34-42
    • /
    • 1981
  • A 512-bit Task Programmable ROM has been designed and fabricated using PMOS technology. The content of the memory was written through the gate pattern during the fabrication process, and was checked by displaying the output of the chip on an oscilloscope with 512(32$\times$16) matrix points. The operation of the chip was surcessful with operating voltage from -6V to -l2V, The power consumption and propagation delay time have been measured to be 3mW and 13 $\mu$sec, respectively at -6 Volt. The power consunption increased to 27mW and propagation delay time decreased to 3$\mu$sec at -12V. The output of the chip was capable of driving the input of a TTL gate directly and retained a high impedence state when the chip solect function disabled the output.

  • PDF

Improving Image Fingerprint Matching Accuracy Based on a Power Mask (파워마스크를 이용한 영상 핑거프린트 정합 성능 개선)

  • Seo, Jin Soo
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.8-14
    • /
    • 2020
  • For a reliable fingerprinting system, improving fingerprint matching accuracy is crucial. In this paper, we try to improve a binary image fingerprint matching performance by utilizing auxiliary information, power mask, which is obtained while constructing fingerprint DB. The power mask is an expected robustness of each fingerprint bit. A caveat of the power mask is the increased storage cost of the fingerprint DB. This paper mitigates the problem by reducing the size of the power mask utilizing spatial correlation of an image. Experiments on a publicly-available image dataset confirmed that the power mask is effective in improving fingerprint matching accuracy.

A high speed huffman decoder using new ternary CAM (새로운 Ternary CAM을 이용한 고속 허프만 디코더 설계)

  • 이광진;김상훈;이주석;박노경;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.7
    • /
    • pp.1716-1725
    • /
    • 1996
  • In this paper, the huffman decoder which is a part of the decoder in JPEG standard format is designed by using a new Ternary CAM. First, the 256 word * 16 bit-size new bit-word all parallel Ternary CAM system is designed and verified using SPICE and CADENCE Verilog-XL, and then the verified novel Ternary CAM is applied to the new huffman decoder architecture of JPEG. So the performnce of the designed CAM cell and it's block is verified. The new Ternary CAM has various applications because it has search data mask and storing data mask function, which enable bit-wise search and don't care state storing. When the CAM is used for huffman look-up table in huffman decoder, the CAM is partitioned according to the decoding symbol frequency. The scheme of partitioning CAM for huffman table overcomes the drawbacks of all-parallel CAM with much power and load. So operation speed and power consumption are improved.

  • PDF

On the Minimization of the Switching Function by the MASK Method (MASK 방법에 의한 이론함수의 최소화)

  • 조동섭;황희융
    • 전기의세계
    • /
    • v.28 no.11
    • /
    • pp.37-44
    • /
    • 1979
  • This paper deals with the computer program of finding the minimal sum-of-products for a switching function by using the MASK method derived from the characteristics of the Boolean algebra. The approach differs from the previous procedures in that all the prime implicants are determined only by the bit operation and the minimal sum-of-products are obtained by the modified Petrick method in this work. The important features are the relatively small amount of the run time and the less memory capacity to solve a problem, as compared to the previous computer programs.

  • PDF

Reverse design of photomask for optimum fiedelity in optical lithography (광리소그래피에서 최적 모양의 패턴 구현을 위한 포토마스크 역설계)

  • 이재철;오명호;임성우
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.34D no.12
    • /
    • pp.62-67
    • /
    • 1997
  • The optical lithography wit an ArF excimer laser as a light source is expected to be used in the mass production of giga-bit DRAMs which require less than 0.2.mu.m minimum feature size. In this case, the distortion of a patterned image becomes very severe, since the lithography porcess is performed at the resolution limit. Traditionally, the photomask pattern was designed and revised with trial-and-error methods, such as repeated execution of process simulators or actual process experiments which require time and effort. Ths paper describes a program which automatically finds an optimal mask pattern. The program divides the mask plane into cells with same sizes, chooses a cell randomly, changes the transparent/opaque property of the cell, and eventually genrates a mask pattern which produces required image pattern. The program was applied to real DRAM cell patterns to produce mask patterns which genertes image patterns closer to object images than original mask patterns.

  • PDF

A study on the color quantization for facial images using skin-color mask (살색 검출 mask를 이용한 사진영상의 컬러 양자화에 대한 연구)

  • Lee, Min-Cheol;Lee, Jong-Deok;Huh, Myung-Sun;Moon, Chan-Woo;Ahn, Hyun-Sik;Jeong, Gu-Min
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.25-30
    • /
    • 2008
  • In this paper, we propose a color quantization method regarding facial image for mobile services. For facial images, skin colors are more emphasized. First, we extract skin-color mask in the image and divide the image into two regions. Next, we extract color pallette for two regions respectively. In the proposed method, the loss in the face region is minimized and it can be useful for mobile services considering facial images. From the 8-bit color quantization experiment, we show that the proposed method works well.

  • PDF

Implementation of Real-Time Communication in CAN for a Humanoid Robot (CAN 기반 휴머노이드 로봇의 실시간 데이터 통신 구현)

  • Kwon Sun-Ku;Kim Byung-Yoon;Kim Jin-Hwan;Huh Uk-Youl
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.1
    • /
    • pp.24-30
    • /
    • 2006
  • The Controller Area Network (CAN) is being widely used for real-time control application and small-scale distributed computer controller systems. When the stuff bits are generated by bit-stuffing mechanism in the CAN network, it causes jitter including variations in response time and delay In order to eliminate this jitter, stuff bits must be controlled to minimize the response time and to reduce the variation of data transmission time. This paper proposes the method to reduce the stuff bits by restriction of available identifier and bit mask using exclusive OR operation. This da manipulation method are pretty useful to the real-time control strategy with respect to performance. However, the CAN may exhibit unfair behavior under heavy traffic conditions. When there are both high and low priority messages ready for transmission, the proposed precedence priority filtering method allows one low priority message to be exchanged between any two adjacent higher priority messages. In this way, the length of each transmission delays is upper bounded. These procedures are implemented as local controllers for the ISHURO(Inha Semvung Humanoid Robot).

A Bit Allocation Algorithm Using Adaptive Bandwidth for DMT (적응적인 대역폭을 이용한 DMT에서의 비트 할당 알고리듬)

  • 최현우;신봉식;정정화
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.372-375
    • /
    • 1999
  • This paper proposes a bit allocation algorithm using adaptive bandwidth for ADSL that uses the DMT technology. In certain cases for high attenuation loops the conventional algorithms are unable to assign data bits to the higher frequency tones, due to the power spectrum mask limitation recommended by ANSI Standard, even if the total power budget is not expended. In the proposed bit allocation algorithm, adjacent empty tones that would not be used merge into single tone, then additional bits is assigned to the merged empty tones. Because additional bits is allocated, most of the available power is used. The proposed algorithm show that total bit increase in about 2~9% bits more than about conventional "water-filling" and "bit removal" algorithms and that is able to use about 93% of the available budget Power

  • PDF