• Title/Summary/Keyword: embedded multimedia systems

Search Result 161, Processing Time 0.022 seconds

A Development of Mobile Vehicle Diagnostic System on .NET System and Bluetooth (블루투스와 닷넷 시스템에서의 모바일 자동차 진단기 개발)

  • Park, Dong-Gyu;Uh, Yoon;Ha, Jae-Deok
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1436-1445
    • /
    • 2008
  • Currently, mobile handset embeds many communication modules including CDMA and Bluetooth, and many applications are developed based on these modules. In this paper, we study about wireless vehicle diagnosis software and user interface based on bluetooth system on mobile handset. We developed Bluetooth communication system on protocol converter between OBD(On Board Diagnostics)-II system. Based on this system, we can communicate ECU(Engine Control Unit) and mobile device based on windows .NET compact framework platform. Therefore we can easily diagnose vehicle state and obtain engine data. All user interface and vehicle diagnosis systems on mobile handset are developed under windows .NET compact framework platform. Using this system we achieved several improvements over existing vehicle diagnostic system; 1) the software download and upgrade can be achieve on wireless environment, 2) no additional diagnostic devices are requires, which saves additional cost and we can diagnose the vehicle easily, 3) we can easily port our system on many embedded systems including PDA and navigator, etc.

  • PDF

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Implementation of IMS Core SIP Gateway based on Embedded (임베디드 기반의 IMS 코아 SIP 게이트웨이 구현)

  • Yoo, Seung-Sun;Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.209-214
    • /
    • 2014
  • IMS(IP Multi-Media Subsystem) is in the limelight as the Integrated wire and wireless Systems because of a sudden increase of smart mobile devices and growth of multimedia additional services such as IPTV. The structure of IMS is designed as a session control layer to provide various multimedia summative service using SIP based on IP communication network in order to carry out set-up, change and release by NGN of course, the existing voice services. But now It is broadly substituting in the IPTV, wire phone company and it is substituted in internet platform base on the soft-switch in currently. Especially, in currently, 4G LTE in a mobile communication company is rapidly growing in market. Therefore, in this study, we had designed and developed to the main prosser that can admit to 1000 user over and SIP gateway which can link the IMS Core that can link SIP Device which adopt the standard protocol on the SIP and to provide variable multimedia services.

Digital Image Watermarking Technique Using HVS and Adaptive Scale Factor Based on the Wavelet Transform (웨이블릿 변환 기반에서의 HVS 특성 및 적응 스케일 계수를 이용한 디지털 영상 워터마킹 기법)

  • 김희정;이응주;문광석;권기룡
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.861-869
    • /
    • 2003
  • The rapid growth of multimedia network systems has caused overflowing illegal copies of digital contents. Among digital contents, watermarking technique can be used to protect ownership about the image. Copyright protection involves the authentication of image ownership and the identification of illegal copies of image. In this paper, a new digital watermarking technique using HVS and adaptive scale factor based on the wavelet transform is proposed to use the binary image watermark. The original image is decomposed by 3-level wavelet transform. It is embedded to baseband and high frequency band. The embedding in the baseband is considered robustness, the embedding in the high frequency band is concerned about HVS and invisibility. The watermarking of a visually recognizable binary image used the HVS and random permutation to protect the copyright. From the experimental results, we confirm that the proposed technique is strong to various attacks such as joint photographic experts ground(JPEG) compression, cropping, collusion, and inversion of lines.

  • PDF

Dynamic Jop Distribution Algorithm for Reducing Deadlock & Packet Drop Rate in NoC (NoC 시스템에서 Deadlock과 패킷 drop율 감소를 위한 동적 Job Distribution 알고리듬에 관한 연구)

  • Kim, Woo-Joo;Lee, Sung-Hee;Hwang, Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7B
    • /
    • pp.528-537
    • /
    • 2008
  • This paper proposes a dynamic job distribution algorithm in a hybrid NoC structure which can improve system network performance by reducing deadlock and packet drop rate for various multimedia applications. The proposed job distribution algorithm schedules every job to the sub-cluster where packet drop rate can be minimized for each multimedia application program. The proposed Job distribution algorithm and network topology targets multimedia applications frequently used in modern embedded systems, such as MPEG4 and MP3 decoder, GPS positioning system, and OFDM demodulator. Experimental results show that packet drop rate was reduced by about 13.0%, and chip area was increased by about 2.7% compared to the APSRA algorithm. When compared to the XY algorithm popularly used for benchmarking, the packet drop rate was reduced by about 23.9%, while chip area was increased by about 3.0%.

An Integrated Power Management Framework for WiFi-based Mobile Embedded Systems (WiFi기반 모바일 임베디드 시스템을 위한 통합 전력 제어 기법)

  • Min Jung-Hi;Cha Ho-Jung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.658-665
    • /
    • 2006
  • In these days, the demand of users to extend available period of mobile systems is increased according as the functions of mobile systems have been varied and the use of multimedia application has been increased. This paper proposes an integrated power management framework that considers executed workload types for effective energy management. The conventional methods use DVFS technique for CPU and DPM technique for WNIC separately or simply combine them based on the assumption that they are orthogonal one another. However, the proposed mechanism determines the kind of workload under analysis of the characteristics of workloads incoming through a WNIC. The proposed method can reduce energy consumption of system level effectively by controlling CPU and WNIC to proper power mode based on analyzed characteristics of workload. The experimental result shows the proposed method reduces energy consumption by 9% for BE (Best Effort) workload, CBR (Constant Bit Rate) workload, and Interactive workload on average and by 16% to maximum when compared with the conventional methods which simply combine DVFS technique for CPU and DPM technique for WNIC.

Copyright Protection for Digital Image by Watermarking Technique

  • Ali, Suhad A.;Jawad, Majid Jabbar;Naser, Mohammed Abdullah
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.599-617
    • /
    • 2017
  • Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

The Design of low-cost SIMD MAC/MAS for Embedded Systems (임베디드 시스템을 위한 저비용 SIMD MAC/MAS 블록 설계)

  • Lee Yong Joo;Jung Jin Woo;Lee Yong Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10C
    • /
    • pp.1460-1468
    • /
    • 2004
  • In this paper, we developed a low-area and low-cost SIMD MAC/MAS(Single Instruction Multiple Data Multiply and ACcumulate/Multiply And Subtract) for multimedia that is used much in real life. We compared the result of this research with a previously developed more large and high performance SIMD MAC/MAS. This paper is consist of 5 parts, which are an introduction, the contents of designing SIMD MAC/MAS hardware, a special qualities for previous works, the result of synthesis and conclusion. The design result reduced by size 32% of whole hardware than 64 bit SIMD MAC/MAS block of designed for high performance. This improved ISA (Instruction Set Architecture) to be suitable to embedded DSP(Digital Signal Processor), and shortened bit range of 64-bit data to 32-bit and implement more optimally.

Embedded System Design of Automotive Media Server Platform with the MOST Interface (MOST 인터페이스를 갖는 차량용 미디어 서버 플랫폼에 대한 임베디드 시스템 설계)

  • Kwak, Jae-Min;Park, Pu-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.262-267
    • /
    • 2006
  • For growing need for the multimedia application in the vehicles, the MOST protocol has been focused on. The MOST protocol supports three kinds of communication modes; short control message, asynchronous packets, and reserved synchronous stream data. Because of a variety of transportation, the MOST is suitable for various applications in vehicle environment. In this paper, we implemented embedded system which is MOST-enabled AMS platform and tested the network communication operation through the control port and the synchronous channel of the source port. We implemented the prototype platforms which communicate each other on the MOST's POF network. Moreover we implemented the DivX decoder attached AMS platform and verified the operation by transferring the video stream and the control messages through the MOST network.

  • PDF