• Title/Summary/Keyword: Side Information

Search Result 3,577, Processing Time 0.033 seconds

Audio High-Band Coding based on Autoencoder with Side Information (부가 정보를 이용하는 오토 인코더 기반의 오디오 고대역 부호화 기술)

  • Cho, Hyo-Jin;Shin, Seong-Hyeon;Beack, Seung Kwon;Lee, Taejin;Park, Hochong
    • Journal of Broadcast Engineering
    • /
    • v.24 no.3
    • /
    • pp.387-394
    • /
    • 2019
  • In this study, a new method of audio high-band coding based on autoencoder with side information is proposed. The proposed method operates in the MDCT domain, and improves the performance by using additional side information consisting of the previous and current low bands, which is different from the conventional autoencoder that only inputs information to be encoded. Moreover, the side information in a time-frequency domain enables the high-band coder to utilize temporal characteristics of the signal. In the proposed method, the encoder transmits a 4-dimensional latent vector computed by the autoencoder and a gain variable using 12 bits for each frame. The decoder reconstructs the high band by applying the decoded low bands in the previous and current frames and the transmitted information to the autoencoder. Subjective evaluation confirms that the proposed method provides equivalent performance to the SBR at approximately half the bit rate of the SBR.

A Side Channel Attack with Vibration Signal on Card Terminal (진동 신호를 이용한 카드 단말기 부채널 공격)

  • Jang, Soohee;Ha, Youngmok;Yoon, Jiwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1045-1053
    • /
    • 2014
  • In this paper, we assume that the information leakage through side-channel signal may occur from the card payment terminal and newly introduce a real application attack model. The attack model is a side channel attack based on vibration signals, which are detected by a small sensor attached on card terminal by attacker. This study is similar to some other studies regarding side channel attack. However, this paper is different in that it is based on the non-language model. Because the financial transaction information such as a card number, password, mobile phone number and etc cannot have a constant pattern. In addition, there was no study about card terminal. Therefore, this new study is meaningful. We collected vibration signals on card terminal with a small wireless sensor and analyzed signal data with statistical signal processing techniques using spectrum of frequency domain and principal component analysis and pattern recognition algorithms. Finally, we evaluated the performances by using real data from the sensor.

Prediction of Drug Side Effects Based on Drug-Related Information (약물 관련 정보를 이용한 약물 부작용 예측)

  • Seo, Sukyung;Lee, Taekeon;Yoon, Youngmi
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.21-28
    • /
    • 2019
  • Side effects of drugs mean harmful and unintended effects resulting from drugs used to prevent, diagnose, or treat diseases. These side effects can lead to patients' death and are the main causes of drug developmental failures. Thus, various methods have been tried to identify side effects. These can be divided into biological and systems biology approaches. In this study, we use systems biology approach and focus on using various phenotypic information in addition to the chemical structure and target proteins. First, we collect datasets that are used in this study, and calculate similarities individually. Second, we generate a set of features using the similarities for each drug-side effect pair. Finally, we confirm the results by AUC(Area Under the ROC Curve), and showed the significance of this study through a comparison experiment.

Side-Channel Attacks on LEA with reduced masked rounds (축소 마스킹이 적용된 경량 블록 암호 LEA-128에 대한 부채널 공격)

  • Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.253-260
    • /
    • 2015
  • The side-channel attack is widely known as an attack on implementations of cryptographic algorithms using additional side-channel information such as power traces, electromagnetic waves and sounds. As a countermeasure of side channel attack, the masking method is usually used, however full-round masking makes the efficiency of ciphers dramatically decreased. In order to avoid such a loss of efficiency, one can use reduced-round masking. In this paper, we describe a side channel attack on the lightweight block cipher LEA with the first one~six rounds masked. Our attack is based on differentials and power traces which provide knowledge of Hamming weight for the intermediate data computed during the enciphering of plaintexts. According to our experimental result, it is possible to recover 25 bits of the first round key in LEA-128.

Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF system (KLA-SCARF 부채널 검증 보드 구현)

  • Choi, YongJe;Choi, DooHo;Ryou, JeaCheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.229-240
    • /
    • 2014
  • With increasing demands for security evaluation of side-channel resistance for crypto algorithm implementations, many equipments are developed at various research institutes. Indeed, commercial products came out for the purpose of evaluation and certification tool of security products. However, various types of security products exclusive a smart card make it difficult to implement a security evaluation system for them. In this paper, we describe implementation and characteristic of the side-channel evaluation boards of the KLA-SCARF, which is the project to develop domestic side-channel evaluation system. This report would be helpful for following researchers who intend to develop side-channel evaluation boards for other security devices.

MF/HF Marine Whip Antenna with Side Whips (보조 휩을 갖는 중 ${\cdot}$ 단파대 선박용 휩 안테나)

  • Park, Dong-Kook;Ahn, Dong-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1A
    • /
    • pp.41-46
    • /
    • 2003
  • A MF/HF marine whip antenna with side whips, which are connected at an angle with the straight main whip, has reported In this paper, the effects of side whips on the antenna are simulated by using NEC-WIN and a novel MF/HF ship antenna with side whips is designed First of all, the gain, return loss, and radiation pattern of the antenna on infinite perfect conductor plane are simulated as function of the parameters of the side whip, such as the number, the location, the length of the side whip and the angle with the main whip. After that, the size of the antenna is decided and set up on an experimental ship in Korea Maritime University. The antenna on the ship are simulated and the simulated input impedances are good agreement with the measured results.

Traffic Seasonality aware Threshold Adjustment for Effective Source-side DoS Attack Detection

  • Nguyen, Giang-Truong;Nguyen, Van-Quyet;Nguyen, Sinh-Ngoc;Kim, Kyungbaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2651-2673
    • /
    • 2019
  • In order to detect Denial of Service (DoS) attacks, victim-side detection methods are used popularly such as static threshold-based method and machine learning-based method. However, as DoS attacking methods become more sophisticated, these methods reveal some natural disadvantages such as the late detection and the difficulty of tracing back attackers. Recently, in order to mitigate these drawbacks, source-side DoS detection methods have been researched. But, the source-side DoS detection methods have limitations if the volume of attack traffic is relatively very small and it is blended into legitimate traffic. Especially, with the subtle attack traffic, DoS detection methods may suffer from high false positive, considering legitimate traffic as attack traffic. In this paper, we propose an effective source-side DoS detection method with traffic seasonality aware adaptive threshold. The threshold of detecting DoS attack is adjusted adaptively to the fluctuated legitimate traffic in order to detect subtle attack traffic. Moreover, by understanding the seasonality of legitimate traffic, the threshold can be updated more carefully even though subtle attack happens and it helps to achieve low false positive. The extensive evaluation with the real traffic logs presents that the proposed method achieves very high detection rate over 90% with low false positive rate down to 5%.

Side-Channel Attacks on AES Based on Meet-in-the-Middle Technique (중간 일치 분석법에 기반한 AES에 대한 부채널 공격)

  • Kim, Jong-Sung;Hong, Seok-Hie;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.3-9
    • /
    • 2009
  • In this paper we introduce a new side-channel attack using block cipher cryptanalysis named meet-in-the middle attack. Using our new side-channel technique we introduce side-channel attacks on AES with reduced masked rounds. That is, we show that AES with reduced 10 masked rounds is vulnerable to side channel attacks based on an existing 4-round function. This shows that one has to mask the entire rounds of the 12-round 192-bit key AES to prevent our attacks. Our results are the first ones to analyze AES with reduced 10 masked rounds.

A Constant-Current and Constant-Voltage Control Method for Primary-Side Regulated Fly-Buck Converter (1차 측 제어 플라이벅 컨버터의 정전류 및 정전압 제어)

  • Younghoon Cho;Paul Jang
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.28 no.1
    • /
    • pp.30-38
    • /
    • 2023
  • In this paper, a constant current(CC) and constant voltage(CV) control method using a primary-side regulated(PSR) fly-buck converter is proposed. Because the primary-side structure of the fly-buck converter is the same as that of the synchronous buck converter, it always operates in continuous conduction mode(CCM). Therefore, in the proposed method, the load information on the secondary side can always be easily estimated by measuring the primary inductor current at the midpoint of the switch-on period. An accurate CC/CV control can be achieved through simple calculations based on this estimated information. Consequently, the proposed method is advantageous for optimizing the control performance of the PSR converter. The validity of the proposed control was verified using a 5 W prototype of a PSR fly-buck converter. The experimental results confirmed that the current reference of 500 mA was followed within the error range of 1.2%, and that the voltage reference of 12 V was followed within the error range of 1.8% despite the indirect control of the load current and output voltage from the primary side.

Block-Centered Symmetric Motion Estimation for Side Information Generation in Distributed Video Coding (분산 비디오 부호화에서 보조정보 생성을 위한 블록중심 대칭형의 움직임 탐색 기법)

  • Lee, Chan-Hee;Kim, Jin-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.35-42
    • /
    • 2010
  • Side information generation techniques play a great role in determining the overall performance of the DVC (Distributed Video Coding) coding system. Most conventional techniques for side information generation are mainly based on the block matching algorithm with symmetric motion estimation between the previously reconstructed key frames. But, these techniques tend to show mismatches between the motion vectors and the real placements of moving objects. So these techniques need to be modified so as to search well the real placements of moving objects. To overcome this problem, this paper proposes a block-centered symmetric motion estimation technique which uses the same coordinates with the given block. Through computer simulations, it is shown that the proposed algorithm outperforms the conventional schemes in the objective quality.