• Title/Summary/Keyword: frequency permutation

Search Result 14, Processing Time 0.01 seconds

Post-Processing of IVA-Based 2-Channel Blind Source Separation for Solving the Frequency Bin Permutation Problem (IVA 기반의 2채널 암묵적신호분리에서 주파수빈 뒤섞임 문제 해결을 위한 후처리 과정)

  • Chu, Zhihao;Bae, Keunsung
    • Phonetics and Speech Sciences
    • /
    • v.5 no.4
    • /
    • pp.211-216
    • /
    • 2013
  • The IVA(Independent Vector Analysis) is a well-known FD-ICA method used to solve the frequency permutation problem. It generally works quite well for blind source separation problems, but still needs some improvements in the frequency bin permutation problem. This paper proposes a post-processing method which can improve the source separation performance with the IVA by fixing the remaining frequency permutation problem. The proposed method makes use of the correlation coefficient of power ratio between frequency bins for separated signals with the IVA-based 2-channel source separation. Experimental results verified that the proposed method could fix the remaining frequency permutation problem in the IVA and improve the speech quality of the separated signals.

Frequency Bin Alignment Using Covariance of Power Ratio of Separated Signals in Multi-channel FD-ICA (다채널 주파수영역 독립성분분석에서 분리된 신호 전력비의 공분산을 이용한 주파수 빈 정렬)

  • Quan, Xingri;Bae, Keunsung
    • Phonetics and Speech Sciences
    • /
    • v.6 no.3
    • /
    • pp.149-153
    • /
    • 2014
  • In frequency domain ICA, the frequency bin permutation problem falls off the quality of separated signals. In this paper, we propose a new algorithm to solve the frequency bin permutation problem using the covariance of power ratio of separated signals in multi-channel FD-ICA. It makes use of the continuity of the spectrum of speech signals to check if frequency bin permutation occurs in the separated signal using the power ratio of adjacent frequency bins. Experimental results have shown that the proposed method could fix the frequency bin permutation problem in the multi-channel FD-ICA.

Methods of generating Hopping Patterns Based on Permutation Frequency Hopping SSMA System (치환방법을 이용한 주파수 도약 확산 시스템의 주파수 도약 패턴 발생 방법)

  • Choon Sik YIM;Ryuji KOHNO;Hideki IMAI
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.12
    • /
    • pp.1357-1365
    • /
    • 1991
  • This paper proposes the generation of several classes of frequency hopping patterns. which are derived by permutation, for an asynchronous frequency hopping spread spectrum multiple accecss system (FH/SSMA). The first class of hopping patterns is obtained by using a Latin square. The second class of hopping patterns is derived by generalizing the first class which is designed by using a permutation technique. The third class of hopping patterns is designed by using a rotational base of elements. We evaluate the hit property of the proposed classes of hopping patterns when these patterns are nutually shifted in an FH/SSMA system. Compared to the Reed Slolmon sequences generated by the conventional method, the sequence obtained by the permutation technique can reduce the number of hits among hopping frequencies in asynchronous time/frequency shift.

  • PDF

Acoustic Echo Cancellation using Time-Frequency Masking and Higher-order Statistics (시간-주파수 마스킹과 고차 신호 통계를 이용한 음향 반향신호 제거)

  • Kim, Kyoung-Jae;Nam, Sang-Won
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.3
    • /
    • pp.629-631
    • /
    • 2007
  • In hands-free full-duplex communication systems, acoustic signals picked up by the microphones can be mixed with echo signals as well as noises, which may result in poor performance of the corresponding communication system. Also, the system performance may decrease further if the reverberation occurs since it is harder to estimate the impulse response of the demixing system. For blind source separation (BSS) in such cases, a time-frequency masking approach can be employed to separate undesired echo signals and noises, but, permutation ambiguities also should be solved for the echo cancellation. In this paper, we propose a new acoustic echo cancellation (AEC) approach utilizing the time-frequency masking and higher-order statistics, whereby a desired signal selection, based on coherence and third-order statistics (i.e., kurtosis), is introduced along with output signal normalization. Simulation results demonstrate that the proposed approach yields better echo and noise cancellation performances than the conventional AEC approaches.

Acoustic Echo Cancellation using the DUET Algorithm and Scaling Factor Estimation (잡음 상황에서 DUET 블라인드 신호 분리 알고리즘과 스케일 계수 추정을 이용한 음향 반향신호 제거)

  • Kim, K.J.;Seo, J.B.;Nam, S.W.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.416-418
    • /
    • 2006
  • In this paper, a new acoustic echo cancellation approach based on the DUET algorithm and scaling factor estimation is proposed to solve the scaling ambiguity in case of blind separation based acoustic echo cancellation in a noisy environment. In hands-free full-duplex communication system. acoustic noises picked up by the microphone are mixed with echo signal. For this reason, the echo cancellation system may provide poor performance. For that purpose, a degenerate unmixing estimation technique, adjusted in the time-frequency domain, is employed to separate undesired echo signals and noises. Also, since scaling and permutation ambiguities have not been solved in the blind source separation algorithm, kurtosis for the desired signal selection and a scaling factor estimation algorithm are utilized in this rarer for the separation of an echo signal. Simulation results demonstrate that the proposed approach yields better echo cancellation and noise reduction performances, compared with conventional methods.

  • PDF

A Searching Algorithm for Minimum Bandpass Sampling Frequency in Simultaneous Down-Conversion of Multiple RF Signals

  • Bae, Jung-Hwa;Park, Jin-Woo
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.55-62
    • /
    • 2008
  • Bandpass sampling (BPS) techniques for the direct down-conversion of RF bandpass signals have become an essential technique for software defined radio (SDR), due to their advantage of minimizing the radio frequency (RF) front-end hardware dependency. This paper proposes an algorithm for finding the minimum BPS frequency for simultaneously down-converting multiple RF signals through full permutation over all the valid sampling ranges found for the multiple RF signals. We also present a scheme for reducing the computational complexity resulting from the large scale of the purmutation calculation involved in searching for the minimum BPS frequency. In addition, we investigate the BPS frequency allowing for the guard-band between adajacent down-converted signals, which help lessen the severe requirements in practical implementations. The performance of the proposed method is compared with those of other pre-reported methods to prove its effectiveness.

Improved Meet-in-the-Middle Attacks on Crypton and mCrypton

  • Cui, Jingyi;Guo, Jiansheng;Huang, Yanyan;Liu, Yipeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2660-2679
    • /
    • 2017
  • Crypton is a SP-network block cipher that attracts much attention because of its excellent performance on hardware. Based on Crypton, mCrypton is designed as a lightweight block cipher suitable for Internet of Things (IoT) and Radio Frequency Identification (RFID). The security of Crypton and mCrypton under meet-in-the-middle attack is analyzed in this paper. By analyzing the differential properties of cell permutation, several differential characteristics are introduced to construct generalized ${\delta}-sets$. With the usage of a generalized ${\delta}-set$ and differential enumeration technique, a 6-round meet-in-the-middle distinguisher is proposed to give the first meet-in-the-middle attack on 9-round Crypton-192 and some improvements on the cryptanalysis of 10-round Crypton-256 are given. Combined with the properties of nibble permutation and substitution, an improved meet-in-the-middle attack on 8-round mCrypton is proposed and the first complete attack on 9-round mCrypton-96 is proposed.

A Hardware Implementation of Ultra-Lightweight Block Cipher PRESENT-80/128 (초경량 블록암호 PRESENT-80/128의 하드웨어 구현)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.430-432
    • /
    • 2015
  • This paper describes a hardware implementation of ultra-lightweight block cipher algorithm PRESENT-80/128 that supports for two master key lengths of 80-bit and 128-bit. The PRESENT algorithm that is based on SPN (substitution and permutation network) consists of 31 round transformations. A round processing block of 64-bit data-path is used to process 31 rounds iteratively, and circuits for encryption and decryption are designed to share hardware resources. The PRESENT-80/128 crypto-processor designed in Verilog-HDL was verified using Virtex5 XC5VSX-95T FPGA and test system. The estimated throughput is about 550 Mbps with 275 MHz clock frequency.

  • PDF

Digital Image Watermarking Technique Using HVS and Adaptive Scale Factor Based on the Wavelet Transform (웨이블릿 변환 기반에서의 HVS 특성 및 적응 스케일 계수를 이용한 디지털 영상 워터마킹 기법)

  • 김희정;이응주;문광석;권기룡
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.861-869
    • /
    • 2003
  • The rapid growth of multimedia network systems has caused overflowing illegal copies of digital contents. Among digital contents, watermarking technique can be used to protect ownership about the image. Copyright protection involves the authentication of image ownership and the identification of illegal copies of image. In this paper, a new digital watermarking technique using HVS and adaptive scale factor based on the wavelet transform is proposed to use the binary image watermark. The original image is decomposed by 3-level wavelet transform. It is embedded to baseband and high frequency band. The embedding in the baseband is considered robustness, the embedding in the high frequency band is concerned about HVS and invisibility. The watermarking of a visually recognizable binary image used the HVS and random permutation to protect the copyright. From the experimental results, we confirm that the proposed technique is strong to various attacks such as joint photographic experts ground(JPEG) compression, cropping, collusion, and inversion of lines.

  • PDF

Overlapped Subband-Based Independent Vector Analysis

  • Jang, Gil-Jin;Lee, Te-Won
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.1E
    • /
    • pp.30-34
    • /
    • 2008
  • An improvement to the existing blind signal separation (BSS) method has been made in this paper. The proposed method models the inherent signal dependency observed in acoustic object to separate the real-world convolutive sound mixtures. The frequency domain approach requires solving the well known permutation problem, and the problem had been successfully solved by a vector representation of the sources whose multidimensional joint densities have a certain amount of dependency expressed by non-spherical distributions. Especially for speech signals, we observe strong dependencies across neighboring frequency bins and the decrease of those dependencies as the bins become far apart. The non-spherical joint density model proposed in this paper reflects this property of real-world speech signals. Experimental results show the improved performances over the spherical joint density representations.