• Title/Summary/Keyword: Bit Expansion

Search Result 83, Processing Time 0.024 seconds

Reversible Watermarking Using Adaptive Edge-Guided Interpolation

  • Dai, Ningjie;Feng, Guorui;Zeng, Qian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.856-873
    • /
    • 2011
  • Reversible watermarking is an open problem in information hiding field, with embedding the encoded bit '1' or '0' into some sensitive images, such as the law enforcement, medical records and military images. The technique can retrieve the original image without distortion, after the embedded message has been extracted. Histogram-based scheme is a remarkable breakthrough in reversible watermarking schemes, in terms of high embedding capacity and low distortion. This scheme is lack of capacity control due to the requirement for embedding large-scale data, because the largest hidden capacity is decided by the amount of pixels with the peak point. In this paper, we propose a reversible watermarking scheme to enlarge the number of pixels with the peak point as large as possible. This algorithm is based on an adaptive edge-guided interpolation, furthermore, hides messages by interpolation-error, i.e. the difference between the original and interpolated image value. Simulation results compared with other state-of-the-art reversible watermarking schemes in this paper demonstrate the validity of the proposed algorithm.

Design and Development of an Alarm Gathering Interface Equipment for ATM Switching System (ATM 시스템 경보 취합 장치 설계 및 개발)

  • Yang, Chung-Ryeol;Kim, Jin-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1845-1857
    • /
    • 1996
  • An alarm gathering interface equipment has been developed to collect the hardware failure activities in 1$1, 024\times1, 024$ ATM switching system. The equipment use 8-bit microprocessor and ELA-232C port, and is fabricated in a single board, which called Alarm Gathering Interface board Assembly(AGIA). It is programmed to ensure flexibility in modification and expansion of the system capability. The performance is successfully proved through communication test with hardware blocks or modules consisting a ATM switching system, these techniques can be used to develop operation and maintenance functions for more superior ATM switching system in the near future. we additionally have presented some items for further study on alarm subsystem often ATM switching system.

  • PDF

Digital Watermarking based on Wavelet Transform for Color Images (웨이블릿 변환 기반의 컬러 영상에 대한 디지털 워터마킹)

  • Piao, Yong-Ri;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.127-130
    • /
    • 2007
  • This paper proposes a new Digital Watermarking based on Wavelet Transform for Color Images. To ensure the security of the watermark, enlarged watermark by applying linear bit expansion is inserted in a given intensity to a low frequency subband of the color image Y band which is Wavelet transformed after the Arnold Transformation. When detecting the presence of watermark, F norm function is applied unlike the existing methods. The experiment results verify that the proposed watermarking technique has outstanding quality in regards to fidelity and robustness.

  • PDF

New RSA blocking method and its applications (RSA 블럭 보호 방법과 그 응용)

  • 박상준;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.353-360
    • /
    • 1997
  • In this paper, we propose a new blocking method in which the size of an encryption block is changed according to the size of a message block. The proposed method can be applied to multisignature scheme with no restrictio of the signing order and a multisignature anc be sent secretly to the receiver through RSA encryption. It causes expansion in block size of a multisignuture, but the length of the expanded bits is not greater than the number of signers regardless fo the bit lengths of RSA moduli.

  • PDF

Design and Fabrication of Low Power Sensor Network Platform for Ubiquitous Health Care

  • Lee, Young-Dong;Jeong, Do-Un;Chung, Wan-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1826-1829
    • /
    • 2005
  • Recent advancement in wireless communications and electronics has enabled the development of low power sensor network. Wireless sensor network are often used in remote monitoring control applications, health care, security and environmental monitoring. Wireless sensor networks are an emerging technology consisting of small, low-power, and low-cost devices that integrate limited computation, sensing, and radio communication capabilities. Sensor network platform for health care has been designed, fabricated and tested. This system consists of an embedded micro-controller, Radio Frequency (RF) transceiver, power management, I/O expansion, and serial communication (RS-232). The hardware platform uses Atmel ATmega128L 8-bit ultra low power RISC processor with 128KB flash memory as the program memory and 4KB SRAM as the data memory. The radio transceiver (Chipcon CC1000) operates in the ISM band at 433MHz or 916MHz with a maximum data rate of 76.8kbps. Also, the indoor radio range is approximately 20-30m. When many sensors have to communicate with the controller, standard communication interfaces such as Serial Peripheral Interface (SPI) or Integrated Circuit ($I^{2}C$) allow sharing a single communication bus. With its low power, the smallest and low cost design, the wireless sensor network system and wireless sensing electronics to collect health-related information of human vitality and main physiological parameters (ECG, Temperature, Perspiration, Blood Pressure and some more vitality parameters, etc.)

  • PDF

Performance Analysis of Trellis Coded 8PSK Systems in Fading Environment (페이딩 환경하에서 Trellis 부호화된 8PSK 시스팀의 성능 분석)

  • 김현주;박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.3
    • /
    • pp.301-309
    • /
    • 1993
  • The performance of trellis coded 8-PSK systems over m-distributed fading channel is analyzed. To compensate the performance degradation due to the fading in mobile communication channels, the trellis code which can obtain the coding gain without bandwidth expansion is used. Using the Chernoff bound and generating function techniques for the trellis coded 8-PSK systems with 4-state and 8-state, the upper bound of the bit error probability is derived. The trellis code of 8-state is better than that of 4-state in the capability of error correction. The coded performance is much better under severe fading environment.

  • PDF

An Implementation of 128bit Block Cipher Algorithm for Electronic Commerce (전자상거래를 위한 128비트 블록 암호 알고리즘의 구현)

  • 서장원;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.1
    • /
    • pp.55-73
    • /
    • 2000
  • Recently; EC(Electronic Commerce) is increasing with high speed based on the expansion of Internet. EC which is done on the cyber space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet. Therefore, we need the solutions that protect the security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher algorithm. NC(Nonpolynomial Complete) cipher algorithm proposed in this paper is good for the security and it overcome the limit of current 64bits cipher algorithm using 128bits key length for input, output and encryption key, Moreover, it is designed for the increase of calculation complexity and probability calculation by adapting more complex design for subkey generation regarded as one of important element effected to encryption. The result of simulation by the comparison with other cipher algorithm for capacity evaluation of proposed NC cipher algorithm is that the speed of encryption and decryption is 7.63 Mbps per block and the speed of subkey generation is 2,42 μ sec per block. So, prosed NC cipher algorithm is regarded as proper level for encryption. Furthermore, speed of subkey generation shows that NC cipher algorithm has the probability used to MAC(Message Authentication Code) and block implementation of Hash function.

  • PDF

Design and Implementation of Embedded Ethernet Module for Home Network (홈 네트워크를 위한 Embedded Ethernet Module 설계 및 구현)

  • Kim Pan-kyu;Hoan Tae-Moon;Lee Jong-hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1111-1116
    • /
    • 2005
  • The necessity of the home network have been enlarged gradually according to the distribution of ultra-high speed internet, the expansion of a digital information equipment and the change of a life pattern. In this paper, we proposed the embedded ethernet module that could be operate on eight bit system, but it could control home appliance with full ethernet speed. The embedded ethernet module consists of 8051 MCU and Hardware TCP/IP. In this module, we construct simple web server and port remote control program for I/O device control. We verified through internet that the developed embedded ethernet module could control and check home appliances anywhere and anytime. We expect the developed ethernet module can build up niche market at home network. And it will be helpful to activate home network market.

Coded Layered Space-Time Transmission with Signal Space Diversity in OFDM Systems (신호 공간 다이버시티 기법을 이용한 OFDM 기반의 부호화된 시공간 전송기법)

  • Kim, Ji-Hoon;Lee, In-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7C
    • /
    • pp.644-651
    • /
    • 2007
  • In multiple antenna systems, vertical Bell Labs Layered Space-Time (V-BLAST) systems enable very high throughput by nulling and cancelling at each layer detection. In this paper, we propose a V-BLAST system which combines with signal space diversity technique. The benefit of the signal space diversity is that we can obtain an additional gain without extra bandwidth and power expansion by applying inphase/quadrature interleaving and the constellation rotation. Through simulation results, it is shown that the performance of the proposed system is less than 0.5dB away from the ideal upper bound.

Trellis-coded MDPSK with Sliding Multiple Symbol Detection (슬라이딩(Sliding) 다중 심벌 간파를 이용한 드렐리스 부호화된 MDPSK)

  • 박이홍;전찬우;박성경;김종일;강창언
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.6
    • /
    • pp.1-8
    • /
    • 1994
  • In this paper, in order to apply the idea MDPSK to TCM, we use signal set expansion and set partition by phase differences. Through this we propose the trellis-coded MDPSK. And the Viterbi decoder containing branch metrics of the squared Euclidean distance of the Lth order phase difference as well as the first order phase difference is introduced in order to improve the bit error rate(BER) in the differential detection of the trellis-coded MDPSK. The proposed Viterbi decoder is conceptually same to the sliding multiple symbol dection method which uses the branch metric with the first and Lth order phase differences. We investigate the performance of the uncoded DQPSK and the trallis-coded D8PSK in additive white Gaussian noise (AWGN) through the Monte Carlo simulation under the two cases of using and not using the Lth order phase difference metric. The study shows that trellis-coded 8DPSK is an attractive scheme for power and bandlimited systems while also improving the BER performance when the Viterbi decoder is employed to the Lth order phase order difference metric. This performance improvement has been obtained without sacrificing the bandwidth or the power efficiency.

  • PDF