• Title/Summary/Keyword: Binary Coding

Search Result 219, Processing Time 0.041 seconds

Hierarchical Image Encryption System Using Orthogonal Method (직교성을 이용한 계층적 영상 암호화)

  • Kim, Nam-Jin;Seo, Dong-Hoan;Lee, Sung-Geun;Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.231-239
    • /
    • 2006
  • In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.

A Blind Watermarking Algorithm using CABAC for H.264/AVC Main Profile (H.264/AVC Main Profile을 위한 CABAC-기반의 블라인드 워터마킹 알고리즘)

  • Seo, Young-Ho;Choi, Hyun-Jun;Lee, Chang-Yeul;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.181-188
    • /
    • 2007
  • This paper proposed a watermark embedding/extracting method using CABAC(Context-based Adaptive Binary Arithmetic Coding) which is the entropy encoder for the main profile of MPEG-4 Part 10 H.264/AVC. This algorithm selects the blocks and the coefficients in a block on the bases of the contexts extracted from the relationship to the adjacent blocks and coefficients. A watermark bit is embedded without any modification of coefficient or with replacing the LSB(Least Significant Bit) of the coefficient with a watermark bit by considering both the absolute value of the selected coefficient and the watermark bit. Therefore, it makes it hard for an attacker to find out the watermarked locations. By selecting a few coefficients near the DC coefficient according to the contexts, this algorithm satisfies the robustness requirement. From the results from experiments with various kinds and various strengths of attacks the maximum error ratio of the extracted watermark was 5.02% in maximum, which makes certain that the proposed algorithm has very high level of robustness. Because it embeds the watermark during the context modeling and binarization process of CABAC, the additional amount of calculation for locating and selecting the coefficients to embed watermark is very small. Consequently, it is highly expected that it is very useful in the application area that the video must be compressed right after acquisition.

Expression of an artificial gene encoding a repeated tripeptide lysyl-g1utamyl-tryptophan in Tobacco Plant (담배식물체에서 필수아미노산인 lysyl-glutamyl-tryptophan을 암호화하는 인공유전자의 발현)

  • Lee, Soo-Young;Ra, Kyung-Soo;Baik, Hyung-Suk;Park, Hee-Sung;Cho, Hoon-Sik;Lee, Young-Se;Choi, Jang-Won
    • Journal of Life Science
    • /
    • v.12 no.1
    • /
    • pp.96-105
    • /
    • 2002
  • To investigate expression of the artificial gene encoding a repeated tripeptide lysyl-glutamyl-tryptophan in tobacco plant, the plant binary vector, pART404 has been constructed, which contains the duplicated CaMV 35S promoter, an artificial gene coding for repetitive polymer (Lys-Glu-Trp)$_{64}$, and nopaline synthase (nos) terminator. The recombinant expression vector was introduced in Nicotiana tabacum (var. Xanthi) via Agrobacterium tumefaciens-mediated trans-formation. The transgenic calli selected by kanamycin containing medium were then regenerated to whole plants. Southern blot analysis indicated that five transgenic plants (No. 1, 7, 9, 43, 45) showed the hybridizing signals at 1.1 kb of the expected size on EcoRI digestion and each of the transgenic plants contained 1 or 3 copies of the artificial gene inserted into its genome. By northern blot analysis, the size of the hybridized total RNA was estimated to be approximately 1.2 kb and the RNA appeared generally to have the integrity. Western blot indicated that the protein was detected at the position of 33 kDa and the expression level of the polypeptide in the transgenic plant (No. 45) was measured to approximately 0.1% of the total protein.

Method of PCB Short Circuit Detection using SURF (SURF를 이용한 PCB 쇼트-서킷 검출 방법)

  • Hwang, Dae-Dong;Shin, Si-Woo;Lee, Keun-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5471-5478
    • /
    • 2012
  • In this paper, we propose a new short-circuit detecting method which can detect bad short-circuits, one of bad types occurring in PCB(Printed Circuit Board), by using SURF(Speeded-Up Robust Features) algorithm. The basic procedure in the proposed method sequentially consists of extracting features from both sample and inputted images by SURF, performing perspective transform by feature matching and matching results, extracting check areas of interest, binary coding and extracting short-circuits, and verifying results. The proposed method focuses on the robustness which can detect bad short-circuits even though the position and angle of PCB are not uniform and arbitrarily placed. Experimental results show that our method enables to detect bad short-circuits regardless of the location and angle of PCB placed variously and validate that the proposed method outperforms the conventional methods detecting bad short-circuits manually on the aspect of both the detection rate and time.

A Study on Visible Light Communication with Turbo Coded OFDM for Intelligent Transport Systems (지능형 교통 시스템을 위한 Turbo Code OFDM 적용한 가시광 통신 시스템에 관한 연구)

  • Koo, Sung-Wan;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.2
    • /
    • pp.60-67
    • /
    • 2010
  • In the ubiquitous age, applications of wireless personal area network (WPAN) technology using LEDs are in progress. However, visible light communications (VLC) using the LEDs have weakness which deteriorate performance of communication because of multi-path fading that occurs propagation delay by interior walls or other things in indoor environments. In this paper, orthogonal frequency division multiplexing (OFDM) scheme is adapted to decrease multi-path fading and multi-path dispersion and to provide high speed data transmission. Besides, to reduce information losses caused by optical noise (incandescent lamps, fluorescent lamps, sunbeam etc.) also proposed channel coding using turbo codes. The encoding and decoding of the proposed system is described, and simulation results are analyzed. We can know that performance of proposed system is increased about 4 [dB] through the simulation results. Also, when the system take doppler effect, the system performance worsened.

LLR Based Generalization of Soft Decision Iterative Decoding Algorithms for Block Turbo Codes (LLR 기반 블록 터보 부호의 연판정 복호 알고리즘 일반화)

  • Im, Hyun-Ho;Kwon, Kyung-Hoon;Heo, Jun
    • Journal of Broadcast Engineering
    • /
    • v.16 no.6
    • /
    • pp.1026-1035
    • /
    • 2011
  • This paper presents generalization and application for the conventional SISO decoding algorithm of Block Turbo Codes. R. M. Pyndiah suggested an iterative SISO decoding algorithm for Product Codes, two-dimensionally combined linear block codes, on AWGN channel. It wascalled Block Turbo Codes. Based on decision of Chase algorithm which is SIHO decoding method, SISO decoder for BTC computes soft decision information and transfers the information to next decoder for iterative decoding. Block Turbo Codes show Shannon limit approaching performance with a little iteration at high code rate on AWGN channel. In this paper we generalize the conventional decoding algorithm of Block Turbo Codes, under BPSK modulation and AWGN channel transmission assumption, to the LLR value based algorithm and suggest an application example such as concatenated structure of LDPC codes and Block Turbo Codes.

Expression of Porcine Acid-labile Subunit (pALS) of the 150-kilodalton Ternary Insulin-like Growth Factor Complex and Initial Characterization of Recombinant pALS Protein

  • Lee, Dong-Hee;Chun, Choa;Kim, Sang-Hoon;Lee, C.-Young
    • BMB Reports
    • /
    • v.38 no.2
    • /
    • pp.225-231
    • /
    • 2005
  • Acid-labile subunit (ALS) is a component of the 150-kDa insulin-like growth factor-binding protein-3 (IGFBP-3) complex, which, by sequestering the majority of IGFs-I and -II and thereby prolonging the half-life of them in plasma, serves as a circulating reservoir of IGFs in mammalian species. A pGEX-2T plasmid and a baculovirus expression constructs harboring a coding sequence for glutathione-S transferase (GST)-porcine ALS (pALS) fusion protein were expressed in BL21(DE3) E. coli and Sf9 insect cells, respectively. The expressed protein was purified by glutathione or Ni-NTN affinity chromatography, followed by cleavage of the fusion protein using Factor Xa. In addition, pALS and hIGFBP-3 were also produced in small amounts in the Xenopus oocyte expression system which does not require any purification procedure. A 65-kDa pALS polypeptide was obtained following the prokaryotic expression and the enzymatic digestion, but biochemical characterization of this polypeptide was precluded because of an extremely low expression efficiency. The baculovirus-as well as Xenopus-expressed pALS exhibited the expected molecular mass of 85 kDa which was reduced into 75 and 65 kDa following deglycosylation of Asn-linked carbohydrates by Endo-F glycosidase, indicating that the expressed pALS was properly glycosylated. Moreover, irrespective of the source of pALS, the recombinant pALS and hIGFBP-3 formed a 130-kDa binary complex which could be immunoprecipitated by anti-hIGFBP-3 antibodies. Collectively, results indicate that an authentic pALS protein can be produced by the current expression systems.

On Design and Performance Analysis of Asymmetric 2PAM: 5G Network NOMA Perspective (비대칭 2PAM의 설계와 성능 분석: 5G 네트워크의 비직교 다중 접속 관점에서)

  • Chung, Kyuhyuk
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.24-31
    • /
    • 2020
  • In non-orthogonal multiple access (NOMA), the degraded performance of the weaker channel gain user is a problem. In this paper, we propose the asymmetric binary pulse amplitude modulation (2PAM), to improve the bit-error rate (BER) performance of the weaker channel user in NOMA with the tolerable BER loss of the stronger channel user. First, we design the asymmetric 2PAM, calculate the total allocated power, and derive the closed-form expression for the BER of the proposed scheme. Then it is shown that the BER of the weaker channel user improves, with the small BER loss of the stronger channel user. The superiority of the proposed scheme is also validated by demonstating that the signal-to-noise ratio (SNR) gain of the weaker channel user is about 10 dB, with the SNR loss of 3 dB of the stronger channel user. In result, the asymmetric 2PAM could be considered in NOMA of 5G systems. As a direction of the future research, it would be meaningful to analyze the achievable data rate for the propsed scheme.

A Study on Optimal Neural Network Structure of Nonlinear System using Genetic Algorithm (유전 알고리즘을 이용한 비선형 시스템의 최적 신경 회로망 구조에 관한 연구)

  • Kim, Hong-Bok;Kim, Jeong-Keun;Kim, Min-Jung;Hwang, Seung-Wook
    • Journal of Navigation and Port Research
    • /
    • v.28 no.3
    • /
    • pp.221-225
    • /
    • 2004
  • This paper deals with a nonlinear system modelling using neural network and genetic algorithm Application q{ neural network to control and identification is actively studied because of their approximating ability of nonlinear function. It is important to design the neural network with optimal structure for minimum error and fast response time. Genetic algorithm is getting more popular nowadays because of their simplicity and robustness. in this paper, we optimize a neural network structure using genetic algorithm The genetic algorithm uses binary coding for neural network structure and searches for an optimal neural network structure of minimum error and fast response time. Through an extensive simulation, the optimal neural network structure is shown to be effective for identification of nonlinear system.

Symbol Error Probability of a Physical Layer Network Coded System in Nakagami Fading Channels (나카가미 페이딩 채널에서 물리 계층 네트워크 부호화 시스템의 심볼 오류율)

  • Do, Phu Thinh;Wang, Jin-Soo;Park, Jin-Bae;Kim, Yun-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8C
    • /
    • pp.645-654
    • /
    • 2012
  • In this paper, we consider a two-way relay (TWR) system, where two user nodes exchange their information within two transmission phases, by the help of a relay node adopting physical layer network coding. In the system, two users transmit their binary phase shift keying symbols simultaneously in the first phase, and the relay node decodes the XORed version of two user data and broadcasts it back to two users in the second phase. The performance of the system is analyzed in terms of the average end-to-end symbol error probability in Nakagami-m fading channels, for which a tight upper bound is derived in a closed form to provide an accurate and handy estimate on the performance. The results show that our upper bounds are almost indistinguishable from simulation results for various channel and system configurations. In addition, the optimal relay location and power allocation for various conditions can be obtained quickly with our analysis.