• Title/Summary/Keyword: Random Code

Search Result 329, Processing Time 0.026 seconds

New Watermarking Technique Using Data Matrix and Encryption Keys

  • Kim, Il-Hwan;Kwon, Chang-Hee;Lee, Wang-Heon
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.4
    • /
    • pp.646-651
    • /
    • 2012
  • Meaningful logos or random sequences have been used in the current digital watermarking techniques of 2D bar code. The meaningful logos can not only be created by copyright holders based on their unique information, but are also very effective when representing their copyrights. The random sequences enhance the security of the watermark for verifying one's copyrights against intentional or unintentional attacks. In this paper, we propose a new watermarking technique taking advantage of Data Matrix as well as encryption keys. The Data Matrix not only recovers the original data by an error checking and correction algorithm, even when its high-density data storage and barcode are damaged, but also encrypts the copyright verification information by randomization of the barcode, including ownership keys. Furthermore, the encryption keys and the patterns are used to localize the watermark, and make the watermark robust against attacks, respectively. Through the comparison experiments of the copyright information extracted from the watermark, we can verify that the proposed method has good quality and is robust to various attacks, such as JPEG compression, filtering and resizing.

Large eddy simulation of a square cylinder flow: Modelling of inflow turbulence

  • Tutar, M.;Celik, I.
    • Wind and Structures
    • /
    • v.10 no.6
    • /
    • pp.511-532
    • /
    • 2007
  • The present study aims to generate turbulent inflow data to more accurately represent the turbulent flow around a square cylinder when the inflow turbulence level is significant. The modified random flow generation (RFG) technique in conjunction with a previously developed LES code is successfully adopted into a finite element based fluid flow solver to generate the required inflow turbulence boundary conditions for the three-dimensional (3-D) LES computations of transitional turbulent flow around a square cylinder at Reynolds number of 22,000. The near wall region is modelled without using wall approximate conditions and a wall damping coefficient is introduced into the calculation of sub-grid length scale in the boundary layer of the cylinder wall. The numerical results obtained from simulations are compared with each other and with the experimental data for different inflow turbulence boundary conditions in order to discuss the issues such as the synthetic inflow turbulence effects on the 3-D transitional flow behaviour in the near wake and the free shear layer, the basic mechanism by which stream turbulence interacts with the mean flow over the cylinder body and the prediction of integral flow parameters. The comparison among the LES results with and without inflow turbulence and the experimental data emphasizes that the turbulent inflow data generated by the present RFG technique for the LES computation can be a viable approach in accurately predicting the effects of inflow turbulence on the near wake turbulent flow characteristics around a bluff body.

Assessment of Fatigue and Fracture on a Tee-Junction of LMFBR Piping Under Thermal Striping Phenomenon

  • Lee, Hyeong-Yeon;Kim, Jong-Bum;Bong Yoo
    • Nuclear Engineering and Technology
    • /
    • v.31 no.3
    • /
    • pp.267-275
    • /
    • 1999
  • This paper deals with the industrial problem of thermal striping damage on the French prototype fast breeder reactor, Phenix and it was studied in coordination with the research program of IAEA. The thermomechanical and fracture mechanics evaluation procedure of thermal striping damage on the tee-junction of the secondary piping using Green's function method and standard FEM is presented. The thermohydraulic(T/H) loading condition used in the present analysis is the random type thermal loads computed by T/H analysis on the turbulent mixing of the two flows with different temperatures. The thermomechanical fatigue damage was evaluated according to ASME code section 111 subsection NH. The results of the fatigue analysis showed that fatigue failure would occur at the welded joint within 90,000 hours of operation. The assessment for the fracture behavior of the welded joint showed that the crack would be initiated at an early stage in the operation. It took 42,698.9 hours for the crack to propagate up to 5 mm along the thickness direction. After then, however, the instability analysis, using tearing modulus, showed that the crack would be arrested, which was in agreement with the actual observation of the crack. An efficient analysis procedure using Green's function approach for the crack propagation problem under random type load was proposed in this study. The analysis results showed good agreement with those of the practical observations.

  • PDF

A New Embedded Compression Algorithm for Memory Size and Bandwidth Reduction in Wavelet Transform Appliable to JPEG2000 (JPEG2000의 웨이블릿 변환용 메모리 크기 및 대역폭 감소를 위한 새로운 Embedded Compression 알고리즘)

  • Son, Chang-Hoon;Song, Sung-Gun;Kim, Ji-Won;Park, Seong-Mo;Kim, Young-Min
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.94-102
    • /
    • 2011
  • To alleviate the size and bandwidth requirement in JPEG2000 system, a new Embedded Compression(EC) algorithm with minor image quality drop is proposed. For both random accessibility and low latency, very simple and efficient hadamard transform based compression algorithm is devised. We reduced LL intermediate memory and code-block memory to about half size and achieved significant memory bandwidth reductions(about 52~73%) through proposed multi-mode algorithms, without requiring any modification in JPEG2000 standard algorithm.

A Robust Image Watermarking Algorithm and System Architecture for Semi-fingerprinting (Semi-fingerprinting을 위한 강인한 이미지 워터마킹 알고리즘 및 시스템 구조)

  • Joung, Gil-Ho;Lee, Han-Ho;Eom, Young-Ik
    • The KIPS Transactions:PartD
    • /
    • v.10D no.2
    • /
    • pp.309-316
    • /
    • 2003
  • In this paper, we propose a new watermarking method based on spread spectrum and a semi-fingerprinting system architecture that can be built using our robust watermarking method. Especially, we describe a method that extends the application area of watermarking technology to more practical application domains by applying the watermarking technology that has been focused mainly on copyright protection to fingerprinting area. Our proposed watermarking scheme uses the method that inserts more data by using random number shifting method. We improved the reliability of acquired data with 20-bits CRC code and 60-bits inserted information. In addition, we designed the system architecture based on the recommendation of cIDf (content ID forum) in order to apply the system on the semi-fingerprinting area.

A Study on the Performance Analysis of Asynchronous Repeated FH/MFSK System (비동기 FH/MFSK 반복전송 시스템의 성능분석)

  • 지영호;한영렬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.2
    • /
    • pp.120-126
    • /
    • 1988
  • In this paper the performance of the asynchronous Repeated FH/MFSK system for the CDMA(Code Division Multiple Access) was analyzed. Actually there was no difference in the probabilities of hit of frequency between Random Coding method and frequency hopping pattern vector suggested by Einarsso. Actual situation was adopted as a model in thie simulation, on the assumption thet;a:there was no Noise, Multipath propagation, b:there was only mutual interference. c:the number of users M was given. Also it was found that there is almost no deviation between the value calculated from the formula of word error probability expressed by bound and that obtained from this simulation.

  • PDF

Analysis of the DC Resistance of the Butt Joint using the Random Contact Patterns of Strands

  • Lee, Ho-Jin;Lee, Sang-Il;Lee, Bong-Sang
    • Progress in Superconductivity and Cryogenics
    • /
    • v.6 no.4
    • /
    • pp.17-21
    • /
    • 2004
  • The butt joint was verified to satisfy the thermal stability of the ITER magnet system through the ITER CS model coil test. Since the contact area in the butt joint is limited to the cross section of the cable, it is necessary to analyze and control the joining parameters precisely for improving the DC resistance. It is difficult to simulate the cables, which are composed of a lot of strands, as three-dimensional models using the commercial code. The random numbers were used to simulate many kinds of contact patterns of the strands on the bonding surface for calculating the bonding area and the DC resistance of the butt joint. The calculated DC resistance decreases with an increase of cable filling factor in terminal. The calculated DC resistance of a 0.9 cable filling factor is about 0.48 n-Ohm, which is about one-tenth of that in the CS model coil test when not considering the electrical contact resistance. From this difference, the electrical contact resistance between the strands and copper sheet was calculated.

Reliability Based Design of Caisson type Quay Wall Using Partial Safety Factors (부분안전계수를 이용한 케이슨식안벽의 신뢰성설계법)

  • Kim, Dong-Hyawn;Yoon, Gil-Lim
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.21 no.3
    • /
    • pp.224-229
    • /
    • 2009
  • Partial safety factors(PSFs) for Level I reliability based design of caisson type quay walls were calculated. First order reliability method(FORM) based PSFs are the functions of sensitivities of limit state function with respect to design random variables, target reliability index, characteristic values and first moment of random variables. Modified PSFs for water level and resilient water level are newly defined to keep consistency with the current design code. In the numerical example, PSFs were calculated by using a target reliability index. Seismic coefficient is defined to show extreme distribution. It was found that PSFs for seismic coefficient becomes smaller as the return period for design seismic coefficient grows longer.

Performance Analysis of MAC Protocol for Packet Data Service in CDMA Based Mobile Communication Systems (CDMA 기반 이동통신 시스템에서의 패킷 데이터 서비스를 위한 MAC 프로토콜의 성능분석)

  • 박성수;조동호;송영재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.973-986
    • /
    • 1999
  • In this paper, we propose MAC protocol that consists of channel access mechanism and transmission mechanism to support effective wireless packet data service. In channel access mechanism, broadcast channel announces status information of random access channel, and mobile station tries random access based on status information. Also, mobile station has access probability to prevent collision increase due to transmission of short message. For effective transmission, mobile station changes transmission rate based on transmission queue status to adapt burst traffic characteristics. In restricted environments of transmission code and bandwidth, proposed protocol shows better performance than cdma2000 system.

  • PDF

Self-Encoded Spread Spectrum with Iterative Detection under Pulsed-Noise Jamming

  • Duraisamy, Poomathi;Nguyen, Lim
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.276-282
    • /
    • 2013
  • Self-encoded spread spectrum (SESS) is a novel modulation technique that acquires its spreading code from a random information source, rather than using the traditional pseudo-random noise (PN) codes. In this paper, we present our study of the SESS system performance under pulsed-noise jamming and show that iterative detection can significantly improve the bit error rate (BER) performance. The jamming performance of the SESS with correlation detection is verified to be similar to that of the conventional direct sequence spread spectrum (DSSS) system. On the other hand, the time diversity detection of the SESS can completely mitigate the effect of jamming by exploiting the inherent temporal diversity of the SESS system. Furthermore, iterative detection with multiple iterations can not only eliminate the jamming completely but also achieve a gain of approximately 1 dB at $10^{-3}$ BER as compared with the binary phase shift keying (BPSK) system under additive white gaussian noise (AWGN) by effectively combining the correlation and time diversity detections.