Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 27, Issue 12C - Dec 2002
Volume 27, Issue 11C - Nov 2002
Volume 27, Issue 10C - Oct 2002
Volume 27, Issue 10A - Oct 2002
Volume 27, Issue 9C - Sep 2002
Volume 27, Issue 8C - Aug 2002
Volume 27, Issue 8B - Aug 2002
Volume 27, Issue 8A - Aug 2002
Volume 27, Issue 7C - Jul 2002
Volume 27, Issue 7B - Jul 2002
Volume 27, Issue 7A - Jul 2002
Volume 27, Issue 6C - Jun 2002
Volume 27, Issue 6B - Jun 2002
Volume 27, Issue 6A - Jun 2002
Volume 27, Issue 5C - May 2002
Volume 27, Issue 4C - Apr 2002
Volume 27, Issue 4B - Apr 2002
Volume 27, Issue 4A - Apr 2002
Volume 27, Issue 3C - Mar 2002
Volume 27, Issue 3B - Mar 2002
Volume 27, Issue 3A - Mar 2002
Volume 27, Issue 2B - Feb 2002
Volume 27, Issue 2A - Feb 2002
Volume 27, Issue 2C - Jan 2002
Volume 27, Issue 1C - Jan 2002
Volume 27, Issue 1B - Jan 2002
Volume 27, Issue 1A - Jan 2002
Volume 27, Issue 9 - 00 2002
Volume 27, Issue 8 - 00 2002
Volume 27, Issue 3 - 00 2002
Volume 27, Issue 12 - 00 2002
Volume 27, Issue 11 - 00 2002
Volume 27, Issue 10 - 00 2002
Selecting the target year
A study on the constitution of S box and G function in SEED-type cipher
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 291~300
In this paper, a way of constituting optimized S box and G function was suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over GF(2
8/) which has neither a fixed point, whose input and output are the same except 0 and 1, nor an opposite flexed number, whose output is one's complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes diffusive linear transform with 4 S-box outputs using the matrix of 4
4 over GF(2
8/). G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, there can be no weak input, where a fried point, an opposite fried point, and output can be two's complement of input, and the construction of hardware can be made easy. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.
A study on the m-Parallel Nonlinear Combine functions for the Parallel Stream Cipher
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 301~309
In this paper, we propose the effective implementation of various nonlinear combiners using by PS-LFSR: m-parallel memoryless-nonlinear combiner, m-parallel memory-nonlinear combiner, m-parallel nonlinear filter function, and m-parallel clock-controlled function. Finally, we propose m-parallel LILI-128 stream cipher as an example of the parallel implementation, and we determine its cryptographic security and performance.
Speech Quality Measure for VoIP Using Wavelet Based Bark Coherence Function
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 310~315
The Bark Coherence Function (BCF) defies a coherence function within perceptual domain as a new cognition module, robust to linear distortions due to the analog interface of digital mobile system. Our previous experiments have shown the superiority of BCF over current measures. In this paper, a new BCF suitable for VoIP is developed. The unproved BCF is based on the wavelet series expansion that provides good frequency resolution while keeping good time locality. The proposed Wavelet based Bark Coherence function (WBCF) is robust to variable delay often observed in packet-based telephony such as Voice over Internet Protocol (VoIP). We also show that the refinement of time synchronization after signal decomposition can improve the performance of the WBCF. The regression analysis was performed with VoIP speech data. The correlation coefficients and the standard error of estimates computed using the WBCF showed noticeable improvement over the Perceptual Speech Quality Measure (PSQM) that is recommended by ITU-T.
A Counter-Countermeasure using Signal Distribution Characteristics between Two Bands in a Crossed Array Tracker
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 316~323
In this paper, we propose a counter-countermeasure (CCM) in a crossed array tracker for efficient target tracking under countermeasures (CM) operated by a target. The proposed CCM adepts two detection bands and uses the signal distribution characteristics to discriminate between the target and the CMs. To avoid wrong detection of a target position due to missing signal pulses, it predicts current target position based on previous target position. To evaluate the performance of the proposed CCM in a crossed array tracker, we perform numerical simulations for target signal extraction and target tracking under various conditions. The simulation results show that the proposed CCM removes the CM effect well and tracks the target efficiently.
A High-speed/Low-power CSD Linear Phase FIR Filter Structure Using Vertical Common Sub-expression
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 324~329
In the high-speed/low-power digital filter applications like wireless communication systems, canonical signed digit(CSD) linear phase finite impulse response(FIR) filter structures are widely investigated. In this paper, we propose a high-speed/low-power CSD linear phase FIR filter structure using vertical common sub-expression. In the conventional linear phase CSD filter, horizontal common sub-expressions are utilized due to the inherent horizontal common sub-expression of symmetrical filter coefficients. We use the fact that their MSBs are also equal since adjacent filter coefficients have similar values in the linear phase filter Through the examples, it is shown that our proposed structure is more efficient in case that precision of implementation is lower, and tap length are longer.
A Study on Interference Cancelling Receiver with Adaptive Blind CMA Array
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 330~335
In the direct sequence code division multiple access system, the problem of multiple access interference due to multiple access is generated. A interference cancelling receiver is used to solve this problem. The conventional interference cancelling receiver is structure of successive interference canceller using antenna array. In this structure, the difference of between method I and method II depends on updating weight vector. In this paper, the adaptive blind CMA array interference cancelling receiver using cost function of constant modulus algorithms is proposed to update weight vector at conventional structure. The simulation compared the proposed interference cancelling receiver with two conventional interference cancelling receivers by signal to interference ratio and bit error rate curve under additive white Gaussian noise environment. The simulation results show that the proposed receiver has about the gain of SIR of 1.5[dB] more than method I which is conventional receiver at SIR curve, and about the gain of SIR of 0.5(dB) more than method II. In BER curve, the proposed IC receiver about the gain of SNR of 2[dB] more than method I and about the gain of SNR of 0.5[dB] more than method If, Thus, the proposed interference cancelling receiver has the higher performance than conventional interference cancelling receivers.
A Study on Wavelet Based Watermarking using Human visual system property
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 336~344
Recently, aegis of authentication and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image. It is achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility, and significant for invisible and robust watermark. Watermark is inserted by utilizing Human Visual System (HVS) feature in the wavelet transformed frequency domain. Especially, watermark inserted into the high frequency concentrated textual area makes itself invisible.
Fingerprint Image Enhancement Based on a Directional Filter
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 345~355
This paper describes a new method of directional filter-based analysis for fingerprint enhancement. Fingerprint cages can be represented by direction field of regular structure of ridge patterns. The dominant directional component of ridge plays a very important role in pre-processing steps of fingerprint image analysis such as ridge's linking and noise removal for minutiae extraction. A directional filter bank analyzes input image into directional subband images and synthesizes them to the perfectly reconstructed image. In this paper, a new fingerprint enhancement algorithm based on a directional filter bank is proposed. The algorithm decomposes the fingerprint image into subband images in the analysis stage, accomplishes an enhance procedure by processing subband images in the enhance stage and synthesizes them to the enhanced image in the synthesis stage.
Variable Dynamic Threshold Method for Video Cut Detection
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 356~363
Video scene segmentation is fundamental role for content based video analysis and many kinds of scene segmentation schemes have been proposed in previous researches. However, there is a problem, which is to find optimal threshold value according to various kinds of movies and its content because only fixed single threshold value usually used for cut detection. In this paper, we proposed the variable dynamic threshold method, which change the threshold value by a probability distribution of cut detection interval and information of frame feature differences and cut detection interval in previous cut detection is used to determine the next cut detection. For this, we present a cut detection algorithm and a parameter generation method to change the threshold value in runtime. We also show the proposed method, which can minimize fault alarm rate than the existing methods efficiently by experimental results.
A VLSI Array Processor Architecture for High-Speed Processing of Full Search Block Matching Algorithm
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 364~370
In this paper, we propose a VLSI array architecture for high speed processing of FBMA. First of all, the sequential FBMA is transformed into a single assignment code by using the index space expansion, and then the dependance graph is obtained from it. The two dimensional VLSI array is derived by projecting the dependance graph along the optimal direction. Since the candidate blocks in the search range are overlapped with columns as well as rows, the processing elements of the VLSI array are designed to reuse the overlapped data. As the results, the number of data inputs is reduced so that the processing performance is improved. The proposed VLSI array has (N
(2p+1) processing elements and (N+2p) input ports where N is the block size and p is the maximum search range. The computation time of the rat reference block is (N
+2(p+1)N+6p), and the block pipeline period is (3N+4p-1).
Depth Extraction of Convergent-Looking Stereo Images Based on the Human Visual System
The Journal of Korean Institute of Communications and Information Sciences, volume 27, issue 4A, 2002, Pages 371~382
A camera model with optical axes parallel has been widely used for stereo vision applications. A pair of input ages are obtained from a convergent-looking stereo camera model based on the human visual system in this per, and each image is divided into quadrant regions with respect to the fixation point. The reasoning of quadrant partitions is based on the human visual system and is proven by a geometrical method. Image patches : constructed from the right and left stereo images. A modified cepstrum filter is applied to the patches and disparity vectors are determined by peak detection algorithm. The three-dimensional information for synthetic ages is obtained from the measured disparity and the convergent stereo camera model. It is shown that the experimental results of the proposed method for various stereo images are accurate around the fixation point like the human visual system.