• Title/Summary/Keyword: Digital Bit Stream

Search Result 61, Processing Time 0.02 seconds

A Performance Analysis of the Speech Coders for Digital Mobile Radio (디지털 이동통신을 위한 음성 부호기의 성능 분석)

  • 정영모;이상욱
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.4
    • /
    • pp.491-501
    • /
    • 1990
  • Recently, four speech coding techniques, namely, SBC-APCM(sub-band coding adaptive PCM), RPE-LPC(regualr pulse excitation linear predictive codec), MPE-LTP(multi-pulse excited long-term prediction) and CELP (code-excited linear prediction) are proposed for digital mobile radio applications. However, a performance comparison of these coders in the Rayleigh fading environment has not been made yet. In this paper, the performances of the four spech coders in the random bit error and burst error environment are investigated. For the channel coding of SBC-APCM, RPE-LPC and MPE-LTP, the sensitivity of output bit stream is measured and a bit selective forward error correction is provided acording to the measured bit sensitivity. And for an attempt to improve the performance of CELP, an optimum quantizer is applied for transmitting scalar quantities in CELP. However, an improvement over the conventional approach is found to be negligible. For the channel coding of CELP, Reed-Solomon code, Golay code, convolutional code of rate 1/2 shows the best performance. Finally, from the simulation results, it is concluded that CELP is the best candidate for digital mobile radio and is followed by MPE-LTP, SBC-APCM and RPE-LPC.

  • PDF

Implementation of fast stream cipher AA128 suitable for real time processing applications (실시간 처리 응용에 적합한 고속 스트림 암호 AA128 구현)

  • Kim, Gil-Ho;Cho, Gyeong-Yeon;Rhee, Kyung Hyune;Shin, Sang Uk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2207-2216
    • /
    • 2012
  • Recently, wireless Internet environment with mobile phones and wireless sensor networks with severe resource restrictions have been actively studied. Moreover, an overall security issues are essential to build a reliable and secure sensor network. One of secure solution is to develop a fast cryptographic algorithm for data encryption. Therefore, we propose a 128-bit stream cipher, AA128 which has efficient implementation of software and hardware and is suitable for real-time applications such as wireless Internet environment with mobile phones, wireless sensor networks and Digital Right Management (DRM). AA128 is stream cipher which consists of 278-bit ASR and non-linear transformation. Non-linear transformation consists of Confusion Function, Nonlinear transformation(SF0 ~ SF3) and Whitening. We show that the proposed stream cipher AA128 is faster than AES and Salsa20, and it satisfies the appropriate security requirements. Our hardware simulation result indicates that the proposed cipher algorithm can satisfy the speed requirements of real-time processing applications.

Fast Stream Cipher AA32 for Software Implementation (소프트웨어 구현에 적합한 고속 스트림 암호 AA32)

  • Kim, Gil-Ho;Park, Chang-Soo;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.954-961
    • /
    • 2010
  • Stream cipher was worse than block cipher in terms of security, but faster in execution speed as an advantage. However, since so far there have been many algorithm researches about the execution speed of block cipher, these days, there is almost no difference between them in the execution speed of AES. Therefore an secure and fast stream cipher development is urgently needed. In this paper, we propose a 32bit output fast stream cipher, AA32, which is composed of ASR(Arithmetic Shifter Register) and simple logical operation. Proposed algorithm is a cipher algorithm which has been designed to be implemented by software easily. AA32 supports 128bit key and executes operations by word and byte unit. As Linear Feedback Sequencer, ASR 151bit is applied to AA32 and the reduction function is a very simple structure stream cipher, which consists of two major parts, using simple logical operations, instead of S-Box for a non-linear operation. The proposed stream cipher AA32 shows the result that it is faster than SSC2 and Salsa20 and satisfied with the security required for these days. Proposed cipher algorithm is a fast stream cipher algorithm which can be used in the field which requires wireless internet environment such as mobile phone system and real-time processing such as DRM(Digital Right Management) and limited computational environments such as WSN(Wireless Sensor Network).

An Optical Threshold Generator for the Stream Cipher Systems (스트림 암호 시스템을 위한 광 Threshold 발생기)

  • 한종욱;강창구;김대호;김은수
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.34D no.11
    • /
    • pp.90-100
    • /
    • 1997
  • In this paper, we propose a new optical thresold generator as a key-stream genrator for stream cipher systems. The random key-bit stream is generated by a digital generator that is composed of LFSRs and nonlinear ligics. Digital implementatin of a key-stream generator requires large memory to implement programmable tapping points. This memory problem may be overcome easily by using the proposed optical system which has the proberty of 2D parallel processing.To implement hte threshold generator optically, we use conventional twisted nematic type SLMs (LCDs). This proposed system is based on the shadow casting technique for the AND operation between taps and sregister stages. It is also based on the proposed PMRS method for modulo 2 addition. The proposed PMRS method uses the property of light's polarization on LCD and can be implemented optically using one LCD and some mirrors. One of the major advantages of the proosed system is that there is no limitation of the number of the progarmmable tapping points. Therefore, the proposed system can be applied for the 2D encryption system which processes large amounts of data such as 2D images. We verify the proposed system with some simulation.

  • PDF

A Stream Ciphering Method using a Chaotic System

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.433-436
    • /
    • 2010
  • In this paper, we presented a ciphering method whose target data is any kind of digital bit-stream. It uses a chaotic system as the main encrypting tool, MISR (Multi-Input Signature Register), and shift-and-rotation function, all of which are exclusive-ORed with the plaintext. Also, it incorporates a cipher text feedback mode such that part of the previously ciphered data is fed back to encrypt the current data. The encryption block size and the amount of feedback data are different at each ciphering operation. Experimental results with the image/video date showed that this method has enough speed and encryption effect with negligible latency time. Thus, we are expecting it to have various application areas that need high speed stream ciphering with high security level.

A Study on a High-Speed $mB_1Z$ Transmission Line Code (고속 $mB_1Z$ 전송로부호에 관한 연구)

  • 유봉선;원동호;김병찬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.12 no.4
    • /
    • pp.347-356
    • /
    • 1987
  • This paper is to propose a new line code suitable for a high speed unipolar pulse transmission system, such as a high speed optical digital transmission system. The original information speed can be converted into the transmission speed $\frac{(m+1)}{m}$ by the speed converter. Then this code, named mBiZ code, is generated by means of an Exclusive NOR between the bit stream inserted a space into every m bits and the bit stream delayed by the time slot allocated a single bit at the output coded sequence. Therefore, a mBiZ code can reduce a redundancy in the line code for transmission and its conversion circuits can be devised easily. The mBiZ code can also suppress undesirable long consecuitive identical digits and make line code balance in the mark and space ratio. Therefore, high frequency and low frequency components in power spectrum of a mBiZ code can be suppessed.

  • PDF

Channel Error Detwction and Concealment Technqiues for the MPEG-2 Video Standard (MPEG-2 동영상 표준방식에 대한 채널 오차의 검출 및 은폐 기법)

  • 김종원;박종욱;이상욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.10
    • /
    • pp.2563-2578
    • /
    • 1996
  • In this paper, channel error characteristics are investigated to alleviate the channel error propagation problem of the digital TV transmission systems. First, error propagation problems, which are mainly caused by the inter-frame dependancy and variable length coding of the MPEG-2 baseline encoder, are intensively analyzed. Next, existing channel resilient schemes are systematically classified into two kinds of schemes; one for the encoder and the other for the decoder. By comparing the performance and implementation cost, the encoder side schemes, such as error localization, layered coding, error resilience bit stream generation techniques, are described in this paper. Also, in an effort to consider the parcticality of the real transmission situation, an efficient error detection scheme for a decoder system is proposed by employing a priori information of the bit stream syntas, checking the encoding conditions at the encoder stage, and exploiting the statistics of the image itself. Finally, subsequent error concealment technique based on the DCT coefficient recovery algorithm is adopted to evaluate the performance of the proposed error resilience technique. The computer simulation results show that the quality of the received image is significantly improved when the bit error rate is as high as 10$^{-5}$ .

  • PDF

Design and implementation of a media processor for mobile multimedia broadcasting (이동멀티미디어 방송을 위한 미디어 처리기 설계 및 구현)

  • 안상우;이용주;최진수;김진웅
    • Journal of Broadcast Engineering
    • /
    • v.8 no.3
    • /
    • pp.259-267
    • /
    • 2003
  • In this paper, we propose a media processor to provide interactive services in mobile multimedia broadcasting environments. The proposed system Is designed to support various functionalities, such as generation of MPEG-4 IOD (Initial Object Descriptor)/OD(Object Descriptor)/BIFS (Binary Format for Scene) data, encapsulation of MPEG-4 AVC (Advanced Video Coding)/BSAC (Bit Sliced Arithmetic Coding) stream and generated IOD/OD/BIFS data into SL (Sync Layer) packet, packetization of SL packet into TS (Transport Stream) packet and multiplexing. The proposed media processor can provide MPEG-4 based interactive services for users.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

An Embedded Multifunctional Media System for Mobile Devices in Terrestrial DTV Relaying

  • Huang, Jun;Yin, Haibing
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1272-1285
    • /
    • 2018
  • The paper presents a novel embedded multifunctional media sever (EMMS) for mobile devices to receive various media programs. Being different from other contemporary system research, the paper mainly studies how to design a reception solution for terrestrial digital television (DTV) on mobile devices and how to enable mobile devices can receive DTV program, enjoy video-on-demand (VOD), achieve video surveillance and relay Internet video program via local Wi-Fi simultaneously. In the system design, we integrate broadcasting-terrestrial DTV tuner, streaming media re-transmission system, VOD disk, video camera and access interface to the Internet into EMMS, which can either receive terrestrial DTV radio signals and demodulate out digital transport stream (TS), or can read streaming media bit-stream from VOD disk, surveillance camera or access interface to the Internet. The experimental results show the proposed system is stable and quality-efficient. Comparing with the other systems, the proposed system has the least packet loss rate and response time.