• Title/Summary/Keyword: 양자컴퓨터

Search Result 337, Processing Time 0.025 seconds

A new watermark for copyright protection of digital images (디지철 영상의 저작권 보호를 위한 새로운 서명 문양)

  • 서정일;우석훈;원치선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1814-1822
    • /
    • 1997
  • In this paper, we present a new digital signature for copyright protection of digital images. The proposed algorithm is designed to be more robust to both the compression (quantization) errors and the illegal signature attack by a third party. More specifically, to maximize the watermaking effect, we embed the watermark by randomly adding or subtracking a fixed number instead of executing the XORs. Also, to improve the reliability of the watermark detection, we extact the watermark only on some image blocks, which are less sensitive to the compression error. Futhermore, the unrecovered compression errors are further detected by the Hypothesis testing. The illegal signalture attack of a third party is also protected by using some probabilistic decisions of the MSE between the orignal image and the signed image. Experimental results show that the peroposed algorithm is more robust to the quantization errors and illegal signature attack by a third party.

  • PDF

Fuzzy Logic-based Bit Compression Method for Distributed Face Recognition (분산 얼굴인식을 위한 퍼지로직 기반 비트 압축법)

  • Kim, Tae-Young;Noh, Chang-Hyeon;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.9-17
    • /
    • 2009
  • A face database has contained a large amount of facial information data since face recognition was widely used. With the increase of facial information data, the face recognition based on distributed processing method has been noticed as a major topic. In existing studies, there were lack of discussion about the transferring method for large data. So, we proposed a fuzzy logic-based bit compression rate selection method for distributed face recognition. The proposed method selects an effective bit compression rate by fuzzy inference based on face recognition rate, processing time for recognition, and transferred bit length. And, we compared the facial recognition rate and the recognition time of the proposed method to those of facial information data with no compression and fixed bit compression rates. Experimental results demonstrates that the proposed method can reduce processing time for face recognition with a reasonable recognition rate.

Measurement set-up for CMOS-based integrated circuits and systems at cryogenic temperature (CMOS 기반의 집적 회로 및 시스템을 위한 극저온 측정 환경 구축)

  • Hyeon-Sik Ahn;Yoonseuk Choi;Junghwan Han;Jae-Won Nam;Kunhee Cho;Jusung Kim
    • Journal of IKEEE
    • /
    • v.28 no.2
    • /
    • pp.174-179
    • /
    • 2024
  • In this work, we introduce a complementary metal-oxide semiconductor(CMOS)-based integrated circuit(IC) measurement set-up for quantum computer control and read-out using a cryogenic refrigerator. CMOS circuits have to operate at extremely low temperatures of 3 to 5 K for qubit stability and noise reduction. The existing cryogenic measurement system is liquid helium quenching, which is expensive due to the long-term use of expendable resources. Therefore, we describe a cryogenic measurement system based on a closed cycle refrigerator (CCR) that is cost-free even when using helium gas for long periods of time. The refrigerator capable of reaching 4.7 K was built using a Gifford-Mcmahon(G-M) type cryocooler. This is expected to be a cryogenic refrigerator set-up with excellent price competitiveness.

Person Identification based on Clothing Feature (의상 특징 기반의 동일인 식별)

  • Choi, Yoo-Joo;Park, Sun-Mi;Cho, We-Duke;Kim, Ku-Jin
    • Journal of the Korea Computer Graphics Society
    • /
    • v.16 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • With the widespread use of vision-based surveillance systems, the capability for person identification is now an essential component. However, the CCTV cameras used in surveillance systems tend to produce relatively low-resolution images, making it difficult to use face recognition techniques for person identification. Therefore, an algorithm is proposed for person identification in CCTV camera images based on the clothing. Whenever a person is authenticated at the main entrance of a building, the clothing feature of that person is extracted and added to the database. Using a given image, the clothing area is detected using background subtraction and skin color detection techniques. The clothing feature vector is then composed of textural and color features of the clothing region, where the textural feature is extracted based on a local edge histogram, while the color feature is extracted using octree-based quantization of a color map. When given a query image, the person can then be identified by finding the most similar clothing feature from the database, where the Euclidean distance is used as the similarity measure. Experimental results show an 80% success rate for person identification with the proposed algorithm, and only a 43% success rate when using face recognition.

Implementation of an Optimal SIMD-based Many-core Processor for Sound Synthesis of Guitar (기타 음 합성을 위한 최적의 SIMD기반 매니코어 프로세서 구현)

  • Choi, Ji-Won;Kang, Myeong-Su;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.1-10
    • /
    • 2012
  • Improving operating frequency of processors is no longer today's issues; a multiprocessor technique which integrates many processors has received increasing attention. Currently, high-performance processors that integrate 64 or 128 cores are developing for large data processing over 2, 4, or 8 processor cores. This paper proposes an optimal many-core processor for synthesizing guitar sounds. Unlike the previous research in which a processing element (PE) was assigned to support one of guitar strings, this paper evaluates the impacts of mapping different numbers of PEs to one guitar string in terms of performance and both area and energy efficiencies using architectural and workload simulations. Experimental results show that the maximum area energy efficiencies were achieved at PEs=24 and 96, respectively, for synthesizing guitar sounds with sampling rate of 44.1kHz and 16-bit quantization. The synthesized sounds were very similar to original guitar sounds in their spectra. In addition, the proposed many-core processor was 1,235 and 22 times better than TI TMS320C6416 in area and energy efficiencies, respectively.

Realization of the multi-phase level CGH according to the multi-channel encoding method using a PAL-SLM (PAL-SLM을 이용한 다채널 부호화 방법에 따른 다위상형 CGH의 광학적 구현)

  • Jung, Jong-Rae;Baek, Woon-Sik;Kim, Jung-Hoi;Kim, Nam
    • Korean Journal of Optics and Photonics
    • /
    • v.15 no.4
    • /
    • pp.299-308
    • /
    • 2004
  • We proposed more efficient encoding methods that can design a multi-channel multi-level phase only computer-generated hologram(CGH) that can reconstruct many objects simultaneously without a conjugate image. We used a fabrication technique for the pixel oriented CGH for designing the pattern of the proposed multi-channel CGH. We investigated the difference of the optical efficiency(η), mean square error(MSE) and signal-to-noise ratio(SNR) of multi-channel CGHs that were designed by three kinds of encoding methods according to the number of quantization phase levels, and we estimated the performance of the pattern of the proposed multi-channel CGH. Generally, as the number of input objects' reference patterns stored in the CGH is increased, the reconstruction quality of the CGH is degraded. But we observed through computer simulation that the diffraction efficiency of the 1-ch CGH is 70%, and those of the 2-ch, 4-ch, 8-ch CGHs are 62%, 62% and 63%. Therefore we found that the diffraction efficiencies of the multi-channel CGHs using the newly proposed encoding method are similar to that of 1-ch CGH. We implemented the CGH optically using a liquid crystal spatial light phase modulator that consisted of a PAL-SLM efficiently coupled with a XGA type LCD by an optical lens and an LD for illuminating the LCD. We discussed the output images that are reconstructed from the PAL-SLM.

The Approach of Sociology of Law on Counter-Terrorism using Internet (인터넷을 활용한 테러 대응의 법사회학적 접근 - 예방 홍보 관리방안을 중심으로 -)

  • Park, Yong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.225-234
    • /
    • 2007
  • This research is based on the purpose of awaking the importance to publicity of terrorism prevention in the environment of neo-terrorism and presenting the direction of effective publicity activities of terrorism prevention in the counter-terrorism system. Government publicity through public media plays a significant role in promoting people's participation and improving the awareness. So, to strengthen the terrorism prevention in environmental changes of terror occurrence, active method available for people must be found as publicity method of terrorism prevention suitable for high information society. For this method, this research argued first about relationship between police organization and public as counter-terrorism system and about effective publicity methods of terrorism prevention through active erection of these relationships. This research suggested the operation method through introduction of e-CRM and etc, with ultimate purpose about maximizing the publicity effect of terrorism prevention by using as the advantage of internet these days as possible. And needs of information service activities and other administration strategies of publicity of terrorism prevention are suggested through enlarging the distribution scope of governmental counter-terrorism information materials by strengthening the national publicity activities and using media.

  • PDF

A Study On a point of conclusion time of Electronic Commerce (전자거래의 성립에 관한 연구)

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.255-262
    • /
    • 2008
  • It is settled in the economic arena that electronic commerce which used the Internet is new recently by explosive increase of the rapid development and Internet use of the information and communication technology. The problem that is legitimate at a point called the business of the form that the electronic transactions to set together if I drift are new of the times is the situation caused a lot. However, the use custom of construction and electronic transactions of the maintenance that is the legislation thief who can do rules of electronic transactions is the fact that it was not able to be still established It may not be just applied to the Internet electronic transactions that an exchange promise between our characters does against unspecified number of the general public person in the property even if I say that the conclusion of the purchase agreement is concluded in Internet electronic transactions by EDI method. That can have the approval of contract in the main legal problem of such an Internet electronic transactions contract. We civil law sorts it by a contract between the talks characters and a contract between the remote area people and all the adopted children are equal and must decide the formation of contract time in a principle of Empfangstheorie because it may be said that the rule of the civil law that it be heated and decides to be able to be available is irrational.

  • PDF

Power analysis attacks against NTRU and their countermeasures (NTRU 암호에 대한 전력 분석 공격 및 대응 방법)

  • Song, Jeong-Eun;Han, Dong-Guk;Lee, Mun-Kyu;Choi, Doo-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.11-21
    • /
    • 2009
  • The NTRU cryptosystem proposed by Hoffstein et al. in 1990s is a public key cryptosystem based on hard lattice problems. NTRU has many advantages compared to other public key cryptosystems such as RSA and elliptic curve cryptosystems. For example, it guarantees high speed encryption and decryption with the same level of security, and there is no known quantum computing algorithm for speeding up attacks against NTRD. In this paper, we analyze the security of NTRU against the simple power analysis (SPA) attack and the statistical power analysis (STPA) attack such as the correlation power analysis (CPA) attack First, we implement NTRU operations using NesC on a Telos mote, and we show how to apply CPA to recover a private key from collected power traces. We also suggest countermeasures against these attacks. In order to prevent SPA, we propose to use a nonzero value to initialize the array which will store the result of a convolution operation. On the other hand, in order to prevent STPA, we propose two techniques to randomize power traces related to the same input. The first one is random ordering of the computation sequences in a convolution operation and the other is data randomization in convolution operation.

Autopoiesis, Affordance, and Mimesis: Layout for Explication of Complexity of Cognitive Interaction between Environment and Human (오토포이에시스, 어포던스, 미메시스: 환경과 인간의 인지적 상호작용의 복잡성 해명을 위한 밑그림)

  • Shim, Kwang Hyun
    • Korean Journal of Cognitive Science
    • /
    • v.25 no.4
    • /
    • pp.343-384
    • /
    • 2014
  • In order to unravel the problems of the mind, today's cognitive science has expanded its perspective from the narrow framework of the past computer model or neuronal network model to the wider frameworks of interaction with the brain in interaction with the body in interaction with their environments. The theories of 'the extended mind', 'embodied mind', or 'enactive mind' appeared through such processes are working on a way to move into the environments while the problem to unravel the complex process of interactions between the mind, the body and the environments are left alone. This problem can be traced back as far as to Gibson and Maturana & Varela who tried at first to unravel the problem of the mind in terms of interaction between the brain, the body and there environments in 1960~70s. It's because Gibson stressed the importance of the 'affordance' provided by the environment while Maturana & Varela emphasized the 'autonomy' of auto-poiesis of life. However, it will be proper to say that there are invariants in the affordances provided by the environment as well as the autonomy of life in the state of structural coupling of the environment's variants and life's openness toward the environment. In this case, the confrontational points between Gibson and Maturana & Varela will be resolved. In this article, I propose Benjamin's theory of mimesis as a mediator of both theories. Because Benjamin's concept of mimesis has the process of making a constellation of the embodiment of the affordance and the enaction of new affordance into the environment at the same time, Gibson's concept of the affordance and Maturana & Varela's concept of embodiment and enaction will be so smoothly interconnected to circulate through the medium of Benjamin's concept of mimesis.