• Title/Summary/Keyword: Hamming correlation

Search Result 20, Processing Time 0.022 seconds

Traitor Traceability of Colluded Multimedia Fingerprinting code Using Hamming Distance on XOR Collusion Attack (XOR 공모공격에서 해밍거리를 이용한 공모된 멀티미디어 핑거프린팅 코드의 부정자 추적)

  • Chung, Il Yong;Rhee, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.175-180
    • /
    • 2013
  • For the traitor tracing of multimedia content, this paper presents the classification algorithm of XOR collusion attack types using hamming distance, which applies to the colluded fingerprinting codes. The conventional traitor decision hinges on the colluded fingerprinting code used by a correlation coefficient, but the proposed scheme uses hamming distance. While XOR collusion attack employing a correlation coefficient is impossible to trace the traitors about 50% colluders due to a serious XOR linear problem, our method improves the performance of traceability to trace at least 1 traitor using hamming distance, and thus, the functional behavior of the proposed traitor traceability is coincided with Probability Scheme.

A NEW FAMILY OF FREQUENCY HOPPING PATTERNS WITH GOOD HAMMING AUTOCORRELATION AND CROSSCORRELATION (우수한 해밍 자기상관성 및 타 상관성을 갖는 새로운 주파수 도약 패턴 군)

  • 노종선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.11
    • /
    • pp.1735-1741
    • /
    • 1993
  • New family of frequency hopping patterns with long period and good Hamming autocorrelation and Hamming crosscorrelation properties which can be used for frequency hopped multiple access communication systems is introduced. Period of frequency hopping patterns is qk-1, the alphabet size of frequency hopping patterns is q, and the size of family of frequency hopping patterns is q, where k is arbitrary integer and q is power of prime number. The maximum value of out-of-Phase Hamming autocorrelation function of any frequency hopping pattern and Hamming crosscorrelation function of any two frequency hopping patterns in the family is qk-1, which corresponds to optima1 Hamming correlation properties. And the average number of hits per q*q square in one frequency hopping pattern and its time shifted version or two frequency hopping patterns in the frequency hopped multiple access communication systems is less than 1.

  • PDF

Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding

  • Shanmugham, Shanthi Rekha;Paramasivam, Saravanan
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.746-757
    • /
    • 2021
  • Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.

Combining Different Distance Measurements Methods with Dempster-Shafer-Theory for Recognition of Urdu Character Script

  • Khan, Yunus;Nagar, Chetan;Kaushal, Devendra S.
    • International Journal of Ocean System Engineering
    • /
    • v.2 no.1
    • /
    • pp.16-23
    • /
    • 2012
  • In this paper we discussed a new methodology for Urdu Character Recognition system using Dempster-Shafer theory which can powerfully estimate the similarity ratings between a recognized character and sampling characters in the character database. Recognition of character is done by five probability calculation methods such as (similarity, hamming, linear correlation, cross-correlation, nearest neighbor) with Dempster-Shafer theory of belief functions. The main objective of this paper is to Recognition of Urdu letters and numerals through five similarity and dissimilarity algorithms to find the similarity between the given image and the standard template in the character recognition system. In this paper we develop a method to combine the results of the different distance measurement methods using the Dempster-Shafer theory. This idea enables us to obtain a single precision result. It was observed that the combination of these results ultimately enhanced the success rate.

Short and Efficient Frequency Hopping Codes (짧고 효과적인 주파수 도약 수열 생성)

  • Kim Young-Joon;Kim Dae-Son;Song Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.318-323
    • /
    • 2006
  • In this paper we propose three methods to generate short hopping sequences for the frequency hopping system. First, we explain the one coincidence set of sequences and the polyphase power residue seqences which have been known previously, and we suggest a method by modifying the one coincidence sequence and two methods by using the power residue sequences. We verify that the optimal position deleted-power residue sequences have the best Hamming autocorrelation property and the first position deleted-power residue sequences and the modified one coincidence sequences follows with respect to Hamming autocorrelation. We also explain that these sequences have the good balance property and can be implemented with low complexity.

A Study on the Generating Algorithm and the Correlation Function of Kumar Code Sequences for the Frequency Hopping Patterns (주파수 경로 패턴을 위한 Kumar 부호계열 발생 알고리즘 및 상관함수 특성에 관한 연구)

  • 이정재;한영렬
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.12
    • /
    • pp.1886-1902
    • /
    • 1989
  • In this paper we discuss the generating algorithm of Kumar code sequences which are based on generalized bent sequences for FH-CDMA. The code sequence generator was constructed for the shift register stages n=4 over GF (5). Finally we analyze the characteristics fo Hamming correlation between two code sequences and the time-frequency correlatins of the complete waveform with the sinusoidal chips as the elemental waveforms.

  • PDF

Security of Constant Weight Countermeasures

  • Won, Yoo-Seung;Choi, Soung-Wook;Park, Dong-Won;Han, Dong-Guk
    • ETRI Journal
    • /
    • v.39 no.3
    • /
    • pp.417-427
    • /
    • 2017
  • This paper investigates the security of constant weight countermeasures, which aim to produce indistinguishable leakage from sensitive variables and intermediate variables, assuming a constant Hamming distance and/or Hamming weight leakages. To investigate the security of recent countermeasures, contrary to many related studies, we assume that the coefficients of the simulated leakage models follow a normal distribution so that we may construct a model with approximately realistic leakages. First, using our simulated leakage model, we demonstrate security holes in these previous countermeasures. Subsequently, in contrast to the hypotheses presented in previous studies, we confirm the resistance of these countermeasures to a standard correlation power analysis (CPA). However, these countermeasures can allow a bitwise CPA to leak a sensitive variable with only a few thousand traces.

A Study on the Performance of FH/FSK Including Jammer and Code Correlation Effects (Jammer와 부호 상관 효과를 고려한 FH/FSK성능 분석에 관한 연구)

  • 안중수;박진수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.5
    • /
    • pp.424-433
    • /
    • 1991
  • In the noncoherent FH/FSK system presence of the multitione jamming and noise, in the case random and 송 structures jamming model, the performance analyzed that random and struetured jamming derived error proability. It is found that error probability and performance when error corecting code used Hamming. BCH, Convolutional code under the worst case partial band jamming interference.

  • PDF

Estimation of The Partial Discharge Position Using Neural Networks in The Power Transformers (신경망을 이용한 전력용 변압기의 부분방전 위치추정)

  • Kim, Jae-Chul;Yoon, Yong-Han;Kim, Young-Sik;Kweon, Dong-Jin
    • Proceedings of the KIEE Conference
    • /
    • 1994.07b
    • /
    • pp.1649-1651
    • /
    • 1994
  • This paper presents a new method for estimating partial discharge position using improved cross-correlation technique and neural networks in the power transformer. When ultrasonic signal is occurred by partial discharge, we detected these signals and calculated cross-correlation values with Hamming window. Also, we estimated partial discharge position using neural network with cross-correlation values. In the result of case study, we can estimate more accurately the partial discharge position than any other algorithms.

  • PDF

On-Line Estimation of Partial Discharge Location in Power Transformer

  • Yoon, Yong-Han;Kim, Jae-Chul;Chung, Chan-Soo;Kwak, Hee-Ro;Kweon, Dong-Jin
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.2
    • /
    • pp.45-51
    • /
    • 1996
  • This paper presents a neural network approach for on-line estimation of partial discharge(PD) location using advanced correlation technique in power transformer. Ultrasonic sensors detect ultrasonic signals generated by a PD and the proposed method calculates time difference between the ultrasonic signals at each sensor pair using the cross-correlation technique applied by moving average and the Hamming window. The neural network takes distance difference as inputs converted from time difference, and estimates the PD location. Case studies showed that the proposed method using advanced correlation technique and a neural network estimated the PD location better than conventional methods.

  • PDF