• Title/Summary/Keyword: masking

Search Result 743, Processing Time 0.029 seconds

Effects of Port Masking on Part Load Performance: Part I - Lean Misfire Limit (포트 마스킹이 엔진의 부분부하 성능에 미치는 영향: Part I - 희박연소 한계)

  • 이원근;엄인용
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.9 no.5
    • /
    • pp.17-22
    • /
    • 2001
  • This paper is the first of companion papers, which investigate port-masking effects on lean misfire limit. Port-masking was applied to commercial SOHC 3-valve and DOHC 4-valve engine by inserting masking plates between manifold and port. To induce various conditions of stratification, six types of masking plates were applied. The masking plates were placed in the upstream of injector to prevent wall wetting and two ports were not separated to permit both fuel and air entering through masked port. The results were compared with those by conventional port throttling. The results show that lean misfire limit mainly depends on masking direction, that is, high lean misfire limit is achieved when the port near the spark plug is masked. The mechanism of stratification by masking is different from axial stratification by port throttling. In this case, the rich mixture entering through masked port plays a very important role in the stratification process.

  • PDF

Practical Biasing Power Analysis breaking Side Channel Attack Countermeasures based on Masking-Shuffling techniques (마스킹-셔플링 부채널 대응법을 해독하는 실용적인 편중전력분석)

  • Cho, Jong-Won;Han, Dong-Guk
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.55-64
    • /
    • 2012
  • Until now, Side Channel Attack has been known to be effective to crack decrypt key such as smart cards, electronic passports and e-ID card based on Chip. Combination of Masking and shuffling methods have been proposed practical countermeasure. Newly, S.Tillich suggests biased-mask using template attack(TA) to attack AES with masking and shuffling. However, an additional assumption that is acquired template information previously for masking value is necessary in order to apply this method. Moreover, this method needs to know exact time position of the target masking value for higher probability of success. In this paper, we suggest new practical method called Biasing Power Analysis(BPA) to find a secret key of AES based on masking-shuffling method. In BPA, we don't use time position and template information from masking value. Actually, we do experimental works of BPA attack to 128bit secret key of AES based on masking-shuffling method performed MSP430 Chip and we succeed in finding whole secret key. The results of this study will be utilized for next-generation ID cards to verify physical safety.

An Algorithm for Switching from Arithmetic to Boolean Masking with Low Memory (저메모리 기반의 산술 마스킹에서 불 마스킹 변환 알고리즘)

  • Kim, HanBit;Kim, HeeSeok;Kim, TaeWon;Hong, SeokHie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.5-15
    • /
    • 2016
  • Power analysis attacks are techniques to analyze power signals to find out the secrets when cryptographic algorithm is performed. One of the most famous countermeasure against power analysis attacks is masking methods. Masking types are largely classified into two types which are boolean masking and arithmetic masking. For the cryptographic algorithm to be used with boolean and arithmetic masking at the same time, the converting algorithm can switch between boolean and arithmetic masking. In this paper we propose an algorithm for switching from boolean to arithmetic masking using storage size at less cost than ones. The proposed algorithm is configured to convert using the look-up table without the least significant bit(LSB), because of equal the bit of boolean and arithmetic masking. This makes it possible to design a converting algorithm compared to the previous algorithm at a lower cost without sacrificing performance. In addition, by applying the technique at the LEA it showed up to 26 percent performance improvement over existing techniques.

Selective Electrodeposition Using Laser Masking and DC Voltage (레이저 마스킹과 직류전원을 이용한 선택적 전해도금)

  • Shin, Hong Shik;Kim, Sung Yong
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.24 no.1
    • /
    • pp.75-80
    • /
    • 2015
  • This paper proposes a selective electrodeposition process that uses laser masking and a DC voltage. Selective electrodeposition using laser masking and a DC voltage is more efficient than that using laser masking and a pulse voltage. In other words, electrodeposition with a DC voltage allows for precise selective deposition without the limitation of the deposition region. Also, a selective electrodeposition method that uses laser masking and DC voltage can reduce the electrodeposition time. The characteristics of a copper layer deposited by laser masking and DC voltage were examined under various conditions. A selective copper layer with various micro patterns of $2{\mu}m$ thickness was successfully fabricated.

DPA-Resistant Design of the Inverter (차분 전력 분석에 안전한 역원기의 설계)

  • Kim, Hee-Seok;Cho, Young-In;Han, Dong-Guk;Hong, Seok-Hie
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.340-344
    • /
    • 2008
  • In the block cipher, DPA-resistant masking methods make an appropriation of extremely high cost for the non-linear part. Block ciphers like AES and ARIA use the inversion operation as this non-linear part. This make various countermeasures be proposed for reducing the cost of masking inversion. In this paper, we propose the efficient masking inverter by rearranging the masking inversion operation over the composite field and finding duplicated multiplications.

  • PDF

Part Load Performance Characteristics according to Port Masking (포트 마스킹에 따른 엔진 부분부하 성능 특성)

  • Kim, Hyeong-Sig;Kim, In-Ok;Park, Chan-Jun;Ohm, In-Yong
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.19 no.2
    • /
    • pp.42-49
    • /
    • 2011
  • To expand lean misfire limit and improve combustion stability, the effects of port masking were estimated to secure basic data for applying the mechanism to SI engine instead of asymmetrical port and port throttling devises. For this purpose, various shapes and ratios of masking plates were mounted between port and manifold. The masking effects were evaluated by mixture response test under various load and speed conditions. The results showed that lean misfire limits were expended and fast combustion was observed for all masking shapes and ratios, especially, the effect of diagonal 1/4 masking was remarkable. In conclusion, the port masking method could be easily applied to engine without redesign of port for improving part load performance.

Fingerprint Information Masking Algorithm By Using Multiple LBP Features (다중 LBP 피처를 이용한 지문 정보 마스킹 알고리즘)

  • Kim, Jin-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.12
    • /
    • pp.281-288
    • /
    • 2017
  • Financial service commission notified that fingerprint information of their documents should be deleted till 2019 to the financial industry and the public institution. Business solutions for fingerprint detection and masking in document images are introduced. In this paper, a fingerprint information masking algorithm is proposed by using the multiple LBP features to extract fingerprint's intrinsic characteristics for artificial neural network decision whether the candidate is a true fingerprint or not after segmentation of versatile fingerprint candidates from a document image. The experimental results of the proposed fingerprint masking algorithm for 3,497 document images that are saved in a financial industry show that 96.4% of fingerprint information is masked, hence this fingerprint masking algorithm can be used efficiently in real fingerprint masking tasks.

A Study on Acoustic Masking Effect by Frame-Based Formant Enhancement (프레임 기반의 포먼트 강조에 의한 음향 마스킹 현상 발생에 대한 연구)

  • Jeon, Yu-Yong;Kim, Kyu-Sung;Lee, Sang-Min
    • Journal of Biomedical Engineering Research
    • /
    • v.30 no.6
    • /
    • pp.529-534
    • /
    • 2009
  • One of the characteristics of the hearing impaired is that their frequency selectivity is poorer than that of the normal hearing. To compensate this, formant enhancement algorithms and spectral contrast enhancement algorithms have been developed. However in some cases, these algorithms fail to improve the frequency selectivity of the hearing impaired. One of the reasons is the acoustic masking among enhanced formants. In this study, we tried to enhance the formants based on the individual masking characteristic of each subject. The masking characteristic used in this study was minimum level difference (MLD) between the first formant to the second formant while acoustic masking was occurred. If the level difference between the two formants in each frame is larger than the MLD, the gain of the first formant was decreased to reduce the acoustic masking that occurred among formants. As a result of the speech discrimination test, using formant enhanced speeches, speech discrimination score (SDS) of the speeches having differently enhanced formants was significantly superior to SDS of the speeches having equally enhanced formants. It means that suppression of the acoustic masking among formants improve frequency selectivity of the hearing impaired.

A Video Watermarking Method using Global Masking (전역 마스킹을 이용한 비디오 워터마킹 방법)

  • 문지영;호요성
    • Journal of Broadcast Engineering
    • /
    • v.8 no.3
    • /
    • pp.268-277
    • /
    • 2003
  • In this paper, we propose a new video watermarking method exploiting the human visual system (HVS) to find effective locations. in the video frames which make the watermark robust and imperceptible simultaneously. In particular, we propose a new HVS-optimized weighting map for hiding the watermark by considering HVS in three different aspects : frequency, spatial, and motion masking effects. The global masking map is modeled by combining the frequency masking, the spatial masking, and the motion masking. In this paper, we use a watermark which is generated by the bitwise exclusive-OR operation between a logo image and a random sequence. The amount of watermarks is weighted by a control parameter. Furthermore, we embed the watermark in the uncompressed video sequence for the general watermarking method available to various coding schemes. Simulation results show that the watermark is imperceptible and the proposed method is good for watermark capacity. It is also demonstrated that the proposed method is robust against various attacks, such as MPEG coding, MPEG re-encoding, and frame attacks.

Acoustic Masking Effect That Can Be Occurred by Speech Contrast Enhancement in Hearing Aids (보청기에서 음성 대비 강조에 의해 발생할 수 있는 마스킹 현상)

  • Jeon, Y.Y.;Yang, D.G.;Bang, D.H.;Kil, S.K.;Lee, S.M.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.1 no.1
    • /
    • pp.21-28
    • /
    • 2007
  • In most of hearing aids, amplification algorithms are used to compensate hearing loss, noise and feedback reduction algorithms are used and to increase the perception of speeches contrast enhancement algorithms are used. However, acoustic masking effect is occurred between formants if contrast is enhanced excessively. To confirm the masking effect in speeches, the experiment are composed of 6 tests; test pure tone test, speech reception test, word recognition test, pure tone masking test, formant pure tone masking test and speech masking test, and for objective evaluation, LLR is introduced. As a result of normal hearing subjects and hearing impaired subjects, more making is occurred in hearing impaired subjects than normal hearing subjects when using pure tone, and in the speech masking test, speech reception is also lower in hearing impaired subjects than in normal hearing subjects. This means that acoustic masking effect rather than distortion influences speech perception. So it is required to check the characteristics of masking effect before wearing a hearing aid and to apply this characteristics to fitting curve.

  • PDF