• Title/Summary/Keyword: 변조 방지

Search Result 239, Processing Time 0.022 seconds

Implementation of Analog Signal Processing ASIC for Vibratory Angular Velocity Detection Sensor (진동형 각속도 검출 센서를 위한 애널로그 신호처리 ASIC의 구현)

  • 김청월;이병렬;이상우;최준혁
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.4
    • /
    • pp.65-73
    • /
    • 2003
  • This paper presents the implementation of an analog signal-processing ASIS to detect an angular velocity signal from a vibrator angular velocity detection sensor. The output of the sensor to be charge appeared as the variation of the capacitance value in the structure of the sensor was detected using charge amplifiers and a self oscillation circuit for driving the sensor was implemented with a sinusoidal self oscillation circuit using the resonance characteristics of the sensor. Specially an automatic gain control circuit was utilized to prevent the deterioration of self-oscillation characteristics due to the external elements such as the characteristic variation of the sensor process and the temperature variation. The angular velocity signal, amplitude-mod)Hated in the operation characteristics of the sensor, was demodulated using a synchronous detection circuit. A switching multiplication circuit was used in the synchronous detection circuit to prevent the magnitude variation of detected signal caused by the amplitude variation of the carrier signal. The ASIC was designed and implemented using 0.5${\mu}{\textrm}{m}$ CMOS process. The chip size was 1.2mm x 1mm. In the experiment under the supply voltage of 3V, the ASIC consumed the supply current of 3.6mA and noise spectrum density from dc to 50Hz was in the range of -95 dBrms/√Hz and -100 dBrms/√Hz when the ASIC, coupled with the sensor, was in normal operation.

A Study on the Synthetic Aperture Radar Processor using AOD/CCD (AOD/CCD를 이용한 합성개구면 레이다 처리기에 관한 연구)

  • 박기환;이영훈;이영국;은재정;박한규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.10
    • /
    • pp.1957-1964
    • /
    • 1994
  • In this thesis, a Synthetic Aperture Rarar Processor that is possible real-time handling is implemented using CW(Continuose Wave) laser as a light source, CCD(charge Coupled Device) as a time integrator, and AOD(Acousto-Optic Device) as the space integrator. One of the advantages of the proposed system is that it does not require driving circuits of the light source. To implement the system, the linear frequency modulation(chirp) technique has been used for radar signal. The received data for the unit target was processed using 7.80 board and accompanying electronic circuits. In order to reduce the smear effect of the focused chirp signal which occurs Bragg diffrection angle of the AOD has been utilized to make sharp pulses of the laser source, and the pulse made synchronized with the chirp signal. Experiment and analysis results of the data and images detected from CCD of the proposed SAR system demonstrated that detection effect is degrated as the unit target distance increases, and the resolving power is improved as the bandwidth of the chirp signal increases. Also, as the pulse width of the light source decreases, the smear effect has been reduced. The experimental results assured that the proposed system in this papre can be used as a real time SAR processor.

  • PDF

A Study on Integration Security Management Model in Cloud Environment (클라우드 환경에서의 통합 보안관제 모델 연구)

  • Byun, Yun Sang;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.407-415
    • /
    • 2013
  • Recently, Interest variety of IT services and computing resources are increasing. As a result, the interest in the security of cloud environments is also increasing. Cloud environment is stored that to provide services to a large amount of IT resources on the Cloud. Therefore, Cloud is integrity of the stored data and resources that such as data leakage, forgery, etc. security incidents that the ability to quickly process is required. However, the existing developed various solutions or studies without considering their cloud environment for development and research to graft in a cloud environment because it has been difficult. Therefore, we proposed wire-wireless integrated Security management Model in cloud environment.

HoloMarking: Digital Watermarking Method using Fresnel Hologram (홀로마킹: Fresnel 홀로그램을 이용한 디지털 워터마킹 기법)

  • Choi, Hyun-Jun;Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6C
    • /
    • pp.604-610
    • /
    • 2009
  • This paper propose a digital watermarking method for digital contents which satisfies both the invisibility and the robustness to attacks to prohibit counterfeiting, modification, illegal usage and illegal re-production of video contents. This watermarking algorithm insert a watermark(digital hologram) by generated using Fresnel transform which improve the robustness. The inserting positions of the watermark choose by considering the frequency property of an image and a watermark. Also the amount of watermarking for watermark bit decide by considering the level of 2DDWT. This algorithm was implemented by C++ and experimented for invisibility and robustness with optical system. The experiment results showed that the method satisfied enough the invisibility of the inserted watermark and robustness against attacks. For the general attacks, the error rate of the extracted watermark was less than 15%, which is enough in robustness against the attacks.

Design of Delegation Signature Protocols for Strong Non-Repudiation (강화된 부인방지를 위한 대리서명 프로토콜의 설계)

  • 이용준;이근왕;김희숙;오해석
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.35-41
    • /
    • 2004
  • Proxy signature scheme based on delegation of warrant is studied in these days. Proxy signature Is a signature scheme that the original signer delegates his signing warrant to the proxy signer, and the proxy signer creates a signature on behalf of the original signer. For using this scheme, the security for protecting from the forgeability or misuse is necessary. There are several security requirements for using the proxy signature schemes. In this paper we suggest the proxy-register protocol scheme that original signer registers to the verifier about the proxy related information. In our scheme, verifier verifies the signature that original signer creates about the proxy information and sets the warrant of proxy signer, validity period for proxy signature and some limitation. Finally, we will show the advantages of our suggestion by comparing with the previous proxy signature schemes.

  • PDF

Design of Securer Electronic payment system based on ECC algorithm (타원 곡선 암호를 이용한 안전한 메일 기반 전자지불시스템 설계)

  • 김성일;최문석;신병철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.817-820
    • /
    • 2003
  • With a great improvement of computers and Network communication skills, we can exchange information quickly. There have been many researches on the subject how to guarantee the information security by security mechanism and cryptography schemes. Nowadays, many people in this area show their interest in money transfer systems between accounts, which can provide a secure mechanism in which people can send money to the legitimate party or person safe. However, we have teamed many ways to distort messages and repudiate the malicious activity in mail systems based on SSL mechanism. It is very likely that important information which must be kept in secret is laid exposed to un_authorized user. Accordingly, to provide stronger security service, researches on electronic payment system which tan guarantee the security characteristics such as confidentiality, integrity, user authentication, Non-repudiation, are strongly needed. In this paper, we analize the characteristics of the previous researches in this field, and also propose a securer electronic payment system based on ECC algorithm.

  • PDF

A Frame Structure of Modified ATSC Transmission Systems for Terrestial 3D HDTV Broadcasting (지상파 3D HDTV 전송을 위한 수정된 ATSC 전송 시스템의 프레임 구조에 관한 연구)

  • Oh, Jong-Gyu;Kim, Joon-Tae
    • Journal of Broadcast Engineering
    • /
    • v.15 no.6
    • /
    • pp.803-814
    • /
    • 2010
  • In this paper, we propose a frame structure for modified ATSC transmission systems which is used for a terrestrial 3D HDTV broadcasting. The modified ATSC transmission systems [2] see the potential of increasing a transmission capacity at reasonable TOV (Threshold of Visibility) by modifying channel codes of conventional ATSC systems and varying modulations. We use PN symbols (Pseudorandom Noise) in a guard interval which is used for avoiding the ISI (Inter Symbol Interference) to estimate and compensate the time-varying multi path channel effectively with a maximum transmission payload. With PN symbols in the guard interval, a CIR (Channel Impulse Response) in a time domain can be estimated and a compensation in a frequency domain can be achieved for the accurate channel estimation and compensation. The prosed frame structure is applied to the modified ATSC systems and computer simulations are performed for SER (Symbol Error Rate) performances in TU (Typical Urban)-6 Channel.

A Database Security System for Detailed Access Control and Safe Data Management (상세 접근 통제와 안전한 데이터 관리를 위한 데이터베이스 보안 시스템)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Hong, Sung-Jin;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.5
    • /
    • pp.352-365
    • /
    • 2009
  • Recently, data access control policies have not been applied for authorized or unauthorized persons properly and information leakage incidents have occurred due to database security vulnerabilities. In the traditional database access control methods, administrators grant permissions for accessing database objects to users. However, these methods couldn't be applied for diverse access control policies to the database. In addition, another database security method which uses data encryption is difficult to utilize data indexing. Thus, this paper proposes an enhanced database access control system via a packet analysis method between client and database server in network to apply diverse security policies. The proposed security system can be applied the applications with access control policies related to specific factors such as date, time, SQL string, the number of result data and etc. And it also assures integrity via a public key certificate and MAC (Message Authentication Code) to prevent modification of user information and query sentences.

Efficient Implementation of FMCW Radar Signal Processing Parts Using Low Cost DSP (저가형 DSP를 사용하는 FMCW 레이더 신호처리부의 효율적 구현 방안)

  • Oh, Woojin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.707-714
    • /
    • 2016
  • Active driving safety systems for vehicle, such as the front collision avoidance, lane departure warning, and lane change assistance, have been popular to be adopted to the compact car. For improving performance and competitive cost, FMCW radar has been researched to adopt a phased array or a multi-beam antenna, and to integrate the front and the side radar. In this paper we propose several efficient methods to implement the signal processing module of FMCW radar system using low cost DSP. The pulse width modulation (PWM) based analog conversion, the approximation of time-eating functions, and the adoption of vector-based computation, etc, are proposed and implemented. The implemented signal processing board shows the real-time performance of 1.4ms pulse repetition interval (PRI) with 1024pt-FFT. In real road we verify the radar performance under real-time constraints of 10Hz update time.

A Scheme for Information Protection using Blockchain in IoT Environment (사물인터넷 환경에서 블록체인을 이용한 정보보호 기법)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.33-39
    • /
    • 2019
  • Entering the 4th industrial revolution, many technologies are developing and various threats are emerging. In order to cope with such threats, research is being conducted in many fields. Even in the development of various fields, the threats caused by the development of medical technology and intelligent vehicles are the threats to life due to misinformation about medical care and the threats to life by preventing the safe operation of people through intelligent vehicles. In this paper, as the patient's information is important, the private blockchain is used to increase the safety, efficiency, and scalability of the patient's medical records. We propose an information protection technique using blockchain technology to hack the car system and threaten the driver's life, solve privacy problems by identifying personal information and differences, and prevent forgery in the Internet of Things.