• Title/Summary/Keyword: 위.변조

Search Result 473, Processing Time 0.031 seconds

New Gain Optimization Method for Sigma-Delta A/D Converters Using CIC Decimation Filters (CIC 데시메이션 필터를 이용한 Sigma-Delta A/D 변환기 이득 최적화 방식)

  • Jang, Jin-Kyu;Jang, Young-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.1-8
    • /
    • 2010
  • In this paper, we propose a new gain optimization technique for Sigma-Delta A/D converters. In the proposed scheme, multiple gain set candidates showing maximum SNR in the modulator block are selected, and then multiple gain set candidates are investigated for minimum MSE in decimation block. Through CIC decimation filter simulation, it is shown that second SNR ranking candidate in modulation block is the best gain set.

New Gain Optimization Method for Sigma-Delta A/D Convertors (Sigma-Delta A/D 변환기의 새로운 이득 최적화 방식)

  • Jung, Yo-Sung;Jang, Young-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.31-38
    • /
    • 2009
  • In this paper, we propose new gain optimization method for Sigma-Delta A/D converters. First, in proposed method, the 10 candidates are selected through SNR maximization for Sigma-Delta modulator. After then, it is shown that optimum gains can be obtained through MSE calculation for CIC decimation filter. In the simulation, The proposed method has advantages which utilize SNR maximization for modulator and MSE minimization for CIC decimation later. The more candidates are chosen in SNR maximization for modulator, the better gains can be obtained in MSE minimization for CIC decimation filter.

A Low EMI Spread Spectrum Clock Generator Using TIE-Limited Frequency Modulation Technique (TIE 제한 주파수 변조 기법을 이용한 낮은 EMI 분산 스펙트럼 클록 발생기)

  • Piao, Taiming;Wee, Jae-Kyung;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.17 no.4
    • /
    • pp.537-543
    • /
    • 2013
  • This paper proposed a low EMI spread spectrum clock generator (SSCG) using discontinuous frequency modulation technique. The proposed SSCG is designed for triangular frequency modulation with high modulation depth. When the maximum time interval error (MTIE) of the SSCG is higher than given limit, the output frequency of SSCG is divided by two and used for reducing the time interval error (TIE). This discontinuous frequency modulation technique can effectively reduce the EMI within given limit. The simulated EMI of proposed SSCG was reduced by 18.5dB than that of conventional methods.

Screen Capture Authentication System for Web Postings to Used as Digital Evidence (디지털 증거 활용을 위한 웹 게시물 화면캡쳐 인증 시스템)

  • Kang, Ju Young;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.9-16
    • /
    • 2017
  • In modern society, everyone can easily access the Internet and freely express their opinions or ideas on Web bulletin boards or SNS. At the same time, they are often used as a place of slandering and the spreading of false information about celebrities such as entertainers and politicians. Typically people use the screen capture method to submit web posts as evidence in lawsuits. But it is difficult to get these accepted as evidence in court because screen captured images are easily forged and tempered. Therefore, as described above, using "Proxy Browser", we propose a screen capture authentication system for web posts that protects forging and tempering to use as digital evidence in court.

Forgery Protection System and 2D Bar-code inserted Watermark (워터마크가 삽입된 이차원 바코드와 위.변조 방지 시스템)

  • Lee, Sang-Kyung;Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.825-830
    • /
    • 2010
  • Generally, the copy protection mark and 2D bar-code techniques are widely used for forgery protection in printed public documents. But, it is hard to discriminate truth from the copy documents by using exisiting methods, because of that existing 2D-barcode is separated from the copy protection mark and it can be only recognized by specified optical barcord scanner. Therefor, in this paper, we proposed the forgery protection tehchnique for discriminating truth from the copy document by using watermark inserted 2D-barcord, which can be accurately distinguished not only by naked eye, but also by scanner. The copy protection mark consists of deformed patterns that are caused by the lowpass filter characteristic of digital I/O device. From these, we verified the performance of the proposed techniques by applying the histogram analysis based on the original, copy, and scanned copy image of the printed documents. Also, we suggested 2D-barcord confirmation system which can be accessed through the online server by using certification key data which is detected by web-camera, cell phone camera.

Digital Tachograph Vehicle Data Digital Authentication System (디지털 운행기록장치의 운행기록 데이터 디지털 인증 시스템)

  • Kang, Joon-Gyu;Kim, Yoo-Won;Lim, Ung-Taeg;Jun, Moon-Seog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.47-54
    • /
    • 2013
  • In this paper, we proposed an efficient digital authentication service system for the vehicle data collected from digital tachograph. In domestic, There is no method available to verify that information has not been forged and reliable information for collected vehicle data. The proposed method in this paper can prove transmitted vehicle data that have not been forged using the signature value. The signature value of digital authentication is produced with the digital signature generation key after obtaining the hash value of vehicle data. It is achieved through checking the stored hash value and the hash value match that is obtained with the digital signature verification key from the digital signature value. We confirmed the proposed system can ensure reliability of vehicle data through the system implementation and experiment.

A Traceback-Based Authentication Model for Active Phishing Site Detection for Service Users (서비스 사용자의 능동적 피싱 사이트 탐지를 위한 트레이스 백 기반 인증 모델)

  • Baek Yong Jin;Kim Hyun Ju
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.19-25
    • /
    • 2023
  • The current network environment provides a real-time interactive service from an initial one-way information prov ision service. Depending on the form of web-based information sharing, it is possible to provide various knowledge a nd services between users. However, in this web-based real-time information sharing environment, cases of damage by illegal attackers who exploit network vulnerabilities are increasing rapidly. In particular, for attackers who attempt a phishing attack, a link to the corresponding web page is induced after actively generating a forged web page to a user who needs a specific web page service. In this paper, we analyze whether users directly and actively forge a sp ecific site rather than a passive server-based detection method. For this purpose, it is possible to prevent leakage of important personal information of general users by detecting a disguised webpage of an attacker who induces illegal webpage access using traceback information

A Novel AOCG-OFDM Modulation Technique for Variable-high-bit-rate (가변성 고속 비트율을 위한 새로운 AOCG-OFDM 변조 기술)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.159-165
    • /
    • 2010
  • The Multi-code (Mc) modulation has been developed for high-speed data transmission over the wireless environments, but it suffers two critical problems due to the limited resource of Orthogonal Codes (OC) and high Peak-Average Power Ratio (PAPR). In this paper, we propose a novel modulation technique called AOCG [1] (Advanced Orthogonal Code Group)-OFDM (Orthogonal Frequency Division Multiplexing) to solve the above problems and obtain the variable high bit rates which can be controlled by the four parameters depending on the quality of services (QoS) required by users.

Inhomogeneous amplitude modulation effects on the MTF of binocular objective (비균일 진폭변조가 쌍안경 대물경의 MTF에 미치는 영향)

  • 홍경희
    • Korean Journal of Optics and Photonics
    • /
    • v.10 no.2
    • /
    • pp.102-106
    • /
    • 1999
  • In this study, inhomogeneous amplitude modulation effects on the imaging performance a lens system are expermentally investigated by measuring the diffraction OTF. The lens under the test is a binocular objective made in Korea. Inhomogeneous amplitude modulation is carried out by positioning the modulator cross contacted to the lens under test which is illuminated by collimated light beam. The aberration characteristics of the lens under test are examined by caculating the ray-fan through finite ray tracing. The MTFs of the lens illuminated by the homogeneous and inhomogeneous light beam are measured on the Gaussian image plane and compared with one another.

  • PDF

The Computer Monitor's Image Evaluated at The Target of The Falsification According to The New Conception of The Falsification Made by Regarding the Reproduced Document as The Document of Document crime (복사문서의 문서간주가 창출한 새로운 변조개념에 의해 문서변조행위대상으로 평가되는 컴퓨터모니터 이미지)

  • Ryu, Seok-Jun
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.725-756
    • /
    • 2013
  • In this paper, the possibility of extension of falsification conception was investigated to discuss the validity of this precedent. Consequently this extension was indispensible according to the article 237-2 of criminal code which regards the reproduced document as the document in the document crime. However, this is against the security of human right. On the contrary, there is not this kind of article in the German criminal code and the German precedents and majority theory are negative to regard it as the criminal document. And also, there is the pont of view that the reproduced document is not the criminal document because it's not the expression itself of document nominee's intention, so the article 237-2 should be demolished in Korea. According to this opinion, the serious reconsideration should be required in the legislation of this article 237-2. Nevertheless, if this extended conception is needed and it's possible, the meaning of the computer monitor's image is not able to be ignored in the conception of falsification. Therefore this should be regarded as the element of the falsification conception. In other words, this can't be evaluated as the object of falsification but the target of falsification, according to the conception extension, though the precedents do not regard it as the document in document crime.