• Title/Summary/Keyword: 핑거

Search Result 287, Processing Time 0.021 seconds

Miniaturization Pinger for Biotelemetry (바이오테레메트리용 초음파 핑거의 소형화)

  • 신현옥
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.27 no.3
    • /
    • pp.178-183
    • /
    • 1991
  • 소형 핑거의 크기를 좌우하는 것은 진동자의 크기이며, 진동자의 크기는 주로 사용 주파수와 진동모드에 의하여 정해진다. 이 연구에서는 핑거에 자주 이용되고 있는 링형 진동자와는 진동 모드가 다른 바이모르프형 진동자를 이용하므로써 소형 진동자의 개발이 가능하였으며, 이 진동자를 이용하여 핑거의 소형화를 이룩할 수 있었다. 개발된 진동자의 크기는 50KHz 공진에서 직경 7.3mm, 두께 0.7mm이었으며, 소형화된 핑거는 직경 8.0mm, 길이 30mm의 크기이고, 공기중에서의 중량이 3.5g, 수중중량이 1.8g이었다. 음향 출력 레벨은 3V의 전지를 사용하여 147dB(re $l\muPa$ a at 1m)이었고, 약 3일간 사용 가능하였다.

  • PDF

Anonymous Fingerprinting Using Secret Sharing Scheme (비밀분산법을 이용한 익명성 보장 핑거프린팅 기법)

  • 용승림;이상호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.365-367
    • /
    • 2003
  • 핑거프린팅 기법은 암호학적인 기법들을 이용하여 디지털 데이터를 불법적으로 재배포한 사용자를 찾아냄으로써 디지털 데이터의 저작권을 보호한다. 익명성이 보장되는 핑거프린팅 기법은 대칭적인 기법과 달리 사용자만이 핑거프린트가 삽입된 데이터를 알 수 있고 비대칭 기법과 달리 데이터가 재배포되기 전에는 사용자의 익명성이 보장되는 기법이다. 본 논문에서는 사용자의 익명성이 보장되는 새로운 핑거프린팅 기법을 제안한다. 비밀분산법을 이용하여 사용자의 신원정보를 숨겨두었다가 재배포 발견시 조정자에게 누가 재배포하였는지 증거를 제출함으로써 재배포자의 배포 사실을 증명한다. 또한 등록시에 Schnorr 서명을 이용하여 고발된 사용자가 범행을 부인할 수 없도록 한다. 제안된 방법은 이산대수문제와 양자간 안전한 계산과정의 안전성에 근거하여 사용자의 익명성이 보장된다.

  • PDF

Architecture Design of PN Code Acquisition for MC-CDMA Systems (MC-CDMA 시스템용 PN 부호 동기획득 구조의 구현)

  • 노정민;이성주;김재석
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.2
    • /
    • pp.117-125
    • /
    • 2003
  • In this paper, we propose a new code acquisition architecture having the features of low complexity and high speed for the MC-CDMA system. The newly designed searching finger has function of the searcher as well as the finger. The searching finger tests the PN code Phase as the searcher during the initial acquisition, and as the finger after the initial acquisition. The proposed system has reduced the average acquisition time of the PN codes to $T_{acq}$/19 in the 20MHz MC-CDMA system with 75% reduction of H/W complexity.y.

Blind Video Fingerprinting Using Temporal Wavelet Transform (시간축 웨이블릿 변환을 이용한 블라인드 비디오 핑거프린팅)

  • Kang Hyun-Ho;Park Ji-Hwan;Lee Hye-Joo;Hong Jin-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1263-1272
    • /
    • 2004
  • In this paper, we present a novel video fingerprinting implementation method to identify the source of illegal copies. The video fingerprinting is achieved by the insertion of uniform distributed random number is made by seller and buyer's identification key-in the video wavelet coefficients by their temporal wavelet transform. The proposed fingerprinting is able to detect unique fingerprint of video contents even if they have been distorted by collusion attacks and MPEG2 compression. Especially, we use characteristics of the temporal wavelet transform to assign user's embedding area. Experimental results show the traceability of unauthorized distribution of video contents and its robustness to various collusion attacks and MPEG2 compression.

  • PDF

Distribution Method of BLE Fingerprinting for Large Scale Indoor Envirement (광범위 분산처리 기반 BLE 핑거프린팅 실내 측위 기법)

  • Lee, Dohee;Son, Bong-Ki;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.373-378
    • /
    • 2016
  • Recently, IPS(Indoor Positioning System) Technology has been progressing study and research, It has been studied in the fingerprinting and trilateration continuously. however because Fingerprinting and Trilateration Technology use AP(Access Point) for Positioning Calculation, Fingerprinting and Trilateration are not never had a credit positioning accuracy by using unstable RSSI in large scale. in this paper, to improve the problem about precise positioning in wide area, we introduced a concept of Sector including Cell. Sectors are not involved in each other and only fingerprinting calculation is proceed in a sector. we suggest this fingerprinting system considering efficiency and accuracy and compared to conventional fingerprinting, we demonstrated our system efficiency by mathematical techniques.

Design and Implementation of Finger Keyboard with Video Camera (비디오 카메라를 이용한 핑거 키보드의 설계 및 구현)

  • Hwang, Kitae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.157-163
    • /
    • 2016
  • This paper presents Finger Keyboard which detects the user's key types on a keyboard drawn on the paper using a video camera. The Finger Keyboard software was written in standard C/C++ language and thus easy to port to other computing environments. We installed a popular USB-type web camera on a Windows PC and implemented the Finger Keyboard as a Windows application which detects key typing and then injects the key code into the message queue of the Windows operating system. Also we implemented the Finger Keyboard on the Raspberry Pi 2 embedded computer with a dedicated camera and connected it to the Android device as an external keyboard through the Bluetooth. The result of experiments showed that the average ratio of recognition success is around 80% at the typing speed of 120 characters per minute.

Secure Oblivious Transfer Protocol-based Digital Fingerprinting Against Conspiracy Attack (공모 공격에 안전한 불확정 전송 프로토콜 기반의 디지털 핑거프린팅 기법)

  • 최재귀;박지환;김태석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.145-153
    • /
    • 2004
  • Digital fingerprinting schemes are cryptographic methods that a seller can identify a traitor who illegally redistributed digital contents by embedding it into buyer's information. Recently, Josep Domingo-Ferrer suggested an anonymous digital fingerprinting scheme based on committed oblivious transfer protocol. It is significant in the sense that it is completely specified from a computation point of view and is thus readily implementable. But this scheme has the serious problem that it cannot provide the security of buyers. In this paper, we first show how to break the existing committed oblivious transfer-based fingerprinting schemes and then suggest secure fingerprinting scheme by introducing oblivious transfer protocol with two-lock cryptosystem based on discrete logarithm. All computations are performed efficiently and the security degree is strengthened in our proposal.

Development of Biotelemetry Method by Combining the SSBL Method and the Pinger Synchronizing Method (1) - Design and production of system - (SSBL 방식과 핑거동기 방식을 조합한 바이오텔레메터리 방식의 개발 (1) -시스템의 설계 및 제작 -)

  • 박주삼;고탁창언
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.39 no.3
    • /
    • pp.218-229
    • /
    • 2003
  • A new biotelemetry method that the installation and the treatment of equipment is convenient and the instantaneously detailed location of the fish attached the pinger is able to track comparatively easily was developed. The receiving system in this biotelemetry method was advanced for track the detailed behavior of the fish by the miniature tracking pinger, because it was a burden to fish to add the pinger with the water temperature and the pressure sensor. By combining of the super short base line (SSBL) method to detect the direction of pinger and the pinger synchronizing method to measure the range from receiving transducer to pinger, the three dimensional locations of fish to the receiving transducer is gotten instantaneously. The receiving system is devised to realize the high precision or wide detection range by application of the basic design method for receiving system of biotelemetry developed by the present authors and the hydrophone array configuration. The measurement distance error in the pinger synchronizing method is minimized through the correction of which the deviation of transmission pluse period of pinger is caused by changing water temperature. A prototype system which is able to track the instantaneously detailed location of the fish by the SSBL and pinger synchronizing biotelemetry (SPB) method was produced.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Accelerated Life Testing and Validity Evaluation of Finger Strips Used for Electromagnetic Shielding Doors (전자파 차폐 도어용 핑거 스트립의 가속수명시험 및 유효성 평가)

  • Lee, Joo Hong;Kim, Do Sik;Chang, Mu Seong;Cho, Hae Yong
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.9
    • /
    • pp.831-837
    • /
    • 2015
  • Many persons and electronic devices are exposed to electromagnetic (EM) waves generated from magnetic resonance imaging (MRI) equipment, EM pulses (EMPs), and many other kinds of EM wave devices. Finger strips are used to provide shielding from these EM waves. Because of the high thermal conductivity of finger strips, they are used in the design of specialized doors that are installed in shielded rooms. In this study, we perform an accelerated life test using the load acceleration stress, which affects the main failure mode of finger strips. We predict the life of the finger strip under normal usage conditions based on the results of the accelerated life test. We compare the results with those predicted from the life test under normal usage conditions to evaluate the validity of accelerated life testing.