• Title/Summary/Keyword: 위상복원

Search Result 231, Processing Time 0.024 seconds

Blind Equalizer and Carrier Recovery Circuit Using $\theta$-matching Algorithm in QAM Signal Demodulator (QAM 신호 복조시 자력 등화기와 $\theta$-정합을 이용한 위상 복구 회로)

  • 조웅기;장일순;정차근;조경록
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6A
    • /
    • pp.920-930
    • /
    • 1999
  • Many researches on the multi-level QAM(Quadrature Amplitude Modulation) which is known to be a promising digital data transmission method for efficient use of channel bandwidth have been carried on, and their applications to various real fields are now being in progress. However, in the band-limited communication systems, each transmitted symbols is distorted by the ISI(Intersymbol Interference) and the phase error. Therefore, an equalizer and a carrier recovery must be taken into considerations to attenuate the effects of these distortions in the receiver. This paper presents an effective receiver structures that is applicable to the multi-level QAM. The proposed receiver system is consisted of an equalizer with Godard’s blind algorithm and a carrier recovery circuit. The phase error is estimated with a $\theta$-matching algorithm and is used in the carrier recovery to recover the correct phase. The simulation results are included to evaluate performance of the proposed receiver system for the various channel models.

  • PDF

Adaptive Equalization Algorithm of Improved-CMA for Phase Compensation (위상 보상을 위한 개선된 CMA 적응 등화 알고리즘)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.63-68
    • /
    • 2014
  • This paper related with the I-CMA (Improved-CMA) algorithm that is possible to compensates of phase in CMA adatpve equalizer which is used for the elemination of intersymbol interference in the multipath fading and band limit characteristics of channel. The new cost function is proposed for the eliminate the amplitude and phase simulataneous by modifying the cost fuction for get the error signal in present CMA algorithm. It has a merit to the algorithm simplicities and eliminats the PLL device for phase compensation after equalization. For proving this, the recovered signal constellation that is the output of equalizer output signal and the residual isi and Maximum Distortion charateristic learning curve that are presents the convergence performance in the equalizer and the overall frequency transfer function of channel and equalizer were used. As a result of computer simulation, the I-CMA has more good compensation capability of amplitude and phas in the recovered constellation. But the convergence time is slow due to the simultaneously phase compensation.

Optical Security System Using Phase Mask and Interferometer (위상 카드와 간섭계를 이용한 광학적 보안 시스템)

  • Kim, Jong-Yun;Kim, Gi-Jeong;Park, Se-Jun;Kim, Cheol-Su;Bae, Jang-Geun;Kim, Jeong-U;Kim, Su-Jung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.1
    • /
    • pp.37-43
    • /
    • 2001
  • In this paper, we propose a new optical security technique using two phase masks based on interferometer. A binary random phase image is used as a reference image and the encrypted image is generated according to the phase difference between the reference image and the original image. If there is no phase difference of a same pixel position in two phase masks, interference intensity of the pixel has minimum value and if phase difference of a same pixel position in two phase masks is $\pi$, its interference intensity has maximum value. We can decrypt the original image by putting two phase masks on each of the two optical paths of the Mach-Zehnder interferometer. Computer simulation and the optical experiments show a good performance of the proposed optical security system.

  • PDF

An Improvement of Image Encryption using Binary Phase Computer Generated Hologram and Multi XOR Operations (이진위상 컴퓨터형성홀로그램과 다중 XOR 연산을 이용한 영상 암호화의 개선)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2008
  • In this paper, we proposed an improvement technique of image encryption using binary phase computer generated hologram(BPCGH) and multi exclusive-OR(XOR) operations. For the encryption process, a BPCGH that reconstructs the original image is designed, using an iterative algorithm, and the resulting hologram is regarded as the image to be encrypted. The BPCGH is encrypted through the exclusive-OR operation with the random generated phase key image. Then the encrypted image is divided into several slide images using XOR operations. So, the performance of encryption for the image is improved. For the decryption process, we cascade the encrypted slide images and phase key image and interfere with reference wave. Then decrypted hologram image is transformed into phase information. Finally, the original image is recovered by an inverse Fourier transformation of the phase information. If the slide images are changed, we can get various decrypted BPCGH images. In the proposed security system, without a random generated key image, the original image can not be recovered. And we recover another hologram pattern according to the slide images, so it can be used in the differentiated authorization system.

  • PDF

Optical encryption and decryption technique using virtual image in frequency domain (가상 영상을 이용한 주파수 영역에서의 광학적 암호화 및 복호화 방법)

  • 서동환;조규보;박세준;김수중;김정우;노덕수
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.3
    • /
    • pp.255-259
    • /
    • 2003
  • In this paper, we propose an improved image encryption and decryption method using a virtual image and a joint transform correlator (JTC). The encrypted image is obtained by the Fourier transform of the product of a virtual-phase image and a random-phase image, and a Fourier transform of the decrypting key generated by the proposed phase assignment rule is used as the Fourier decrypting key. Based on the solution, the original image is reconstructed using JTC in the frequency-domain. The proposed method using a virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting by unauthorized people. And also the auto-correlation terms, which are the drawback of a JTC system, contribute to reconstructing the original image rather than to disturbing its identification. But because phase-only encryptions are sensitive to noise and scratches, phase errors can be generated in fabricating the encrypted image or the Fourier decrypting key so the errors that are responsible for degradation of the quality of the reconstructed image are analyzed and the solution is demonstrated. Computer simulations show the solution, and the proposed method is very useful for JTC architecture.

Image Watermark Method Using Multiple Decoding Keys (다중 복호화 키들을 이용한 영상 워터마크 방법)

  • Lee, Hyung-Seok;Seo, Dong-Hoan;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.4
    • /
    • pp.262-269
    • /
    • 2008
  • In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.

Prediction of Performance Loss Due to Phase Noise in Digital Satellite Communication System (디지털 위성통신시스템에서 위상 잡음으로 인한 성능 손실 예측)

  • 김영완;박동철
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.7
    • /
    • pp.679-686
    • /
    • 2002
  • Based on the alternating series expansion of error probability function due to phase noise in PSK systems, the performance evaluations for Tikhonov and Gaussian probability density functions were performed in this paper. The range of the signal-to-noise ratio of recovered carrier signal which provides the same dependency between the error performances by Tikhonov function and Gaussian function was analyzed via loss evaluation due to phase noise. The phase noise with 1/f$^2$ characteristic was generated based on the relationship of the phase noise spectral density and the modulation index for frequency modulation signal. Using the generated phase noise as the input signal for digital satellite communication receiver, the performance losses due to the phase noise were measured and evaluated with the analyzed performance characteristics.

An Audio Coding Technique Employing the Inter-channel Phase Difference Skip (채널 간 위상차 파라미터 생략 기법을 이용한 오디오 부호화)

  • Kim, Hyun-Hwi;Kim, Rin-Chul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2015.07a
    • /
    • pp.3-4
    • /
    • 2015
  • 본 논문에서는 공간 오디오 부호화 기법인 MPEG 서라운드에서 공간 파라미터 전송 시 위상 파라미터를 생략하는 기법에 대해 다룬다. 기존 방법에서는 한 프레임이 모두 적은 위상차를 가지는 경우에도 정상적으로 처리하여 전송한다. 이러한 경우 위상차 파라미터를 생략하여 비트 효율을 향상시킬 수 있다. 스테레오 복원 과정에서 발생하는 채널 간 시간차에 기반해 설계된 양자화기를 생략 기법에 적용하면 기존에 비해 평균적으로 40 ~ 50% 정도의 위상 파라미터 절감 효과를 얻을 수 있다.

  • PDF

Cross talk between binary holograms of finite contrast in phase-code multiplexing system (유한한 contrast ratio를 갖는 위상 부호 다중화된 이진 홀로그램들간의 Cross talk)

  • Kim, Hyun;Lee, Yeon-Ho
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2003.07a
    • /
    • pp.260-261
    • /
    • 2003
  • 위상 부호 다중화 시스템에서 cross talk 잡음은 기준빔 성분들간의 180$^{\circ}$와 다른 위상 천이 오차, 기준빔 성분들의 Bragg 격자로부터 불균일한 회절 세기들, 혹은 non-Bragg-matched 격자로부터 회절 때문에 발생하는 것으로 알려져 있다. 본 논문에서는 cross talk의 다른 원인들이 최소화된 시스템에서 위상 천이 오차만이 존재할 때 이전 연구들과 달리 유한한 contrast ratio를 갖는 이진 랜덤 이차원 이미지들을 광굴절 결정체에 위상 부호 다중화하고 복원할 때 얻어지는 신호대 잡음비(SNR)을 계산하고 이를 실험 측정 결과와 비교한다. (중략)

  • PDF

Fast Carrier Recovery for High-Order QAM Systems (고차의 QAM 시스템을 위한 고속 반송파 복원)

  • Lee, Chul-Soo;Ahn, Jae-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4C
    • /
    • pp.371-376
    • /
    • 2010
  • In this paper, we propose a new fast carrier recovery algorithm for high-order QAM systems. The proposed algorithm detects carrier frequency offset from the phase differences among the received symbols directly and combines it with the conventional carrier recovery, so that it is possible to achieve the carrier recovery with wide tracking range and fast acquisition time. Simulation results show that the proposed carrier recovery method reduces acquisition time at large frequency offset and low signal-to-noise ratio (SNR).