• Title/Summary/Keyword: scrambling

Search Result 146, Processing Time 0.034 seconds

Design of Content Scrambling System for DVB-IPTV Services using MPEG2 TS (MPEG2 TS 기반 DVB-IPTV 서비스를 위한 콘텐츠 스크램블링 시스템 설계)

  • Lee, Hyung;Shin, Jin-Seob;Im, Han-Jae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.105-106
    • /
    • 2017
  • 최근 고품질 방송콘텐츠 보호에 대한 요구가 증가하면서 DVB, MPEG, ATSC 등 국제표준단체에서는 보안 성능이 우수한 디지털방송 보호규격으로써 DVB-CSA ver.3에 대한 논의가 본격화되었다. 본 논문에서는 디지털방송에서 보안성능이 우수한 것으로 알려진 방송콘텐츠 암호화 규격인 DVB-CSA ver. 3 표준규격을 기반으로한 방송콘텐츠 스크램블링 시스템 설계에 대해 소개한다.

  • PDF

Design of Bit Manipulation Accelerator fo Communication DSP (통신용 DSP를 위한 비트 조작 연산 가속기의 설계)

  • Jeong Sug H.;Sunwoo Myung H.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.8 s.338
    • /
    • pp.11-16
    • /
    • 2005
  • This paper proposes a bit manipulation accelerator (BMA) having application specific instructions, which efficiently supports scrambling, convolutional encoding, puncturing, and interleaving. Conventional DSPs cannot effectively perform bit manipulation functions since かey have multiply accumulate (MAC) oriented data paths and word-based functions. However, the proposed accelerator can efficiently process bit manipulation functions using parallel shift and Exclusive-OR (XOR) operations and bit jnsertion/extraction operations on multiple data. The proposed BMA has been modeled by VHDL and synthesized using the SEC $0.18\mu m$ standard cell library and the gate count of the BMA is only about 1,700 gates. Performance comparisons show that the number of clock cycles can be reduced about $40\%\sim80\%$ for scrambling, convolutional encoding and interleaving compared with existing DSPs.

A Study on the Hangul Character Code System for KS X 1001 Information Interchange considering AMI/HDB-3 Line Encoding and HDLC Flag (AMI/HDB-3 회선부호화 및 HDLC FLAG를 고려한 KS X 1001 정보교환용 한글낱자 부호체계 개선연구)

  • Woo, Je-Teak;Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.1
    • /
    • pp.65-72
    • /
    • 2015
  • AMI / HDB-3 method used a scrambling technique is used primarily for long distance data transmission line encoding. In this paper, information communication code standard (KS X 1001; 2014 confirmation), as defined in Hangul Character Code HDLC Flag bit or character stuffing at the data link layer and physical layer with respect to the code set for Hangul AMI / HDB-3 the code set for the new system to increase the data transmission efficiency Hangul consonant and vowel tables presented in terms of scrambling. The result of the existing system and the code set ($4{\times}4$) bit source coding rules for comparing the frequency of use Hangul consonant and vowel tables and statistics showed that about 22.01% of the data processing efficiency is improved.

Improvement of Image Scrambling Scheme Using DPSS(Discrete Prolate Spheroidal Sequence) and Digital Watermarking Application (DPSS(Discrete Prolate Spheroidal Sequence)를 이용한 영상 스크램블링 방식의 개선 및 디지털 워터마킹 응용)

  • Lee, Hye-Joo;Nam, Je-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1417-1426
    • /
    • 2007
  • As one of schemes to protect multimedia content. it is the selective encryption scheme to encrypt partially multimedia content. Compared AES(advanced encryption standard) of traditional encryption, the selective encryption scheme provides low security but is applicable to applications of multimedia content not to require high secrecy. In this paper, we improve the image scrambling scheme proposed by Van De Ville which scrambles an image without bandwidth expansion using DPSS(discrete prolate spheroidal sequence) to make it more secure based on Shujun's research which verifies the secrecy of Van De Ville's scheme. The proposed method utilizes an orthonormalized random matrix instead of Hadamard matrix for secret matrix and to add it for providing high secrecy against statistical attack or known-plaintext attack using some statistical property or estimate of secret matrix from a scrambled image. The experimental results show that the proposed method is more secure than the existing scheme. In addition, we show that the proposed method can be applied to access control or copy control of watermarking application.

  • PDF

Effectiveness of golf skills to average score in PGA (PGA 선수의 경기능력이 평균타수에 미치는 영향력)

  • Kim, Sae-Hyung;Lee, Jun-Woo;Lee, Mi-Sook
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.3
    • /
    • pp.505-514
    • /
    • 2012
  • This study is for effectiveness of golf skills to average score using path analysis in Professional golf association. The variables in this study were that seven independent variable were driving accuracy, green in regulation, driving distance, sand save ratio, scrambling, putting average, and two endogenous variables were birdie average, bogey average, and dependent variable was the scoring average. To analyze these variables, path analysis was used through AMOS 18.0 program and Alpha level sets at.05. As the result, the final model had significant goodness-of-fit (GFI=.989, RMSEA=.044, TLI=.991, CFI=.998) and showed that green in regulation, driving distance, sand save ratio, scrambling, and putting average significantly affected average score directly. Especially, the scrambling was the highest affectation to average score and the sand save ratio was the lowest affectation to the average score.

MATRIX POLYTOPE AND SPEECH SECURITY SYSTEMS

  • Hwang, Suk-Geun
    • Journal of applied mathematics & informatics
    • /
    • v.2 no.2
    • /
    • pp.3-12
    • /
    • 1995
  • Evaluation of permanents of some(0,1) circulants is known to be of major importance for designers of certain speech scrambling systems. In this paper we gicve a lower bound for the number of scaram-bling patterns we deal with by minimizing the permanent function over some matrix polyhedra.

PRINCIPLES FOR A CIPHER SYSTEM BASED ON CHAOTIC AND CHAOTIC FUZZY TOOLS

  • Teodorescu, H.N.;Yamakawa, T.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.869-872
    • /
    • 1993
  • The chaotic fuzzy logic systems behave in a more complex way than crisp chaotic systems, and they can show some advantages in complex applications. Such an application is introduced in this paper, namely in scrambling and ciphering the signals.

  • PDF

Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain

  • Li, Jianzhong
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.42-54
    • /
    • 2016
  • A hybrid color and grayscale images encryption scheme based on the quaternion Hartley transform (QHT), the two-dimensional (2D) logistic map, the double random phase encoding (DRPE) in gyrator transform (GT) domain and the three-step phase-shifting interferometry (PSI) is presented. First, we propose a new color image processing tool termed as the quaternion Hartley transform, and we develop an efficient method to calculate the QHT of a quaternion matrix. In the presented encryption scheme, the original color and grayscale images are represented by quaternion algebra and processed holistically in a vector manner using QHT. To enhance the security level, a 2D logistic map-based scrambling technique is designed to permute the complex amplitude, which is formed by the components of the QHT-transformed original images. Subsequently, the scrambled data is encoded by the GT-based DRPE system. For the convenience of storage and transmission, the resulting encrypted signal is recorded as the real-valued interferograms using three-step PSI. The parameters of the scrambling method, the GT orders and the two random phase masks form the keys for decryption of the secret images. Simulation results demonstrate that the proposed scheme has high security level and certain robustness against data loss, noise disturbance and some attacks such as chosen plaintext attack.

Application of quasi-Monte Carlo methods in multi-asset option pricing (준난수 몬테칼로 방법을 이용한 다중자산 옵션 가격의 추정)

  • Mo, Eun Bi;Park, Chongsun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.4
    • /
    • pp.669-677
    • /
    • 2013
  • Quasi-Monte Carlo method is known to have lower convergence rate than the standard Monte Carlo method. Quasi-Monte Carlo methods are using low discrepancy sequences as quasi-random numbers. They include Halton sequence, Faure sequence, and Sobol sequence. In this article, we compared standard Monte Carlo method, quasi-Monte Carlo methods and three scrambling methods of Owen, Faure-Tezuka, Owen-Faure-Tezuka in valuation of multi-asset European call option through simulations. Moro inversion method is used in generating random numbers from normal distribution. It has been shown that three scrambling methods are superior in estimating option prices regardless of the number of assets, volatility, and correlations between assets. However, there are no big differences between them.

Verbal Conjunctions in Korean, English and Japanese

  • Oh, Chisung
    • Cross-Cultural Studies
    • /
    • v.32
    • /
    • pp.109-132
    • /
    • 2013
  • This paper compares sequential and non-sequential verbal conjunctions in Korean, English, and Japanese by looking at how sequential verbal conjunction is treated in each language. It frist reviews verbal conjunctions in Korean, where sequential conjunction is treated as subordination and non-sequential conjunction is treated as coordination, and looks at verbal conjunctions in English and Japanese to see whether or not sequential conjunction in those languages is subordination. According to Oh (2010), sequential and non-sequential conjunctions in Korean behave quite differently with respect to the tense and negation in the final conjunct. Also, Cho (1995, 2005) and Kwon (2004) show that syntactic operations such as extraction and scrambling clearly distinguish sequential conjunction from non-sequential conjunction. The purpose of this paper is to see how sequential and non-sequential conjunctions are analyzed in English and Japanese and to compare those languages with Korean, especially focusing on whether or not sequential conjunctions in English and Japanese are treated as subordination. For this purpose, I first investigate how tense and negation, which provided crucial evidence for concluding that Korean sequential conjunction is subordination, is interpreted in sequential and non-sequential verbal conjunctions in English and Japanese. Also, I investigate the syntactic properties of sequential and non-sequential conjunctions with respect to syntactic operations such as extraction and scrambling in those languages. The results of the investigation show that in Japanese, which is considered typologically similar to Korean, the sequential conjunction is a case of subordination, while in English, which is considered typologically different from Korean, both sequential and non-sequential conjunctions are treated as coordination.