• Title/Summary/Keyword: Random Code

Search Result 329, Processing Time 0.029 seconds

Classification and Generator Polynomial Estimation Method for BCH Codes (BCH 부호 식별 및 생성 파라미터 추정 기법)

  • Lee, Hyun;Park, Cheol-Sun;Lee, Jae-Hwan;Song, Young-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.2
    • /
    • pp.156-163
    • /
    • 2013
  • The use of an error-correcting code is essential in communication systems where the channel is noisy. When channel coding parameters are unknown at a receiver side, decoding becomes difficult. To perform decoding without the channel coding information, we should estimate the parameters. In this paper, we introduce a method to reconstruct the generator polynomial of BCH(Bose-Chaudhuri-Hocquenghem) codes based on the idea that the generator polynomial is compose of minimal polynomials and BCH code is cyclic code. We present a probability compensation method to improve the reconstruction performance. This is based on the concept that a random data pattern can also be divisible by a minimal polynomial of the generator polynomial. And we confirm the performance improvement through an intensive computer simulation.

A Watermarking Method Based on the Informed Coding and Embedding Using Trellis Code and Entropy Masking (Trellis 부호 및 엔트로피 마스킹을 이용한 정보부호화 기반 워터마킹)

  • Lee, Jeong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2677-2684
    • /
    • 2009
  • In this paper, we study a watermarking method based on the informed coding and embedding by means of trellis code and entropy masking. An image is divided as $8{\times}8$ block with no overlapping and the discrete cosine transform(DCT) is applied to each block. Then the 16 medium-frequency AC terms of each block are extracted. Next it is compared with gaussian random vectors having zero mean and unit variance. As these processing, the embedding vectors with minimum value of linear combination between linear correlation and Watson distance can be obtained by Viterbi algorithm at each stage of trellis coding. For considering the image characteristics, we apply different weight value between the linear correlation and the Watson distance using the entropy masking. To evaluate the performance of proposed method, the average bit error rate of watermark message is calculated from different several images. By the experiments the proposed method is improved in terms of the average bit error rate.

Performance Improvement of a Movie Recommendation System using Genre-wise Collaborative Filtering (장르별 협업필터링을 이용한 영화 추천 시스템의 성능 향상)

  • Lee, Jae-Sik;Park, Seog-Du
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.65-78
    • /
    • 2007
  • This paper proposes a new method of weighted template matching for machine-printed numeral recognition. The proposed weighted template matching, which emphasizes the feature of a pattern using adaptive Hamming distance on local feature areas, improves the recognition rate while template matching processes an input image as one global feature. Template matching is vulnerable to random noises that generate ragged outlines of a pattern when it is binarized. This paper offers a method of chain code trimming in order to remove ragged outlines. The method corrects specific chain codes within the chain codes of the inner and the outer contour of a pattern. The experiment compares confusion matrices of both the template matching and the proposed weighted template matching with chain code trimming. The result shows that the proposed method improves fairly the recognition rate of the machine-printed numerals.

  • PDF

A Study on Detection of Small Size Malicious Code using Data Mining Method (데이터 마이닝 기법을 이용한 소규모 악성코드 탐지에 관한 연구)

  • Lee, Taek-Hyun;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.11-17
    • /
    • 2019
  • Recently, the abuse of Internet technology has caused economic and mental harm to society as a whole. Especially, malicious code that is newly created or modified is used as a basic means of various application hacking and cyber security threats by bypassing the existing information protection system. However, research on small-capacity executable files that occupy a large portion of actual malicious code is rather limited. In this paper, we propose a model that can analyze the characteristics of known small capacity executable files by using data mining techniques and to use them for detecting unknown malicious codes. Data mining analysis techniques were performed in various ways such as Naive Bayesian, SVM, decision tree, random forest, artificial neural network, and the accuracy was compared according to the detection level of virustotal. As a result, more than 80% classification accuracy was verified for 34,646 analysis files.

Scalable Fingerprinting Scheme based on Angular Decoding for LCCA Resilience (선형결합 공모공격에 강인한 각도해석 기반의 대용량 핑거프린팅)

  • Seol, Jae-Min;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.713-720
    • /
    • 2008
  • Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous research works are based on ACC (anti-collusion code) for identifying each user, however, ACC are shown to be resilient to average and median attacks, but not to LCCA and cannot support large number of users. In this paper, we propose a practical SACC (scalable anti-collusion code) scheme and its angular decoding strategy to support a large number of users from basic ACC (anti-collusion code) with LCCA (linear combination collusion attack) robustness. To make a scalable ACC, we designed a scalable extension of ACC codebook using a Gaussian distributed random variable, and embedded the resulting fingerprint using human visual system based watermarking scheme. We experimented with standard test images for colluder identification performance, and our scheme shows good performance over average and median attacks. Our angular decoding strategy shows performance gain over previous decoding scheme on LCCA colluder set identification among large population.

Failure Probability of Corrosion Pipeline with Varying Boundary Condition

  • Lee, Ouk-Sub;Pyun, Jang-Sik
    • Journal of Mechanical Science and Technology
    • /
    • v.16 no.7
    • /
    • pp.889-895
    • /
    • 2002
  • This paper presents the effect of external corrosion, material properties, operation condition and design thickness in pipeline on failure prediction using a failure probability model. The predicted failure assessment for the simulated corrosion defects discovered in corroded pipeline is compared with that determined by ANSI/ASME B31G code and a modified B31G method. The effects of environmental, operational, and random design variables such as defect depth, pipe diameter, defect length, fluid pressure, corrosion rate, material yield stress and pipe thickness on the failure probability are systematically studied using a failure probability model for the corrosion pipeline.

Fuzzy-ARTMAP based Multi-User Detection

  • Lee, Jung-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3A
    • /
    • pp.172-178
    • /
    • 2012
  • This paper studies the application of a fuzzy-ARTMAP (FAM) neural network to multi-user detector (MUD) for direct sequence (DS)-code division multiple access (CDMA) system. This method shows new solution for solving the problems, such as complexity and long training, which is found when implementing the previously developed neural-basis MUDs. The proposed FAM based MUD is fast and easy to train and includes capabilities not found in other neural network approaches; a small number of parameters, no requirements for the choice of initial weights, automatic increase of hidden units, no risk of getting trapped in local minima, and the capabilities of adding new data without retraining previously trained data. In simulation studies, binary signals were generated at random in a linear channel with Gaussian noise. The performance of FAM based MUD is compared with other neural net based MUDs in terms of the bit error rate.

OptoDigital Implementation of Multiple Information Hiding and Extraction System (다중 정보 은폐 및 추출 시스템의 광-디지털적 구현)

  • 김은수
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2002.07a
    • /
    • pp.126-127
    • /
    • 2002
  • 본 논문에서는 최근, 차세대 정보보호 기술로 많은 연구가 이루어지고 있는 디지털 정보은폐(Digital Information hiding) 기술과 광정보처리 기술을 상호 보완적으로 이용한 새로운 복합 광-디지털 다중 정보은폐 및 실시간 추출 시스템을 구현하였다. 즉, 디지털 기술을 이용한 다중 정보은폐에서는 확산코드간에 랜덤성과 직교성을 보장할 수 있는 새로운 코드로써 의사랜덤 코드(Pseudo random code)와 하다마드 행렬(Hadamard matrix)을 상호보완적으로 조합하여 만든 스테고 키(stego key)를 사용하였으며 이를 이용하여 임의의 커버영상(cover image)에 다중의 정보를 은폐시킬 수 있는 새로운 기법을 제시하였다. 이와 같은 방법으로 은폐된 정보는 정보 은폐시 사용된 스테고 키성분이 정확하게 일치될 경우에만 추출될 수 있으므로 불법 사용자가 무한히 발생시킬 수 있는 랜덤시퀀스를 정확하게 재생하는 것은 거의 불가능함으로 강한 비화성을 가지며, 하다마드 행렬의 직교성으로 서로 다른 확산코드간의 상관성이 발생하지 않기 때문에 에러 없는 은폐정보의 추출도 가능하다. (중략)

  • PDF

Development of an algorithm for crack pattern recognition (균열 패턴인식 알고리즘 개발)

  • Lee Bang Yeon;Kim Yun-Yong;Kim Jin-Keun;Park Seok-Kyun
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2004.05a
    • /
    • pp.716-719
    • /
    • 2004
  • This study proposes an algorithm for recognition of crack patterns, which includes horizontal, vertical, diagonal$(-45^{\circ})$, diagonal$(+45^{\circ})$, and random cracks, based on image processing technique and artificial neural network. A MATLAB code was developed for the proposed algorithm, and then numerical tests were performed on thirty-eight crack images to examine validity of the algorithm. Within the limited tests in the present study, the proposed algorithm was revealed as accurately recognizing the crack patterns when compared to those classified by a human expert.

  • PDF

Image Compressing of Color tone image by transformed Q-factor (Q-factor변형에 의한 색조영상 압축에 관한 연구)

  • Choi, Kum-Su;Moon, Young-Deck
    • Proceedings of the KIEE Conference
    • /
    • 1999.11c
    • /
    • pp.781-783
    • /
    • 1999
  • A storage or transmission of image is difficult without image compression processing because the numbers of generated or reborned image data are very much. In case of the random signal, image compression efficiency is low doing without loss of image information, but compressibility by using JPEG is better. We used Huffman code of JPEG, it assigne the low bit value for data of a lot of generated frequency, assigne the high bit value for data of a small quantity. This paper improved image compression efficiency with transformming Q-factor and certified the results with compressed image. A proposed method is very efficience for continuos a color tone image.

  • PDF