• Title/Summary/Keyword: Security Codec

Search Result 26, Processing Time 0.036 seconds

Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm (AES 암호 알고리듬 기반 보안성이 강화된 RFID 인증 프로토콜 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.83-89
    • /
    • 2012
  • This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.

PESQ-Based Selection of Efficient Partial Encryption Set for Compressed Speech

  • Yang, Hae-Yong;Lee, Kyung-Hoon;Lee, Sang-Han;Ko, Sung-Jea
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.408-418
    • /
    • 2009
  • Adopting an encryption function in voice over Wi-Fi service incurs problems such as additional power consumption and degradation of communication quality. To overcome these problems, a partial encryption (PE) algorithm for compressed speech was recently introduced. However, from the security point of view, the partial encryption sets (PESs) of the conventional PE algorithm still have much room for improvement. This paper proposes a new selection method for finding a smaller PES while maintaining the security level of encrypted speech. The proposed PES selection method employs the perceptual evaluation of the speech quality (PESQ) algorithm to objectively measure the distortion of speech. The proposed method is applied to the ITU-T G.729 speech codec, and content protection capability is verified by a range of tests and a reconstruction attack. The experimental results show that encrypting only 20% of the compressed bitstream is sufficient to effectively hide the entire content of speech.

Development of Media Crypto Algorithm for anti-hacking into CCTV (CCTV 해킹방지를 위한 미디어 암호화 알고리즘)

  • Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.62 no.2
    • /
    • pp.98-102
    • /
    • 2013
  • There are so many CCTV in our streets, buildings and public places. Nevertheless, security methods for CCTV are rarely. This paper describes a study on developing a media crypto algorithm for anti-hacking into CCTV. H.264 codec is used to compress the video stream in CCTV systems. HIGHT algorithm provided by KISA is adopted as a crypto algorithm in our development. Other crypto methods except HIGHT could be selected by company's security police. Only some bytes in VCL(Video Coding Layer) of H.264 are encrypted to improve the performance of limited platforms, such as CCTV, WebCam, smartphone. Very fast and light crypto algorithm was developed by our researches.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

Carving deleted voice data in mobile (삭제된 휴대폰 음성 데이터 복원 방법론)

  • Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.57-65
    • /
    • 2012
  • People leave voicemails or record phone conversations in their daily cell phone use. Sometimes important voice data is deleted by the user accidently, or purposely to cover up criminal activity. In these cases, deleted voice data must be able to be recovered for forensics, since the voice data can be used as evidence in a criminal case. Because cell phones store data that is easily fragmented in flash memory, voice data recovery is very difficult. However, if there are identifiable patterns for the deleted voice data, we can recover a significant amount of it by researching images of it. There are several types of voice data, such as QCP, AMR, MP4, etc.. This study researches the data recovery solutions for EVRC codec and AMR codec in QCP file, Qualcumm's voice data format in cell phone.

Digital Voice Ground Wave Range Analysis of HF Radios that Applied MELPe CODEC Using GRWAVE Program (MELPe 코덱이 적용된 HF 무전기의 GRWAVE 분석 툴을 이용한 디지털 음성 지상파 통달거리 분석)

  • Heo, Jin;Lee, Sangjin;Lee, Kangchun;Seo, Sungwon;Kim, Jungsup;Han, Sungwoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.3
    • /
    • pp.431-440
    • /
    • 2017
  • HF communications are used as a last means of long distance communications without any relay node in NLOS (Non Line-Of-Sight) environment. Conventional analog voice communication in the HF band is vulnerable to security as well as severe background noise. To overcome these shortcoming, digital voice was introduced into HF radios in the early 1980s. In this paper, we analyze avaliable digital voice communication ground wave range of HF radios that applied MELPe CODEC and MIL-STD-188-110B physical layer standard using GRWAVE program. And we evaluate usefulness of digital voice communication in HF band.

Efficient Digital Video Recording / Searching / Internet-Streaming Techniques for Multi-Channel DVR Systems (다채널 DVR 시스템을 위한 효율적인 디지털 비디오 저장 탐색 및 인터넷 전송 기술)

  • Shin, Tae-Hyun;Lee, Jae-Sung;Shin, Hyun-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.959-962
    • /
    • 2005
  • Efficient video data storage and search techniques are essential for DVR-based security systems. We have designed appropriate data structures and search techniques for efficient image storage and search, in this study. The date and time can be saved and searched as a folder form. The overall system is designed for MPEG4 CODEC. It can handle variable sizes of frames (100bytes $^{\sim}$ 6Kbytes) produced by MPEG4 CODEC without errors. We also have developed image transmission techniques through inter-net networking.

  • PDF

Copyright Protection using Encryption of DCT Coefficients and Motion Vector in Video Codec of Mobile Device (모바일 기기내의 비디오 코덱에서 DCT 계수와 움직임 벡터의 암호화를 이용한 저작권 보호)

  • Kwon, Goo Rak;Kim, Young Ro
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.41-46
    • /
    • 2008
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. In this paper, we propose the copyright protection using encryption of DCT coefficients and motion vector in MPEG-4 video codec of mobile device. This paper presents a new Digital Rights Management that modifies the Motion Vector of Macroblock for mobile device. Experimental results indicate that the proposed DRM can not only achieve very low cost of the encryption but also enable separable authentication to individual mobile devices such as Portable Multimedia Player and Personal Digital Assistants. The performance of the proposed methods have low complexity and low increase of bit rate in overhead.

Design of Object-based Video CODEC Using Hybrid Transform for the Mobile Video Telephony Environment (모바일 영상통화 환경에 적합한 하이브리드 변환을 이용한 객체기반 비디오 CODEC 설계)

  • Jeon, Sung-Hye;Jang, Bong-Joo;Seo, Yong-Su;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Annual Conference of KIPS
    • /
    • 2009.11a
    • /
    • pp.375-376
    • /
    • 2009
  • 모바일 환경 상에서 영상통화는 제한된 대역폭 및 손떨림 현상 등의 문제로 인하여 저품질의 서비스가 제공되고 있다. 기존의 영상통화 환경에서 향상된 품질의 영상통화 서비스를 제공하기 위하여 중요 객체와 비중요 객체를 구분하여 분리하며, 중요 객체에 대해서는 고화질을 갖도록 하는 비디오 압축 방법을 제안한다. 매 프레임 마다 중요 객체와 비중요 객체를 분리하며, 분리된 객체는 다른 비트율과 화질을 갖도록 각 객체에 적합한 변환 커널을 적용하여 부호화 절차를 달리한다. 중요 객체는 저압축, 고화질을 가지도록 부호화하며, 비중요 객체에 대해서는 고압축, 저화질을 가지도록 부호화함으로써 제한된 대역폭 내에서 비트율을 유지하도록 한다.