• Title/Summary/Keyword: binary message

Search Result 57, Processing Time 0.036 seconds

A Solution of Binary Jamming Message to Source-Wiretapping and Disadvantage of Sharing the Jamming Signal in Physical-Layer Security (물리 계층에서 보안 재밍 신호 공유의 한계점과 이진 재밍 메시지 도청의 해결책)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.63-67
    • /
    • 2014
  • A distributed zero-beamforming based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. In addition, the currently alternatives are very limited when the eavesdropper is located nearby a source for wiretapping. This letter presents a solution to this extreme case. Relay randomly generates and transmits a binary jamming message to both source and destination in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the use of exclusive-or for its information message and the decoded message. Consequently, the next transmission can avoid the eavesdropping.

High Quality perceptual Steganographic Techiques (지각적으로 고화질을 보장하는 심층암층기술)

  • 장기식;정창호;이상진;양일우
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.157-160
    • /
    • 2003
  • Recently, several steganographic algorithms for two-color binary images have been proposed. In this paper, we propose a steganographic algorithm which embeds a secret message into bitmap images and palette-based images. To embed a message, the suggested algorithm divides a bitmap image into bit-plane images from LSB-plane to MSB-plane for each pixel, and considers each bit-plane image as a binary one. The algorithm splits each bit-plane image into m$\times$n blocks. and embeds a r-bit(r=[log$_2$(mn+1]-1) message into the block. And our schemes embed a message to every bit-plane from LSB to MSB to maximize the amount of embedded message and to minimize the degradation. The schemes change at most two pixels in each block. Therefore, the maximal color changes of the new algorithm are much smaller than other bit-plane embedding schemes' such as the substantial substitution schemes.

  • PDF

RF Monitoring Service Profile for AIS using AIS Binary Message (AIS 이진 메시지를 활용한 RF 모니터링 서비스)

  • Hwang, Soyoung;Yu, Donghui
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.84-85
    • /
    • 2013
  • AIS가 선박의 충돌방지를 통한 안전 확보뿐 만 아니라 육상과 선박간의 데이터 통신에 의한 선박과 선원 정보 관리, 전자해도 업데이트 등이 가능함이 입증되면서 국제해사기구를 중심으로 논의되고 있는 e-Navigation의 중요한 데이터 통신망으로 주목 받고 있다. 정보를 주고받는 프로토콜의 표현 형식은 비트중심의 메시지 표현 형태를 따르며 목적에 따라 다양한 메시지의 종류가 정의되어 있다. 이들 메시지 중 이진 메시지의 경우에는 사용자가 원하는 서비스에 따라 이진 메시지의 형식과 내용을 정의하여 다양한 정보를 주고 받을 수 있다. 본 논문에서는 AIS의 이진 메시지를 활용한 응용 서비스 프로파일로 AIS RF 모니터링 서비스를 제안한다.

  • PDF

Efficient Data Transmission Method for UPnP Based Robot Middleware (UPnP 기반 로봇 미들웨어의 효율적 데이터 전송)

  • Kim, Kyung-San;Ahn, Sang-Chul;Kwon, Yong-Moo;Ko, Hee-Dong;Kim, Hyoung-Gon
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.1
    • /
    • pp.68-73
    • /
    • 2009
  • The UPnP is middleware architecture that supports dynamic distributed computing environment. It has many good features for possible use as middleware in robot system integration. There is a need for bulky binary data transmission between distributed robot S/W components. Since the UPnP utilizes SOAP protocol for message transmission, however, it is not efficient to send bulky binary data. In order to overcome this weak point, this paper proposes UPnP-MTOM, MTOM (Message Transmission Optimization Mechanism) implementation over UPnP, as an efficient way for bulky binary data transmission with UPnP messages. This paper presents our implementation method and experimental results of the UPnP-MTOM implementation.

  • PDF

Binary Image Data Hiding Using Advanced Run-Length Coding Method (런렝스 코딩(Run Length Coding) 기법을 이용한 이진 이미지에서의 데이터 은닉)

  • Kim, Cheon-Shik;Kim, Hyung-Joong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.8 no.2
    • /
    • pp.78-83
    • /
    • 2009
  • In this paper, a novel method for data hiding into binary images is proposed. Binary image has two tones: black and white. For this reason, it is not easy to hide messages into binary images. PWLC (pair-wise logical computation) is a new method to hide message into binary images. However, it yields images of unacceptable quality and its decoding process is unclear. Therefore, in order to solve this problem, we adopt the run-length method to achieve advanced reversible data hiding. That is, we find a proper region to hide messages to reduce visual degradation. In this paper, we introduce an improved procedure to hide messages into binary images.

  • PDF

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.482-490
    • /
    • 2015
  • This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

Implementation and Performance Evaluation of a Wireless VoIP System based on the Binary-CDMA Technology (Binary CDMA 기반의 무선 VoIP 시스템의 구현 및 성능평가)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2555-2562
    • /
    • 2011
  • Binary CDMA is a new standard technology for wireless communication developed by our country that makes high speed communications and good quality of services. In this paper we researched the development methods and implementation of a wireless VoIP System based on the Binary-CDMA technology that makes it freely installed in any place without phone cables and laying works. We designed the structure of the Binary-CDMA Wireless VoIP System and defined messages and data structures for call control. And then we designed and implemented call control message flow between VoIP terminals for user's communication.

Binary and Halftone Image Data Hiding Technique using Run-Length (RLE를 이용한 이진 이미지 및 하프톤 영상에 데이터 은폐 기술)

  • Kim, Cheon-Shik;Hong, You-Sik;Han, Chang-Pyoung;Oh, Seon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.37-43
    • /
    • 2009
  • In this paper, we proposed that a novel method base on a binary image that technique is proposed for data hiding into binary images and halftone image. A binary image is bitmap image and halftone is composed by two-tone value in a limited region in an image. For this reason, it is not easy to hide messages in binary images. PWLC is a new method to hide a message in binary images. However, it yields images of unacceptable quality, unless you should change very few of it. Therefore, in order to solve this problem, we used run-length method into binary images. That is, we find a proper region to hide messages. In this paper, we proposed new method to hide messages in binary images. In addition, we proved that our algorithm is better than PWLC through the experiment.

  • PDF

An effective detection method for hiding data in compound-document files (복합문서 파일에 은닉된 데이터 탐지 기법에 대한 연구)

  • Kim, EunKwang;Jeon, SangJun;Han, JaeHyeok;Lee, MinWook;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1485-1494
    • /
    • 2015
  • Traditionally, data hiding has been done mainly in such a way that insert the data into the large-capacity multimedia files. However, the document files of the previous versions of Microsoft Office 2003 have been used as cover files as their structure are so similar to a File System that it is easy to hide data in them. If you open a compound-document file which has a secret message hidden in it with MS Office application, it is hard for users who don't know whether a secret message is hidden in the compound-document file to detect the secret message. This paper presents an analysis of Compound-File Binary Format features exploited in order to hide data and algorithms to detect the data hidden with these exploits. Studying methods used to hide data in unused area, unallocated area, reserved area and inserted streams led us to develop an algorithm to aid in the detection and examination of hidden data.

Feature based Text Watermarking in Digital Binary Image (이진 문서 영상에서의 특징 기반 텍스트 워터마킹)

  • 공영민;추현곤;최종욱;김희율
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.359-362
    • /
    • 2002
  • In this paper, we propose a new feature-based text watermarking for the binary text image. The structure of specific characters from preprocessed text image are modified to embed watermark. Watermark message are embedded and detected by the following method; Hole line disconnect using the connectivity of the character containing a hole, Center line shift using the hole area and Differential encoding using difference of flippable score points. Experimental results show that the proposed method is robust to rotation and scaling distortion.

  • PDF