The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Jun CHOI(8hit)

1-8hit
  • Linear Attack Using Multiple Linear Approximations

    Jun CHOI  Deukjo HONG  Seokhie HONG  Sangjin LEE  

     
    PAPER-Symmetric Key Cryptography

      Vol:
    E88-A No:1
      Page(s):
    2-8

    One of Kaliski and Robshaw's algorithms, which is used for the linear attack on block ciphers with multiple linear approximations and introduced as Algorithm 2M in this paper, looks efficient but lacks any theoretical and mathematical description. It means there exists no way to estimate the data complexity required for the attack by the algorithm except experiments of the reduced variants. In this paper we propose a new algorithm using multiple linear approximation. We achieve the theoretical and mathematical analysis of its success probability. The new algorithm needs about 240.6 plaintexts to find 12 bits of secret key of 16-round DES with a success probability of about 86%.

  • Enhanced Characteristics of In0.5Ga0.5As Quantum Dot Infrared Photo Detector with Hydrogen Plasma Treatment

    Sung Ho HWANG  Jin Dong SONG  Won Jun CHOI  Jung Il LEE  

     
    PAPER

      Vol:
    E91-C No:5
      Page(s):
    699-702

    Device characteristics of In0.5Ga0.5As/GaAs quantum dot infrared detector (QDIP) have been enhanced with hydrogen plasma treatment. After the hydrogen (H) plasma treatment, the dark currents were noticeably decreased and photoluminescence (PL) intensity was increased by H-passivation of interfacial traps between quantum dots and GaAs and of non-radiative defect centers caused during QD growths. Photo response, which could not be observed in as-grown QDIP due to large dark currents which obscured the photocurrent signal, was measured successfully after H-treatment due to H-passivation.

  • Low-Complexity Watermarking Based on Entropy Coding in H.264/AVC

    Young-Ho SEO  Hyun-Jun CHOI  Chang-Yeul LEE  Dong-Wook KIM  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2130-2137

    This paper is to propose a digital watermarking to protect the ownership of a video content which is compressed by H.264/AVC main profile. This scheme intends to be performed during the CABAC (Context-based Adaptive Binary Arithmetic Coding) process which is the entropy coding of the main profile. It uses the contexts extracted during the context modeling process of CABAC to position the watermark bits by simply checking the context values and determining the coefficients. The watermarking process is also as simple as replacing the watermark bit with the LSB (Least Significant Bit) of the corresponding coefficient to be watermarked. Experimental results from applying this scheme and attacking in various ways such as blurring, sharpening, cropping, Gaussian noise addition, and geometrical modification showed that the watermark embedded by this scheme has very high imperceptibility and robustness to the attacks. Thus, we expect it to be used as a good watermarking scheme, especially in the area that the watermarking should be performed during the compression process with requiring minimal amount of process for watermarking.

  • Extended DFE Detection Scheme in MIMO-OFDM System

    Hwan-Jun CHOI  Young-Hwan YOU  Hyoung-Kyu SONG  

     
    LETTER-Digital Signal Processing

      Vol:
    E98-A No:7
      Page(s):
    1549-1552

    Recently, among MIMO-OFDM detection schemes, a lot of V-BLAST schemes have been suggested in order to achieve high data rate. Therefore signal detection of MIMO-OFDM system is important issue. In this letter, extended DFE detection scheme is proposed. According to simulation result, the extended DFE detection has similar performance with QRD-M detection but the complexity is about 24.02% of QRD-M detection. Therefore the proposed E-DFE detection can be efficiently used in MIMO-OFDM system.

  • Search-Based Concolic Execution for SW Vulnerability Discovery

    Rustamov FAYOZBEK  Minjun CHOI  Joobeom YUN  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2018/07/02
      Vol:
    E101-D No:10
      Page(s):
    2526-2529

    Huge amounts of software appear nowadays. The more the number of software increases, the more increased software vulnerabilities are. Although some automatic methods have been proposed in order to detect and remove software vulnerabilities, they still require a lot of time so they have a limitation in the real world. To solve this problem, we propose BugHunter which automatically tests a binary file compiled with a C++ compiler. It searches for unsafe API calls and automatically executes to the program block that have an unsafe API call. Also, we showed that BugHunter is more efficient than angr through experiments. As a result, BugHunter is very helpful to find a software vulnerability in a short time.

  • A Systolic Pipelined NTSC/PAL Digital Video Encoder

    Seung Ho OH  Han Jun CHOI  Moon Key LEE  

     
    PAPER-Digital Signal Processing

      Vol:
    E81-A No:6
      Page(s):
    1021-1028

    This paper describes the design of a multistandard video encoder. The proposed encoder accepts conventional NTSC/PAL video signals. The encoder consists of four major building functions which are color space converter, digital filters, color modulator, and timing generator. In order to support multistandard video signals, a programmable systolic architecture is adopted in designing various digital filters. Interpolation digital filters are also used to enhance SNR of encoded video signals. The input to the encoder can be either YCbCr signal or RGB signal. The outputs are luminance (Y), chrominance (C), and composite video baseband (Y+C) signals. The architecture of the encoder is defined by using Matlab program and is modelled by using Verilog-HDL language. The overall operation is verified by using various video signals, such as color bar patterns, ramp signals, and so on. The encoder contains 36 k gates and is implemented by using 0. 65 µm CMOS process.

  • A New Coding Technique for Digital Holographic Video Using Multi-View Prediction

    Young-Ho SEO  Hyun-Jun CHOI  Jin-Woo BAE  Hoon-Jong KANG  Seung-Hyun LEE  Ji-Sang YOO  Dong-Wook KIM  

     
    PAPER

      Vol:
    E90-D No:1
      Page(s):
    118-125

    In this paper, we proposed an efficient coding method for digital hologram (fringe pattern) acquired with a CCD camera or by computer generation using multi-view prediction and MPEG video compression standard techniques. It processes each R, G, or B color component separately. The basic processing unit is a partial image segmented as the size of MN. Each partial image retains the information of the whole object. This method generates an assembled image for a column of the segmented and frequency-transformed partial images, which is the basis of the coding process. That is, a motion estimation and compensation technique of MPEG is applied between the reconstructed images from the assembled images with the disparities found during generation of assembled image and the original partial images. Therefore the compressed results are the disparity of each partial image to form the assembled image for the corresponding column, assembled image, and the motion vectors and the compensated image for each partial image. The experimental results with the implemented algorithm showed that the proposed method has NC (Normalized Correlation) values about 4% higher than the previous method at the same compression ratios, which convinced us that ours has better compression efficiency. Consequently, the proposed method is expected to be used effectively in the application areas to transmit or store in digital format the digital hologram data.

  • Advanced QRD-M Detection with Iterative Scheme in the MIMO-OFDM System

    Hwan-Jun CHOI  Hyoung-Kyu SONG  

     
    LETTER-Information Network

      Vol:
    E97-D No:2
      Page(s):
    340-343

    In this letter, advanced QRD-M detection using iterative scheme is proposed. This scheme has a higher diversity degree than conventional QRD-M detection. According to the simulation results, the performance of proposed QRD-M detection is 0.5dB to 5.5dB better than the performance of conventional QRD-M detection and average iteration time is approximately 1 in the value of M = 1, 2, 3. Therefore, the proposed QRD-M detection has better performance than conventional QRD-M detection, particularly in a high SNR environment and low modulation order.