The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] exposure(52hit)

21-40hit(52hit)

  • Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles

    Kazuki YONEYAMA  

     
    PAPER

      Vol:
    E97-A No:6
      Page(s):
    1335-1344

    ID-based authenticated key exchange (ID-AKE) is a cryptographic tool to establish a common session key between parties with authentication based on their IDs. If IDs contain some hierarchical structure such as an e-mail address, hierarchical ID-AKE (HID-AKE) is especially suitable because of scalability. However, most of existing HID-AKE schemes do not satisfy advanced security properties such as forward secrecy, and the only known strongly secure HID-AKE scheme is inefficient. In this paper, we propose a new HID-AKE scheme which achieves both strong security and efficiency. We prove that our scheme is eCK-secure (which ensures maximal-exposure-resilience including forward secrecy) without random oracles, while existing schemes is proved in the random oracle model. Moreover, the number of messages and pairing operations are independent of the hierarchy depth; that is, really scalable and practical for a large-system.

  • A High-Frame-Rate Vision System with Automatic Exposure Control

    Qingyi GU  Abdullah AL NOMAN  Tadayoshi AOYAMA  Takeshi TAKAKI  Idaku ISHII  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E97-D No:4
      Page(s):
    936-950

    In this paper, we present a high frame rate (HFR) vision system that can automatically control its exposure time by executing brightness histogram-based image processing in real time at a high frame rate. Our aim is to obtain high-quality HFR images for robust image processing of high-speed phenomena even under dynamically changing illumination, such as lamps flickering at 100 Hz, corresponding to an AC power supply at 50 / 60 Hz. Our vision system can simultaneously calculate a 256-bin brightness histogram for an 8-bit gray image of 512×512 pixels at 2000 fps by implementing a brightness histogram calculation circuit module as parallel hardware logic on an FPGA-based high-speed vision platform. Based on the HFR brightness histogram calculation, our method realizes automatic exposure (AE) control of 512×512 images at 2000 fps using our proposed AE algorithm. The proposed AE algorithm can maximize the number of pixels in the effective range of the brightness histogram, thus excluding much darker and brighter pixels, to improve the dynamic range of the captured image without over- and under-exposure. The effectiveness of our HFR system with AE control is evaluated according to experimental results for several scenes with illumination flickering at 100 Hz, which is too fast for the human eye to see.

  • A Remark on “ Efficient Revocable ID-Based Encryption with a Public Channel”

    Jae Hong SEO  Keita EMURA  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:11
      Page(s):
    2282-2285

    In 2001, Boneh and Franklin realized the first Identity-Based Encryption (IBE), and at the same time they proposed a simple way to revoke users from the system. Later, Boldyreva et al. pointed out that Boneh-Franklin's revocation method is not scalable well and they proposed the first IBE scheme with efficient revocation. Recently, Tseng and Tsai [Computer Journal, Vol.55 No.4, page 475-486, 2012] claimed that Boldyreva et al.'s scheme requires a secure channel between each user and the key generation center in the key update phase, and proposed a new revocable IBE (RIBE) with a public channel by extending the Boneh-Franklin scheme. In this paper, we revisit Tseng and Tsai's result; we first point out that secure channels (except for the initial key setup) are not mandatory in the definition of RIBE scheme formalized by Boldyreva et al. Next, we show that Boldyreva et al.'s scheme does not require any secure channels (except for the initial key setup), which is different from what Tseng and Tsai claimed and so invalidates their contribution of the first RIBE with a public channel. Moreover, we point out that there are simple techniques to remove secure channels from the Boneh-Franklin RIBE. Interestingly, we show that the secure-channel-free Boneh-Franklin RIBE scheme is secure against decryption key exposure, whereas the Tseng-Tsai RIBE scheme is vulnerable to this attack.

  • Experimental Evaluation of the SAR Induced in Head Phantoms of Three- and Eight-Year-Old Children

    Marie-Christine GOSSELIN  Sven KUHN  Andreas CHRIST  Marcel ZEFFERER  Emilio CHERUBINI  Jurriaan F. BAKKER  Gerard C. van RHOON  Niels KUSTER  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E95-B No:10
      Page(s):
    3215-3224

    The exposure of children to mobile phones has been a concern for years, but so far the conclusions with respect to compliance with safety standards are based only on simulations. Regulators have requested that these conclusions be supported by experimental evidence. The objectives of this study are 1) to test if the hypothesis that the specific anthropomorphic mannequin (SAM) used in standardized compliance testing is also conservative for homogeneous child head models and 2) to validate the numerical prediction of the peak spatial SAR (psSAR) in child head phantoms. To achieve these objectives, head phantoms of 3- and 8-year-old children were developed and manufactured. The results confirm that SAM is also conservative for child head phantoms, and that the agreement between numerical and experimental values are within the combined uncertainty of 0.9 dB, provided that the actual peak spatial SAR (psSAR) is determined. The results also demonstrate that the currently suggested numerical SAR averaging procedures may underestimate the actual psSAR by more than 1.3 dB and that the currently defined limits in terms of the average of a cubic mass are impractical for non-ambiguous evaluations, i.e., for achieving inter-laboratory repeatability.

  • How Many Pixels Does It Take to Make a Good 4″6″ Print? Pixel Count Wars Revisited

    Michael A. KRISS  

     
    INVITED PAPER

      Vol:
    E95-A No:8
      Page(s):
    1224-1229

    Digital still cameras emerged following the introduction of the Sony Mavica analog prototype camera in 1981. These early cameras produced poor image quality and did not challenge film cameras for overall quality. By 1995 digital still cameras in expensive SLR formats had 6 mega-pixels and produced high quality images (with significant image processing). In 2005 significant improvement in image quality was apparent and lower prices for digital still cameras (DSCs) started a rapid decline in film usage and film camera sells. By 2010 film usage was mostly limited to professionals and the motion picture industry. The rise of DSCs was marked by a “pixel war” where the driving feature of the cameras was the pixel count where even moderate cost, ∼ $120, DSCs would have 14 mega-pixels. The improvement of CMOS technology pushed this trend of lower prices and higher pixel counts. Only the single lens reflex cameras had large sensors and large pixels. The drive for smaller pixels hurt the quality aspects of the final image (sharpness, noise, speed, and exposure latitude). Only today are camera manufactures starting to reverse their course and producing DSCs with larger sensors and pixels. This paper will explore why larger pixels and sensors are key to the future of DSCs.

  • Towards Opening Network Knowledge for User-Centric Services in NGN

    Yoo-mi PARK  Aekyung MOON  Byung-sun LEE  Sangha KIM  

     
    PAPER-Network

      Vol:
    E94-B No:9
      Page(s):
    2501-2510

    In this paper, we propose a Network Knowledge Layer (NKL) that is a service platform overlaid onto the existing networks to provide network knowledge for user-centric services in the Next Generation Network (NGN). Most traditional networks lack capabilities for accommodating user-centric service paradigm. Taking this into consideration, the proposed NKL has capabilities to acquire contextual information from various sources, to evolve this information with legacy information into high-level knowledge, and to expose the high-level knowledge to entities outside the network. For easy knowledge exposure, we specify a set of abstracted application programming interfaces (APIs). For efficient handling of network knowledge accessed by the APIs, we design and compare the three different network knowledge models. With the proposed APIs and the three knowledge models, we accomplish the experimental performance evaluation of NKL to verify its feasibility. The results of the various tests on knowledge models and APIs give good guidelines for efficient design and exposing network knowledge in developing a user-centric service platform. Finally, we expect NKL can support the effective development and execution of user-centric services by providing rich network knowledge with the APIs.

  • A Head-Local-Exposure System for Rats Using a Figure-8 Loop Antenna in the 2 GHz Band

    Hiroki KAWAI  Kanako WAKE  Takuji ARIMA  Soichi WATANABE  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E94-B No:6
      Page(s):
    1757-1760

    This paper proposes a head-local-exposure system using a figure-8 loop antenna for 2-GHz band operation. This system allows us to observe biological effects through microcirculation of the rat brain simultaneously with exposure through a cranial window, i.e., the window made by transparent glass and implanted on the surface of the rat brain. The specific absorption rate (SAR) in a rat exposed to microwaves due to the new exposure system is estimated numerically and experimentally. The ratio of averaged SAR between the target area, which is the brain's surface just under the cranial window, and the whole body is about 59 for the 8-week rat model and 13 for the 2-week rat model. This antenna achieves local exposure for the rat brain for 2-GHz band operation.

  • Basic Construction of Whole-Body Averaged SAR Estimation System Using Cylindrical-External Field Scanning for UHF Plane Wave Irradiation of Human Models

    Yoshifumi KAWAMURA  Takashi HIKAGE  Toshio NOJIMA  

     
    PAPER-Electromagnetic Analysis

      Vol:
    E93-B No:10
      Page(s):
    2636-2643

    The purpose of this study is to establish a whole-body averaged specific absorption rate (WB-SAR) estimation method using the power absorbed by humans; a cylindrical-external field scanning technique is used to measure the radiated RF (radio-frequency) power. This technique is adopted with the goal of simplifying the estimation of the exposure dosimetry of humans who have different postures and/or sizes. In this paper, to validate the proposed measurement method, we subject numerical human phantom models and cylindrical scanning conditions to FDTD analysis. We design a radiation system that uses a dielectric lens to achieve plane-wave irradiation of tested human phantoms in order to develop an experimental WB-SAR measurement system for UHF far-field exposure condition. In addition, we use a constructed SAR measurement system to confirm absorbed power estimations of simple geometrical phantoms and so estimate measurement error of the measurement system. Finally, we discuss the measurement results of WB-SARs for male adult and child human phantom models.

  • Electric Field Distribution Excited by Indoor Radio Source for Exposure Compliance Assessment

    Junji HIGASHIYAMA  Yoshiaki TARUSAWA  

     
    PAPER-Biological Effects and Safety

      Vol:
    E93-B No:7
      Page(s):
    1834-1838

    Correction factors are presented for estimating the RF electromagnetic field strength in the compliance assessment of human exposure from an indoor RF radio source in the frequency range from 800 MHz to 3.5 GHz. The correction factors are derived from the increase in the spatial average electric field strength distribution, which is dependent on the building materials. The spatial average electric field strength is calculated using relative complex dielectric constants of building materials. The relative complex dielectric constant is obtained through measurement of the transmission and reflection losses for eleven kinds of building materials used in business office buildings and single family dwellings.

  • Experimental Quasi-Microwave Whole-Body Averaged SAR Estimation Method Using Cylindrical-External Field Scanning

    Yoshifumi KAWAMURA  Takashi HIKAGE  Toshio NOJIMA  

     
    PAPER-Biological Effects and Safety

      Vol:
    E93-B No:7
      Page(s):
    1826-1833

    The aim of this study is to develop a new whole-body averaged specific absorption rate (SAR) estimation method based on the external-cylindrical field scanning technique. This technique is adopted with the goal of simplifying the dosimetry estimation of human phantoms that have different postures or sizes. An experimental scaled model system is constructed. In order to examine the validity of the proposed method for realistic human models, we discuss the pros and cons of measurements and numerical analyses based on the finite-difference time-domain (FDTD) method. We consider the anatomical European human phantoms and plane-wave in the 2 GHz mobile phone frequency band. The measured whole-body averaged SAR results obtained by the proposed method are compared with the results of the FDTD analyses.

  • Reduction of Averaging Time for Evaluation of Human Exposure to Radiofrequency Electromagnetic Fields from Cellular Base Stations

    Byung Chan KIM  Seong-Ook PARK  

     
    LETTER

      Vol:
    E93-B No:7
      Page(s):
    1862-1864

    In order to determine exposure compliance with the electromagnetic fields from a base station's antenna in the far-field region, we should calculate the spatially averaged field value in a defined space. This value is calculated based on the measured value obtained at several points within the restricted space. According to the ICNIRP guidelines, at each point in the space, the reference levels are averaged over any 6 min (from 100 kHz to 10 GHz) for the general public. Therefore, the more points we use, the longer the measurement time becomes. For practical application, it is very advantageous to spend less time for measurement. In this paper, we analyzed the difference of average values between 6 min and lesser periods and compared it with the standard uncertainty for measurement drift. Based on the standard deviation from the 6 min averaging value, the proposed minimum averaging time is 1 min.

  • Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties

    Taek-Young YOUN  Young-Ho PARK  Jongin LIM  

     
    LETTER-Application Information Security

      Vol:
    E92-D No:12
      Page(s):
    2520-2523

    Trapdoor commitment schemes are widely used for adding valuable properties to ordinary signatures or enhancing the security of weakly secure signatures. In this letter, we propose a trapdoor commitment scheme based on RSA function, and prove its security under the hardness of the integer factoring. Our scheme is very efficient in computing a commitment. Especially, it requires only three multiplications for evaluating a commitment when e=3 is used as a public exponent of RSA function. Moreover, our scheme has two useful properties, key exposure freeness and strong trapdoor opening, which are useful for designing secure chameleon signature schemes and converting a weakly secure signature to a strongly secure signature, respectively.

  • Object-Based Auto Exposure and Focus Algorithms Based on the Human Visual System

    Kwanghyun LEE  Suyoung PARK  Sanghoon LEE  

     
    LETTER

      Vol:
    E92-A No:3
      Page(s):
    832-835

    For the acquisition of visual information, the nonuniform sampling process by photoreceptors on the retina occurs at the earliest stage of visual processing. From objects of interest, the human eye receives high visual resolution through nonuniform distribution of photoreceptors. Therefore, this paper proposes auto exposure and focus algorithms for the real-time video camera system based on the visual characteristic of the human eye. For given moving objects, the visual weight is modeled for quantifying the visual importance and the associated auto exposure and focus parameters are derived by applying the weight to the traditional numerical expression, i.e., the DoM (Difference of Median) and Tenengrad methods for auto focus.

  • Effect of Heterogeneity of Tissues on RF Energy Absorption in the Brain for Exposure Assessment in Epidemiological Studies on Mobile Phone Use and Brain Tumors Open Access

    Nadege VARSIER  Kanako WAKE  Masao TAKI  Soichi WATANABE  

     
    LETTER-Electromagnetic Compatibility(EMC)

      Vol:
    E91-B No:11
      Page(s):
    3792-3795

    We compared SAR distributions in major anatomical structures of the brain of a homogeneous and a heterogeneous model using FDTD calculations. Our results proved a good correlation between SAR values in lobes of the brain where tumors may arise more frequently. However SAR values at some specific locations were shown to be under or overestimated.

  • Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service

    Kazuto OGAWA  Goichiro HANAOKA  Hideki IMAI  

     
    PAPER

      Vol:
    E90-A No:5
      Page(s):
    1000-1011

    Copyright protection is a major issue in distributing content on Internet or broadcasting service. One well-known method of protecting copyright is a traitor tracing scheme. With this scheme, if a pirate decoder is made, the content provider can check the secret key contained in it and trace the authorized user/subscriber (traitor). Furthermore, users require that they could obtain services anywhere they want (Anywhere TV). For this purpose, they would need to take along their secret keys and therefore key exposure has to be kept in mind. As one of countermeasures against key exposure, a forward secure public key cryptosystem has been developed. In this system, the user secret key remains valid for a limited period of time. It means that even if it is exposed, the user would be affected only for the limited time period. In this paper, we propose a traitor tracing scheme secure against adaptive key exposure (TTaKE) which contains the properties of both a traitor tracing scheme and a forward secure public key cryptosystem. It is constructed by using two polynomials with two variables to generate user secret keys. Its security proof is constructed from scratch. Moreover we confirmed its efficiency through comparisons. Finally, we show the way how its building blocks can be applied to anywhere TV service. Its structure fits current broadcasting systems.

  • Partial Key Exposure Attacks on Unbalanced RSA with the CRT

    Hee Jung LEE  Young-Ho PARK  Taekyoung KWON  

     
    LETTER-Information Security

      Vol:
    E89-A No:2
      Page(s):
    626-629

    In RSA public-key cryptosystem, a small private key is often preferred for efficiency but such a small key could degrade security. Thus the Chinese Remainder Theorem (CRT) is tactically used, especially in time-critical applications like smart cards. As for using the CRT in RSA, care must be taken to resist partial key exposure attacks. While it is common to choose two distinct primes with similar size in RSA, May has shown that a composite modulus N can be factored in the balanced RSA with the CRT of half of the least (or most) significant bits of a private key is revealed with a small public key. However, in the case that efficiency is more critical than security, such as smart cards, unbalanced primes might be chosen. Thus, we are interested in partial key exposure attacks to the unbalanced RSA with the CRT. In this paper, we obtain the similar results as the balanced RSA. We show that in the unbalanced RSA if the N1/4 least (or most) significant bits are revealed, a private key can be recovered in polynomial time under a small public key.

  • Electromagnetic and Thermal Dosimetry of a Cylindrical Waveguide-Type in vitro Exposure Apparatus

    Tomohide SONODA  Rui TOKUNAGA  Koichi SETO  Yukihisa SUZUKI  Kanako WAKE  Soichi WATANABE  Masao TAKI  

     
    PAPER-Biological Effects

      Vol:
    E88-B No:8
      Page(s):
    3287-3293

    In this paper, dosimetry of an in vitro exposure apparatus based on a cylindrical waveguide is performed. The SAR distributions are first obtained numerically by using FDTD method. The thermal fields in the medium are then estimated by numerical calculations of the equation of heat conduction. The maximum temperature rise for 17.9 W/kg average SAR during 3000 s exposure is about 2 on the bottom of the medium where cells are located. The thermal distribution is relatively uniform near the center of the dish and the temperature in this region is around 38.7. The results of the numerical calculation are experimentally supported. The results provide the electromagnetic and thermal characteristics of the exposure apparatus, which will define the exposure conditions of the planned experiments using this apparatus.

  • Information-Theoretically Secure Key Insulated Encryption: Models, Bounds and Constructions

    Yumiko HANAOKA  Goichiro HANAOKA  Junji SHIKATA  Hideki IMAI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E87-A No:10
      Page(s):
    2521-2532

    Computer systems are constantly under attack and illegal access is a constant threat which makes security even more critical. A system can be broken into and secret information, e.g. decryption key, may be exposed, resulting in a total break of the system. Recently, a new framework for the protection against such key exposure problem was suggested and was called, Key-Insulated Encryption (KIE). In our paper, we introduce a novel approach to key insulated cryptosystems that offers provable security without computational assumptions. For the model of Information-Theoretically Secure Key-Insulated Encryption (ISKIE), we show lower bounds on required memory sizes of user, trusted device and sender. Our bounds are all tight as our concrete construction of ISKIE achieves all the bounds. We also extend this concept further by adding an extra property so that any pair of users in the system is able to communicate with each other and still have the same security benefits as the existing KIE based on intractability assumptions. We called this, Dynamic and Mutual Key-Insulated Encryption (DMKIE), and concrete implementations of DMKIE will be shown as well. In the end, we discuss the relationship of DMKIE against Key Predistribution Schemes (KPS) and Broadcast Encryption Schemes (BES), that is, we show that DMKIE can be constructed from either KPS or BES.

  • Realizing Highly Localized Exposure in Small Animals with Absorbing Material Covered Holder to Test Biological Effects of 1.5GHz Cellular Telephones

    Jianqing WANG  Osamu FUJIWARA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E86-B No:5
      Page(s):
    1660-1665

    In testing the possible biological effects of electromagnetic exposure from cellular telephones in small animals such as mice, it is essential to realize a highly localized head exposure as close as possible to that due to cellular telephones in humans. In this study, a 1.5GHz exposure setup was developed which has a highly localized specific absorption rate (SAR) of 2W/kg in the mouse brain and a low whole-body averaged SAR of 0.27W/kg. The low whole-body averaged SAR was realized by using a flexible magnetic sheet attachment on the mouse holder. Its validity has been carefully examined by both numerical simulation with an anatomically based mouse model and experimental simulation with a solid mouse phantom. Good agreement was obtained between the numerical and experimental results, which confirmed the effectiveness of the magnetic sheet attachment to the mouse holder.

  • A Novel Setup for Small Animal Exposure to Near Fields to Test Biological Effects of Cellular Telephones

    Jianqing WANG  Osamu FUJIWARA  

     
    PAPER-Electromagnetic Compatibility(EMC)

      Vol:
    E84-B No:11
      Page(s):
    3050-3059

    A novel in vivo exposure setup has been developed for testing the possible promoting effects of 1.5 GHz digital cellular phones on mouse skin carcinogenesis. The exposure setup has two main features: one is the employment of an electrically short monopole antenna with capacitive-loading, which supplies the ability to realize a highly localized peak SAR above 2 W/kg without any thermal stress for a mouse; the other is the use of a transparent absorber to allow real-time observation of both the exposure process as well as mouse activities during the exposure. Dosimetric analyses for the exposure setup have been carried out both numerically and experimentally. Good agreement was confirmed between the numerical and experimental results, thereby demonstrating the validity of the novel exposure setup.

21-40hit(52hit)