1-8hit |
Young-Ho SEO Hyun-Jun CHOI Chang-Yeul LEE Dong-Wook KIM
This paper is to propose a digital watermarking to protect the ownership of a video content which is compressed by H.264/AVC main profile. This scheme intends to be performed during the CABAC (Context-based Adaptive Binary Arithmetic Coding) process which is the entropy coding of the main profile. It uses the contexts extracted during the context modeling process of CABAC to position the watermark bits by simply checking the context values and determining the coefficients. The watermarking process is also as simple as replacing the watermark bit with the LSB (Least Significant Bit) of the corresponding coefficient to be watermarked. Experimental results from applying this scheme and attacking in various ways such as blurring, sharpening, cropping, Gaussian noise addition, and geometrical modification showed that the watermark embedded by this scheme has very high imperceptibility and robustness to the attacks. Thus, we expect it to be used as a good watermarking scheme, especially in the area that the watermarking should be performed during the compression process with requiring minimal amount of process for watermarking.
Hwan-Jun CHOI Young-Hwan YOU Hyoung-Kyu SONG
Recently, among MIMO-OFDM detection schemes, a lot of V-BLAST schemes have been suggested in order to achieve high data rate. Therefore signal detection of MIMO-OFDM system is important issue. In this letter, extended DFE detection scheme is proposed. According to simulation result, the extended DFE detection has similar performance with QRD-M detection but the complexity is about 24.02% of QRD-M detection. Therefore the proposed E-DFE detection can be efficiently used in MIMO-OFDM system.
Rustamov FAYOZBEK Minjun CHOI Joobeom YUN
Huge amounts of software appear nowadays. The more the number of software increases, the more increased software vulnerabilities are. Although some automatic methods have been proposed in order to detect and remove software vulnerabilities, they still require a lot of time so they have a limitation in the real world. To solve this problem, we propose BugHunter which automatically tests a binary file compiled with a C++ compiler. It searches for unsafe API calls and automatically executes to the program block that have an unsafe API call. Also, we showed that BugHunter is more efficient than angr through experiments. As a result, BugHunter is very helpful to find a software vulnerability in a short time.
Seung Ho OH Han Jun CHOI Moon Key LEE
This paper describes the design of a multistandard video encoder. The proposed encoder accepts conventional NTSC/PAL video signals. The encoder consists of four major building functions which are color space converter, digital filters, color modulator, and timing generator. In order to support multistandard video signals, a programmable systolic architecture is adopted in designing various digital filters. Interpolation digital filters are also used to enhance SNR of encoded video signals. The input to the encoder can be either YCbCr signal or RGB signal. The outputs are luminance (Y), chrominance (C), and composite video baseband (Y+C) signals. The architecture of the encoder is defined by using Matlab program and is modelled by using Verilog-HDL language. The overall operation is verified by using various video signals, such as color bar patterns, ramp signals, and so on. The encoder contains 36 k gates and is implemented by using 0. 65 µm CMOS process.
Young-Ho SEO Hyun-Jun CHOI Jin-Woo BAE Hoon-Jong KANG Seung-Hyun LEE Ji-Sang YOO Dong-Wook KIM
In this paper, we proposed an efficient coding method for digital hologram (fringe pattern) acquired with a CCD camera or by computer generation using multi-view prediction and MPEG video compression standard techniques. It processes each R, G, or B color component separately. The basic processing unit is a partial image segmented as the size of MN. Each partial image retains the information of the whole object. This method generates an assembled image for a column of the segmented and frequency-transformed partial images, which is the basis of the coding process. That is, a motion estimation and compensation technique of MPEG is applied between the reconstructed images from the assembled images with the disparities found during generation of assembled image and the original partial images. Therefore the compressed results are the disparity of each partial image to form the assembled image for the corresponding column, assembled image, and the motion vectors and the compensated image for each partial image. The experimental results with the implemented algorithm showed that the proposed method has NC (Normalized Correlation) values about 4% higher than the previous method at the same compression ratios, which convinced us that ours has better compression efficiency. Consequently, the proposed method is expected to be used effectively in the application areas to transmit or store in digital format the digital hologram data.
In this letter, advanced QRD-M detection using iterative scheme is proposed. This scheme has a higher diversity degree than conventional QRD-M detection. According to the simulation results, the performance of proposed QRD-M detection is 0.5dB to 5.5dB better than the performance of conventional QRD-M detection and average iteration time is approximately 1 in the value of M = 1, 2, 3. Therefore, the proposed QRD-M detection has better performance than conventional QRD-M detection, particularly in a high SNR environment and low modulation order.
Jun CHOI Deukjo HONG Seokhie HONG Sangjin LEE
One of Kaliski and Robshaw's algorithms, which is used for the linear attack on block ciphers with multiple linear approximations and introduced as Algorithm 2M in this paper, looks efficient but lacks any theoretical and mathematical description. It means there exists no way to estimate the data complexity required for the attack by the algorithm except experiments of the reduced variants. In this paper we propose a new algorithm using multiple linear approximation. We achieve the theoretical and mathematical analysis of its success probability. The new algorithm needs about 240.6 plaintexts to find 12 bits of secret key of 16-round DES with a success probability of about 86%.
Sung Ho HWANG Jin Dong SONG Won Jun CHOI Jung Il LEE
Device characteristics of In0.5Ga0.5As/GaAs quantum dot infrared detector (QDIP) have been enhanced with hydrogen plasma treatment. After the hydrogen (H) plasma treatment, the dark currents were noticeably decreased and photoluminescence (PL) intensity was increased by H-passivation of interfacial traps between quantum dots and GaAs and of non-radiative defect centers caused during QD growths. Photo response, which could not be observed in as-grown QDIP due to large dark currents which obscured the photocurrent signal, was measured successfully after H-treatment due to H-passivation.