• Title/Summary/Keyword: ID method

Search Result 697, Processing Time 0.03 seconds

A Study of Spreading code for Watermarking of TxID of ATSC-DTV (ATSC-DTV의 송신기 식별을 위한 워터마킹용 확산코드에 관한 연구)

  • Cha Jae-Sang;Choi Seong-Jin;Lee Seon-Hee;Lee Kwang-Jik;Lee Yong-Tae;Park Goo-Man
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.100-106
    • /
    • 2006
  • In this paper, we proposed a TxID(Transmitter Identification) system using ZCD (Zero Correlation Duration) code as interference-cancelled spread codes for single frequency network of ATSC terrestrial DTV broadcasting. ZCD codes are simply implemented and have ZCD characteristics. Then, Proposal system can fundamentally solve interference problems caused by ICI(Inter Code Interference) and MPI(Multi-Path Interference) which happens in TxID system using spread coding method. Also, those can cancel truncated error which happens at watermarking for TxID since those can remove its period. In this paper, we identified the availability of TxID system applying interference-cancelled ZCD codes by analyzing DER (Detection Error Rate) which is simulated in various interference environments such as AWGN, ICI, and MPI.

Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System (검색 정보 사전 동기화를 이용한 저비용 RFID 인증 방식)

  • Ha, Jae-Cheol;Park, Jea-Hoon;Ha, Jung-Hoon;Kim, Hwan-Koo;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.77-87
    • /
    • 2008
  • Recently, many hash-based authentication protocols were presented to guarantee mutual authentication between tag and DB in RFID system. To be suitable for distributed DB environment, one generally uses fixed constant value as a tag ID. However, some existing protocols have security flaws or heavy computational loads in DB in order to search a tag ID. We propose a secure authentication protocol which is suitable for distributed DB environment by using unchangeable tag ID. The storage method of pre-synchronized information in DB at previous session is core idea of our proposal which gives low-cost ID search of DB at next session. In normal synchronization state, our protocol only requires 3 hash operations in tag and DB respectively.

Authentication Protocol Of The Read Only RFID Tag Using Partial ID (부분 ID를 이용한 읽기전용 RFID태그 인증프로토콜)

  • Li, Yong-Zhen;Jeong, Yonn-Su;Seo, Dong-Il;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.595-600
    • /
    • 2006
  • Nowadays, low-cost radio frequency identification (RFID) technique, is recognizable without the physical contact between the reader and the tag, has been attracting more and more interests from both industry and academic institutes. however, it causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. The security problem of read only tag can be only solved by physical method. In this paper, we propose a low-cost authentication protocol which can be adopted for read-only RFID tag using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping and spoofing attacking so that avoiding the location privacy exposure

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

Contactless Power Transfer System using Voltage Phase (전압위상을 이용한 무접점 전원공급 시스템에 관한 연구)

  • Yu, Joo-Hee;Kim, Choon-Sam
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.219-226
    • /
    • 2011
  • As the existing contactless power transfer system(CPTS) is adopting the principle of contactless transformer enables to supply power in contactless way using RFID(radio frequency identification)/ID communication method between primary and secondary sides of contactless transformer and detect the alien load. Such CPTS requires the circuit that generates ID in addition, and the ID identification and control generated from the secondary side is performed at the primary side, which cuases complexity of the circuit. Therefore, this study suggested the CPTS using voltage phase, and In order to verify the validity of this study, 3[W] class CPTS shall be designed, and the simulation and test of CPTS using current and voltage phases shall be carried out.

Reception Power Estimation using TxID Signal (TxID 신호를 이용한 수신전력 추정)

  • Park, Sung-Ik;Kim, Heung-Mook;Oh, Wang-Rok
    • Journal of Broadcast Engineering
    • /
    • v.14 no.3
    • /
    • pp.311-321
    • /
    • 2009
  • In a single frequency network (SFN) for Advanced Television Systems Committee (ATSC) terrestrial digital television (DTV) system, the interference due to the use of same frequency among multiple transmitters or repeaters is inevitable for receivers. This problem can be solved by adjusting transmit power and time of each transmitter and repeater. To adjust SFNs, the ATSC recommended practice (RP) introduces a transmitter identification (TxID) signal which is embedded in a signal from each transmitter or repeater. This paper proposes an efficient method to estimate the individual reception power from each transmitter or repeater based on the channel profile of SFN and the total reception power. Moreover, field test results are provided to evaluate the performance of the proposed method.

Feature-Oriented Adaptive Motion Analysis For Recognizing Facial Expression (특징점 기반의 적응적 얼굴 움직임 분석을 통한 표정 인식)

  • Noh, Sung-Kyu;Park, Han-Hoon;Shin, Hong-Chang;Jin, Yoon-Jong;Park, Jong-Il
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.667-674
    • /
    • 2007
  • Facial expressions provide significant clues about one's emotional state; however, it always has been a great challenge for machine to recognize facial expressions effectively and reliably. In this paper, we report a method of feature-based adaptive motion energy analysis for recognizing facial expression. Our method optimizes the information gain heuristics of ID3 tree and introduces new approaches on (1) facial feature representation, (2) facial feature extraction, and (3) facial feature classification. We use minimal reasonable facial features, suggested by the information gain heuristics of ID3 tree, to represent the geometric face model. For the feature extraction, our method proceeds as follows. Features are first detected and then carefully "selected." Feature "selection" is finding the features with high variability for differentiating features with high variability from the ones with low variability, to effectively estimate the feature's motion pattern. For each facial feature, motion analysis is performed adaptively. That is, each facial feature's motion pattern (from the neutral face to the expressed face) is estimated based on its variability. After the feature extraction is done, the facial expression is classified using the ID3 tree (which is built from the 1728 possible facial expressions) and the test images from the JAFFE database. The proposed method excels and overcomes the problems aroused by previous methods. First of all, it is simple but effective. Our method effectively and reliably estimates the expressive facial features by differentiating features with high variability from the ones with low variability. Second, it is fast by avoiding complicated or time-consuming computations. Rather, it exploits few selected expressive features' motion energy values (acquired from intensity-based threshold). Lastly, our method gives reliable recognition rates with overall recognition rate of 77%. The effectiveness of the proposed method will be demonstrated from the experimental results.

  • PDF

Design of Digital Broadcasting Data Service showing Supplementary Information of each Type of ID Advertisement (ID 광고의 유형별 부가정보를 보여주는 디지털방송 데이터서비스 설계)

  • KO, Kwangil
    • Journal of Digital Contents Society
    • /
    • v.19 no.9
    • /
    • pp.1671-1677
    • /
    • 2018
  • The advertisement market is an industry that is heavily influenced by media changes. As the digital broadcasting has settled, TV, a typical advertisement medium, has evolved from a passive content consuming medium into a platform for operating various data services as well as broadcasting programs. These changes mean that viewers are able to actively consume TV contents including advertisement, so the broadcasting industry needs to consider about the growth strategies that link the advertisement market with data services. This study designed a digital broadcasting data service that provides supplementary information of ID advertisement with short exposure time (less than 10 seconds) and insufficient space (less than 1/4 of TV screen). Specifically, we designed the user scenario and user interface of the data service, defined representative types of ID advertisement and the supplementary information for each type, developed a method, based on the international digital broadcasting standard DVB, for providing the supplementary information to the data service.

Efficient Decoder Model of FTN Signal for (1+7) PSK Modulation based on DVB-S3 (DVB-S3기반 (1+7)PSK 변조방식에서 FTN 신호의 효율적인 복호 모델)

  • Baek, Chang-Uk;Jung, Ji-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.55-61
    • /
    • 2017
  • In DVB-S3 standard of satellite broadcasting systems, FTN technique is applied to LDPC codes with (1+7) PSK modulation. In standard, BICM-ID and BCJR decoding method are considered to alleviate performance degradation due to FTN processing. BICM-ID method improves performance by calculating a new LLR from hard-decision value of decoder output. BCJR also improves performance by calculating forward and backward matrix each other. However these two methods require high computational complexity. Therefore this paper proposed modified decoding method in order to reduce computational complexity without performance degradation.

Comparison of the Three Molecular Diagnostic Assays for Molecular Identification of Mycobacterium tuberculosis and Nontuberculous Mycobacteria Species in Sputum Samples

  • Bae, Jinyoung;Park, Sung-Bae;Kim, Ji-Hoi;Kang, Mi Ran;Lee, Kyung Eun;Kim, Sunghyun;Jin, Hyunwoo
    • Biomedical Science Letters
    • /
    • v.26 no.3
    • /
    • pp.170-178
    • /
    • 2020
  • Mycobacterium tuberculosis (MTB) continues to be one of the main causative agents of tuberculosis (TB); moreover, the incidence of nontuberculous mycobacteria (NTM) infections has been rising gradually in both immunocompromised and immunocompetent patients. Precise and rapid detection and identification of MTB and NTM in respiratory specimens are thus important for MTB infection control. Molecular diagnostic methods based on the nucleic acid amplification test (NAAT) are known to be rapid, sensitive, and specific compared to the conventional acid-fast bacilli (AFB) smear and mycobacterial culture methods. In the present study, the clinical performances of three commercial molecular diagnostic assays, namely TB/NTM PCR (Biocore), MolecuTech Real MTB-ID® (YD Diagnostics), and REBA Myco-ID® (YD Diagnostics), were evaluated with a total of 92 respiratory specimens (22 AFB smear positives and 67 AFB smear negatives). The sensitivity and specificity of TB/NTM PCR were 100% and 75.81%, respectively. The corresponding values of MolecuTech Real MTB-ID® and REBA Myco-ID® were 56.52% and 90.32%, and 56.52% and 82.26%, respectively. TB/NTM PCR showed the highest sensitivity; however, the concordant rate was 10% compared with sequence analysis. Although MolecuTech Real MTB-ID® showed lower sensitivity, its specificity was the highest among the three methods. REBA Myco-ID® allowed accurate classification of NTM species; therefore, it was the most specific diagnostic method. Of the three PCR-based methods, MolecuTech Real MTB-ID® showed the best performance. This method is expected to enable rapid and accurate identification of MTB and NTM.