• Title/Summary/Keyword: Bit Stream

Search Result 315, Processing Time 0.023 seconds

Modeling of Video Data for Sffective Content-based Retrival (효율적인 의미 검색을 위한 동영상 데이터 모델링)

  • Jeong, Mi-Yeong;Lee, Won-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.908-922
    • /
    • 1997
  • In this paper,we present an dffcient way to describe the commplex meaning embedded in video data for the cintent-based retrival in a video database.Intead of viewing the data stored in a file as continuous bit stream,we associate the desired interval in the stream with a set of atteibute and value pairs which describe its meaning.Since the meaning of video data can be cimplex and can change dyamically. It is necessary to com-bine the fixed schema of attributes used in the traditional database systrm with a description method through a set of attribute and value pairs that can be defined dynamically.As the cintent of viedo data can be expressed differently according to the view point of a user,it is important ot maintain the meaning of the attribute and value pairs cinsistently for different users.This paper proposes the dffctive way to manage the set of attri-bute and value pairs.In addition,it also describes a way to define a new video presentation by separating a video stream phsycally or by sharing the portion of a bit stream,and the new method can minimize the required storage space.

  • PDF

Multimedia No-reference Video Quality Assessment Methods Using Bit Stream Information (비트스트림 정보를 이용한 멀티미디어 동영상의 무기준법 화질평가방법)

  • Seo, Guiwon;Ok, Jiheon;Lee, Kwon;Lee, Jae Ho;Lee, Chulhee
    • Journal of Broadcast Engineering
    • /
    • v.18 no.2
    • /
    • pp.283-296
    • /
    • 2013
  • Various video services with networks are increasingly available as smart phones, computers and IPTV are widely used. However, transmission over networks may experience transmission errors due to traffic increases and noise. As a result, video quality may suffer. Therefore, quality monitoring emerges as an important issue. In this paper, we propose a video quality assessment method using bit stream information. The video quality metric is calculated using header information and ES (elementary stream) information. To assess performance of the proposed algorithm, subjective quality assessment tests are conducted (VGA resolution). It is shown high correlation between subjective result and the proposed method.

Fast Stream Cipher ASC16 (고속 스트림 암호 ASC16)

  • Kim, Gil-Ho;Song, Hong-Bok;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.437-440
    • /
    • 2009
  • We propose a fast stream cipher ASC16 for software implementation. ASC16 has a very simple structure with ASR(Arithmetic Shift Register), NLF(Non-Linear Filter), and NLB(Non-Linear Block), and is executed by a word. It is a stream cipher for wireless communication, which makes 32bit key streams using s-box with non-linear transformation. The processed result is almost same as SSC2, 32bit output stream cipher, developed by Zhang, Carroll, and Chan. The period is longer than SSC2, and it causes the difficulty of Correlation attack and raises security very much. The proposed ASC16 is efficiently used in the process of a fast cipher in the limited environment such as wireless communication.

  • PDF

Enhanced Bit-Loading Techniques for Adaptive MIMO Bit-Interleaved Coded OFDM Systems (적응 다중 안테나 Bit-Interleaved Coded OFDM 시스템을 위한 향상된 Bit-Loading 기법)

  • Cho, Jung-Ho;Sung, Chang-Kyung;Moon, Sung-Hyun;Lee, In-Kyu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.18-26
    • /
    • 2009
  • When channel state information (CSI) is available at the transmitter, the system throughput can be enhanced by adaptive transmissions and opportunistic multiuser scheduling. In this paper, we consider multiple-input multiple-output (MIMO) systems employing bit-interleaved coded orthogonal frequency division multiplexing (BIC-OFDM). We first propose a bit-loading algorithm based on the Levin-Campello algorithm for the BIC-OFDM. Then we will apply this algorithm to the MIMO system with a finite set of constellations, by reassigning residual power on each stream Simulation results show that proposed bit-loading scheme which takes the residual power into account improves the system performance especially at high signal-to-noise ratio (SNR) range.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

Design of an Optimized 32-bit Multiplier for RSA Cryptoprocessors (RSA 암호화 프로세서에 최적화한 32비트 곱셈기 설계)

  • Moon, Sang-Ook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.75-80
    • /
    • 2009
  • RSA cryptoprocessors equipped with more than 1024 bits of key space handle the entire key stream in units of blocks. The RSA processor which will be the target design in this paper defines the length of the basic word as 128 bits, and uses an 256-bits register as the accumulator. For efficient execution of 128-bit multiplication, 32b*32b multiplier was designed and adopted and the results are stored in 8 separate 128-bit registers according to the status flag. In this paper, a fast 32bit modular multiplier which is required to execute 128-bit MAC (multiplication and accumulation) operation is proposed. The proposed architecture prototype of the multiplier unit was automatically synthesized, and successfully operated at the frequency in the target RSA processor.

Reducing the Effects of Noise Light Using Inter-Bit Noise Detection in a Visible Light Identification System (가시광 무선인식장치에서 비트간 잡음검출에 의한 잡음광의 영향 감소)

  • Hwang, Da-Hyun;Lee, Seong-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.412-419
    • /
    • 2011
  • In this paper, we used the inter-bit noise detection method in order to reduce the effects of noise light in a visible light identification system that uses a visible LED as a carrier source. A visible light identification system consists of a reader and a transponder. When the enable signal from the reader is detected, the transponder encodes the response data in RZ(Return-to-Zero) bit stream and sends response signal by modulating a visible LED. The reader detects the response signal mixed with noise light, samples the noise voltage in each blank low time between data bits of the RZ signal, and recovers the original data by subtracting the sampled noise from the received signal. In experiments, we improved the signal-to-noise ratio by 20dB using the inter-bit noise detection method.

Study of a 32-bit Multiplier Suitable for Reconfigurable Cryptography Processor (재구성 가능한 암호화 프로세서에 적합한 32비트 곱셈기의 연구)

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.740-743
    • /
    • 2008
  • RSA crypto-processors equipped with more than 1024 bits of key space handle the entire key stream in units of blocks. The RSA processor which will be the target design in this paper defines the length of the basic word as 128 bits, and uses an 256-bits register as the accumulator. For efficient execution of 128-bit multiplication, $32b^*32b$ multiplier was designed and adopted and the results are stored in 8 separate 128-bit registers according to the stalks flag. In this paper, a fast 32bit nodular multiplier which is required to execute 128-bit MAC (multiplication and accumulation) operation is proposed. The proposed architecture prototype of the multiplier unit was automatically synthesized, and successfully operated at the frequency in the target RSA processor.

  • PDF

Efficient Peer Assignment for Low-Latency Transmission of Scalable Coded Images

  • Su, Xiao;Wang, Tao
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.79-88
    • /
    • 2008
  • In this paper, we propose efficient peer assignment algorithms for low-latency transmission of scalable coded images in peer-to-peer networks, in which peers may dynamically join and leave the networks. The objective of our algorithm is to minimize the transmission time of a requested image that is scalable coded. When an image is scalable coded in different bit rates, the bit stream encoded in a lower bit rate is a prefix subset of the one encoded in a higher bit rate. Therefore, a peer with the same requested image coded in any bit rate, even when it is different from the requested rate, may work as a supplying peer. As a result, when a scalable coded image is requested, more supplying peers can be found in peer-to-peer networks to help with the transfer. However, the set of supplying peers is not static during transmission, as the peers in this set may leave the network or finish their transmission at different times. The proposed peer assignment algorithms have taken into account the above constraints. In this paper, we first prove the existence of an optimal peer assignment solution for a simple identity permutation function, and then formulate peer assignment with this identity permutation as a mixed-integer programming problem. Next, we discuss how to address the problem of dynamic peer departures during image transmission. Finally, we carry out experiments to evaluate the performance of proposed peer assignment algorithms.

Data Stream Allocation Algorithm for Maximizing Sum Capacity in Multiuser MIMO Systems (다중 사용자 MIMO 시스템에서 전체 채널 용량을 최대화하기 위한 데이터 스트림 할당 기법)

  • Kim, Bong-Seok;Choi, Kwon-Hue
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.1
    • /
    • pp.19-27
    • /
    • 2011
  • In this paper, we propose the data stream allocation algorithms for maximizing sum capacity of downlink multiuser MIMO (Multiple-input Multiple-output) systems with BD (Block Diagonalization). The conventional BD precoding algorithms maximize the capacity by controlling power against channel gain of each user. In multiuser MIMO systems, however, the number of data streams for each user can be used to as another control parameter, which determines the capacity. This paper proposes the data stream allocation algorithm of BD for increasing capacity in multiuser MIMO systems. The proposed algorithm allocates unequal bit stream to each user based on channel matrix of each user for maximizing sum capacity. It is proved that proposed algorithm can achieve the significantly improved sum capacity by computer simulation.