Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep.

Size: px
Start display at page:

Download "Transform. Jeongchoon Ryoo. Dong-Guk Han. Seoul, Korea Rep."

Transcription

1 /12/$ IEEE 201 CPA Performance Comparison based on Wavelet Transform Aesun Park Department of Mathematics Kookmin University Seoul, Korea Rep. Dong-Guk Han Department of Mathematics Kookmin University Seoul, Korea Rep. Abstract Correlation Power Analysis (CPA) is a very effective attack method for finding secret keys using the statistical features of power consumption signals from cryptosystems. However, the power consumption signal of the encryption device is greatly affected or distorted by noise arising from peripheral devices. When a side channel attack is carried out, this distorted signal, which is affected by noise and time inconsistency, is the major factor that reduces the attack performance. A signal processing method based on the Wavelet Transform (WT) has been proposed to enhance the attack performance. Selecting the decomposition level and the wavelet basis is very important because the CPA performance based on the WT depends on these two factors. In this paper, the CPA performance, in terms of noise reduction and the transform domain, is compared and analyzed from the viewpoint of attack time and the minimum number of signals required to find the secret key. In addition, methods for selecting the decomposition level and the wavelet basis using the features of power consumption are proposed, and validated through experiments. Keywords-Wavelet Transform, Side Channel Attack, Multi Resolution Analysis, Correlation Power Analysis I. INTRODUCTION Side Channel Analysis (SCA) is an attack method for finding the secret key of a cryptosystem based on the cryptographic operation time, power consumption, and electromagnetic waves the same information as is derived from the physical implementation [1]. The most well known power analysis methods are Simple Power Analysis (SPA), Differential Power Analysis (DPA), Correlation Power Analysis (CPA), Template Analysis (TA), and Mutual Information Analysis(MIA) and etc. Among them, DPA is one of the most powerful analysis methods within SCA, which has been developed and studied in various ways such as CPA. CPA is an effective method for finding the secret key based on the correlation between the input information and the power Jeongchoon Ryoo Faculty Boards Korea National Defense University Seoul, Korea Rep. jcwillow@naver.com consumption signal that leaks from security devices [2,3]. However, the power consumption signal of the encryption device is greatly affected or distorted by noise arising from peripheral devices. When SCA is applied, this distorted signal, which is affected by noise and time inconsistency, is the major factor that reduces attack performance. To overcome the degradation of the side channel attack performance, various signal processing methods such as frequency analysis, higherorder statistical analysis, and wavelet analysis have been proposed [4,5]. To obtain the signal used in side channel attack, previously proposed methods that use the wavelet transform are based on the following process. First, based on the selected wavelet basis, Multi-Resolution Analysis (MRA) is applied to the collected power consumption signals. Second, the various noise reduction processes are applied to the MRA-processed signal. To enhance the SCA performance, most previous research has focused on noise reduction methods, which include filtering and denoising algorithms. Different from the noise reduction methods, Y. Souissi et al. proposed signal processing methods based on the wavelet coefficients in the wavelet domain to enhance the CPA performance using a DES algorithm [6,7]. Both noise reduction and transform domainbased methods resulted in significant side channel attack performance enhancement. However, no comparative study on the CPA performance for the above two proposed signal processing methods has been performed. Moreover, the decomposition level and the wavelet basis are critical factors, because the performance of CPA based on the wavelet transform depends mainly on the selection of the decomposition level and wavelet basis. All experiments were carried out on the MSP430 board used in low-power embedded systems and the CEB card board used to drive and control the IC card. A comparative study of the collected signal from the first round of the AES algorithm with 16 S- boxes was conducted. Through experimental results, this paper confirms the importance of selecting the appropriate

2 202 decomposition level and wavelet basis through the performance analysis of CPA based on the wavelet transform. The composition of this paper is as follows. Chapter 2 introduces CPA and the wavelet transform. Chapter 3 describes signal preprocessing with the existing wavelet transform. Chapter 4 proposes a method for selecting the decomposition level and wavelet basis. Chapter 5 describes our experiments and their assessment. Finally, Chapter 6 presents our conclusions. II.CORRELATION POWER ANALYSIS AND WAVELET TRANSFORM A. Correlation Power Analysis CPA is an analysis method that can be applied to any cipher device, regardless of the manner of correspondence considered. This method assumes that the amount of power consumed depends on the intermediate-operation value of the device. Thus, after several messages are input into a cryptographic algorithm on-board the device, this method collects electrical information based on the power consumption while the algorithm is being carried out. The CPA calculation first sets a position for the attack of the algorithm that it will apply, and then, it calculates the intermediate-data value of the attack position through plaintext or cryptogram by inferring several secret keys. Next, using a power consumption model of the device, it calculates the value of power consumption of intermediate-data. Then, a correlation between the information collected from the actual device and the values in the power consumption model will be available. To derive the correlation, a correlation coefficient calculation is repeated, corresponding to the number of cases of the secret key used for the operation. Among the values from the repeated calculation, the guessing key that has a high correlation is considered the secret key. The correlation coefficient is the criterion for making a judgment of the correlation between two distributions, X and Y, which are constructed with intermediate-data from the cipher calculation and power consumption signal. The correlation coefficient is calculated via the following process. The correlation coefficient refers to the linearity between the two distributions: if they have a positive correlation similar in form to, the correlation coefficient has a value close to 1; if they have a negative correlation, the value is close to -1. If there is only a slight correlation between the two distributions, that is, the distributions are more independent, the value is closer to 0. Equation (1) is the formula for the correlation coefficient. In CPA, X is a subset of intermediate-data values from several plaintexts used in the power consumption model, and Y is a subset of the actual power consumption information when several plaintexts are input into the algorithm in devices. (1) B. Wavelet Trasform Signals acquired experimentally are not continuous in time, but are sampled at discrete time intervals. The discrete wave transform (DWT) is the sum over the entire duration of the scaled and shifted versions of the wavelet function. The DWT, when applied to the original signal, is expressed as (2) The calculation of the DWT over the duration of a signal results in many coefficients, which are functions of the translation parameter and the scale parameter. These parameters allow one to perform MRA, which is the advantage of using WT. MRA is shown in Figure 1; an incoming signal X starts by passing through and, which are a low-pass filter and a high-pass filter, respectively. Next, the signal undergoes down sampling and is divided into approximation A and detail D. The approximation, which is the component from the lowpass filter, mainly becomes code-relevant information. The component from the high-pass filter becomes noise, which is called detail. This process can be repeated until a particular frequency band is found. Figure 1 indicates that if one obtains approximations in the first wavelet decomposition process, the next decomposition Level can expect an approximation and detail. This decomposition level selection in the wavelet decomposition varies in the features of code-relevant information included in the applicable signals. Figure 1. Multi resolution Analysis III. PREVIOUS WORK Figure 2 shows a general flow diagram of the CPA technique with signal preprocessing. This study will consider a preprocessing method that uses a wavelet transform of the collected power consumption signals. Transforming the wavelet facilitates signal analysis, both in the frequency domain and in the time domain; furthermore, the results are available to be analyzed at different resolutions in each domain. Because of this feature, wavelets are widely

3 203 used in various applications such as those in medical science, the visual industry, and resources exploration. Existing signal processing methods can be generally divided into two types. The first type is a signal noise reduction technique using DWT and inverse-dwt (IDWT), in which analysis is based on the time domain. The second method is based on the wavelet domain, which is a transform technique that approximates the discrete wavelet. Figure 2. Flowchart of SCA A. Noise Reduction Noise reduction methods generally consist of three parts, as described below. The first part is MRA, which is a process in which the collected power consumption signals to be examined are divided into various scales in the selected wavelet. The second part is the filtering process, which reduces noise from in the applied MRA signals. The third part is a stage in which the side channel signal is recovered from the reduced signals, side channel signals that are going to be used for the CPA attack. The diagram in Figure 3 indicates the interaction between the preprocessing process for the power consumption signals and the noise-reduction technique. Using discrete wavelets, the signals consisting of noise and cipher calculation signal are decomposed, and the detailed coefficients are all substituted with 0. Next, the signals are reconstructed via the IDWT. Using the above process, the MRA-applied method of noise reduction for the measured power signals was proposed; this has greatly enhanced the efficiency of DPA attacks [6,7]. Figure 3. Noise-reduction Technique B. Wavelet Transform Method In 2011, a method of SCA in the wavelet transform domain was suggested by Y. Souissi, a method that focused on the direct use of the conversion factor in the wavelet domain from the wavelet transform of the DES algorithm signal.[8] Figure 4 shows the preprocessing of the power consumption signal in the wavelet transform method, which is divided into two stages, as described below. First, MRA is applied; this gives an indication of the various scales in the collected power consumption information. The second stage involves the application of the CPA attack with an approximation that was selected from among the analyzed signals using MRA. Figure 4. Method of Wavelet Transform Diagram As shown in the diagram below, the difference between the two methods of wavelet transform and noise reduction is that there is no reconstruction process of signals by the IDWT in the wavelet transform method. That is, the approximation produced by the DWT is used for the CPA attack. The benefit of this method is increased time efficiency resulting from a reduction in signal preprocessing time, because no signal reconstruction stage is needed. Moreover, the length of the signal is decreased by almost, where indicates the required decomposition level when MRA is applied. This time benefit also means that the time required for an attack is significantly shorter, even if there is a need for a similar number of plaintexts compared to the method of noise reduction. IV. METHOD OF SELECTION FOR SUGGESTED DECOMPOSITION LEVEL AND WAVELET BASIS Wavelet-based CPA performance is heavily dependent on not only the necessary attack time and the minimum number of signals for attack success, but also on the selection of the decomposition level and wavelet basis. Thus, appropriate selection of these factors is important if the encrypted calculation signals of the collected power consumption are to be correctly determined without distortions. Till date, there have been few studies regarding methods of decomposition level and wavelet basis selection for maximizing the performance of wavelet-based CPA. Therefore, this chapter will consider a method for selecting for these two factors for enhancing wavelet-based CPA performance. The enhancement will also be proven through experiments.

4 204 A. Selection of Decomposition Level To select the best decomposition level, the first step is to assume that all relevant code information from power consumption signals leaks from security systems primarily at a certain resolution. Figure 5 shows the features of the signal distribution (per frequency division) of the collected power consumption signals, to which the Fourier transform is applied. In wavelet-based CPA, the process of selecting the decomposition level of the leaked power signal is as follows: when transforming frequencies, there is a certain basis set that shows a significantly larger signal, and all other transformed signals that are higher than the basis are eliminated, which comes to be the selected level. Figure 5. Method of Decomposition Level The selection of the decomposition level is made using the following formula. (3) Where : decomposition level of conjecture, : sampling rate, : frequency with supreme signal Figure 5 shows the method of the decomposition level selection based on signals obtained by the MSP430 board. As shown in the figure, the frequency of the highest signal is 8.37 MHz, and by eliminating frequency components higher than this value, the level is selected. Thus, on the MSP430 board, the CPA performance is expected to be enhanced when the decomposition level is set at level 3 or level 4. B. Selection of Wavelet Basis CPA is a method for finding a secret key using the correlation between power consumption signals collected from actual devices and leakage model. Therefore, it is very important to select a wavelet basis that is similar to the obtained signals. Table 1 shows the power consumption signals and the correlation coefficient for a given basis. Table 1 shows the correlation coefficients of the power consumption signals of the MSP430 board and the IC-chip board, which shows the correlations for the Daubechies(DB) family 1 4 and Coiflets(Coif) family 1 3. The results of the correlation coefficient calculation indicate that both boards expect to have the best results with Coiflets family 3. In this chapter, we will carry out an experiment to verify the benefits of selecting the correct resolution and a high-correlation wavelet basis to have the best CPA performance. Table 1. Correlation Coefficient per basis MSP430 Board IC-Chip Board DB DB DB DB Coif Coif Coif V. EXPERIMENTAL RESULTS A. Experimental Environment To analyze the CPA performance in the time domain and the wavelet transform domain, we used power consumption measurements from two devices. One device is the MSP430 board, which is normally used for low-energy embedded systems such as mobile devices. The other device is that the IC-chip board, which is able to operate and control real-world security systems or development IC cards. The experiment was carried out during the first round of AES encryption algorithm operated on both devices. (Figure 6) shows pictures of the MSP3430 board and IC-chip board used in the experiment. Figure 6. MSP 430 & IC-chip Board The MSP430 board (on the left) is a Telos Module from US Berkeley, which is widely used as a center network node; it is equipped with a MSP430 series microcontroller from Texas Instruments (TI). A total of 4000 power consumption signals were measured at a sampling rate of 200 MHz. The IC-chip board (on the right) is a device operated when a codealgorithm-implemented IC chip is on-board, which is an

5 205 experiment board available for the SCA of smart cards. A total of 10,000 power consumption signals were measured at a sampling rate of 250 MHz. B. Performance Analysis The SCA of wavelet-based signal processing was carried out individually on 16 S-boxes in the first round. The wavelet bases used are DB1 to DB4 of the Daubechies family and Coif1 to Coif3 of the Coiflets family. To present more details on the analysis conditions, the performance of the two methods of noise reduction and wavelet transform were assessed in terms of decomposition level and wavelet basis based on the minimum number of plaintexts and minimum attack time required for a secret key to be found when a CPA attack is carried out. Table 2 and Table 3 present the CPA results of signals from each device when both the noise reduction method and the wavelet transform method were applied. Table 2. Noise Reduction (MSP430/IC-Chip) basis level Org DB1 DB2 DB3 DB4 Coif1 Coif2 Coif3 1 17/72 18/70 20/68 20/67 17/67 20/67 20/ /74 17/74 17/69 20/69 9/70 18/70 18/ /74 4/72 5/74 5/74 4/69 4/74 10/ /69 5/74 5/74 4/74 5/74 8/74 3/ /67 13/71 16/67 23/70 8/74 22/64 22/70 21/70 6 -/97 -/30 -/51 -/57 -/15 -/54 -/57 7 -/26 -/8 -/8 -/5 -/8 -/5 -/7 8 -/59 -/4 -/8 -/5 -/8 -/7 -/3 9 -/64 -/13 -/14 -/14 -/15 -/10 -/11 Table 3. Wavelet Transform (MSP430/IC-Chip) basis level Org DB1 DB2 DB3 DB4 Coif1 Coif2 Coif3 1 17/72 18/70 20/68 20/67 17/67 20/70 20/ /74 17/74 17/70 20/0 16/71 17/71 17/ /74 18/74 21/74 18/74 18/74 14/74 20/ /69 14/80 15/77 11/74 15/74 8/74 3/ /67 13/71 12/71 -/79 11/97 23/82 23/97 19/92 6 -/97 -/68 -/73 -/98 -/79 -/96 -/ /26 -/16 -/15 -/17 -/29 -/13 -/12 8 -/59 -/20 -/11 -/11 -/23 -/10 -/5 9 -/64 -/17 -/11 -/20 -/25 -/11 -/12 For references in the figures, the basic unit of the trace is 100; in the case in which no key is found, even when the maximized signals are used in the experiment, the result is marked with -. As is evident in the above results, the MSP430 board has outstanding performance on level 4, regardless of the method used; the IC-chip board shows good performance in level 7 and level 8. The best performance for the wavelet basis occurred when the Coif3 wavelet basis function was used; this combination had the highest correlation coefficient, regardless of the method applied, and used the smallest number of plaintexts to find all the keys. Each of these factors was decided by the methods of selection suggested in this paper. Thus, the methods of selections for the decomposition level and wavelet basis are proven reasonable. Comparing the noise reduction method to the wavelet transform method from each result of the experiments, the following conclusion can be drawn. Compared to the minimum number of necessary plaintexts, noise reduction methods have a slightly better performance than wavelet transform methods; however, the performances were generally similar to each other. Although, in terms of time efficiency, the wavelet transform method has the benefit that it shortens the time necessary for signal processing and attack by approximately. Therefore, the noise reduction method is preferred for attacks in which wavelet-based CPA is applied to a limited number of plaintexts, and the wavelet transform method is preferred for attacks in which wavelet-based CPA is applied in a limited amount of time. VI. CONCLUSION In this paper, based on wavelet signal processing, CPA performances with methods of noise reduction and wavelet transformation were compared and analyzed in terms of the minimum number of necessary signals and the necessary attack time. Additionally, we proposed a method for selecting the correct decomposition levels and wavelet basis using the features of power consumption; these results were proven by experiment. Therefore, the proposed methods in this paper are recommended for wavelet basis and decomposition level selection when wavelet-based CPA attacks are carried out, which will lead to the most efficient SCA. ACKNOWLEDGEMENTS This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology( ) REFERENCES [1] P,Kocher, J.Jaffe, and B. Jun, Introduction to differential power analysis and related attacks, 1998, White paper, Cryptography Research,

6 206 technical, [2] P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Advances In Cryptology - CRYPTO' 99, LNCS 1666 Springer- Verlag, pp , Santa Barbara, USA, August [3] E. Brier, C. Clavier, and F. Olivier, Correlation power analysis with a leakage model, Cryptographic Hardware and Embedded Systems LNCS 3156 Springer-Verlag, pp , [4] C. Gebotys, S. Ho, and A. Tiu, EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA, CHES 2005, LNCS 3659, pp , [5] T.H. Le, J. Clediere, C. Serviere, and J.L. Lacoume, Noise Reduction in Side channel Attack Using Fourth-Order Cumulant, IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp , Dec [6] N. Debande, Y. Souissi, A.E. Aabid, S. Guilley, J-L.Danger, A Multiresolution Time-Frequency Analysis Based Side Channel Attacks, Poster Session of WIFS2011, Dec., [7] Y. Souissi, M. Abdelaziz, N. Debande, S. Guilley, J.L. Danger Novel Application of Wavelet Transforms based Side-Channel Analysis Nara, Japan, September

FPGA implementation of DWT for Audio Watermarking Application

FPGA implementation of DWT for Audio Watermarking Application FPGA implementation of DWT for Audio Watermarking Application Naveen.S.Hampannavar 1, Sajeevan Joseph 2, C.B.Bidhul 3, Arunachalam V 4 1, 2, 3 M.Tech VLSI Students, 4 Assistant Professor Selection Grade

More information

Evaluation of On-chip Decoupling Capacitor s Effect on AES Cryptographic Circuit

Evaluation of On-chip Decoupling Capacitor s Effect on AES Cryptographic Circuit R1-3 SASIMI 2013 Proceedings Evaluation of On-chip Decoupling Capacitor s Effect on AES Cryptographic Circuit Tsunato Nakai Mitsuru Shiozaki Takaya Kubota Takeshi Fujino Graduate School of Science and

More information

SIDE-CHANNEL attacks exploit the leaked physical information

SIDE-CHANNEL attacks exploit the leaked physical information 546 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 57, NO. 7, JULY 2010 A Low Overhead DPA Countermeasure Circuit Based on Ring Oscillators Po-Chun Liu, Hsie-Chia Chang, Member, IEEE,

More information

Electromagnetic-based Side Channel Attacks

Electromagnetic-based Side Channel Attacks Electromagnetic-based Side Channel Attacks Yasmine Badr 10/28/2015 What is Side Channel Attack Any attack based on information gained from the physical implementation of a cryptosystem, rather than brute

More information

Is Your Mobile Device Radiating Keys?

Is Your Mobile Device Radiating Keys? Is Your Mobile Device Radiating Keys? Benjamin Jun Gary Kenworthy Session ID: MBS-401 Session Classification: Intermediate Radiated Leakage You have probably heard of this before App Example of receiving

More information

Finding the key in the haystack

Finding the key in the haystack A practical guide to Differential Power hunz Zn000h AT gmail.com December 30, 2009 Introduction Setup Procedure Tunable parameters What s DPA? side channel attack introduced by Paul Kocher et al. 1998

More information

Chapter 5. Signal Analysis. 5.1 Denoising fiber optic sensor signal

Chapter 5. Signal Analysis. 5.1 Denoising fiber optic sensor signal Chapter 5 Signal Analysis 5.1 Denoising fiber optic sensor signal We first perform wavelet-based denoising on fiber optic sensor signals. Examine the fiber optic signal data (see Appendix B). Across all

More information

Towards Optimal Pre-processing in Leakage Detection

Towards Optimal Pre-processing in Leakage Detection Towards Optimal Pre-processing in Leakage Detection Changhai Ou, Degang Sun, Zhu Wang and Xinping Zhou Institute of Information Engineering, Chinese Academy of Sciences 2 School of Cyber Security, University

More information

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10 Dynamic extended DES Yi-Shiung Yeh 1, I-Te Chen 2, Ting-Yu Huang 1, Chan-Chi Wang 1, 1 Department of Computer Science and Information Engineering National Chiao-Tung University 1001 Ta-Hsueh Road, HsinChu

More information

Variety of scalable shuffling countermeasures against side channel attacks

Variety of scalable shuffling countermeasures against side channel attacks Variety of scalable shuffling countermeasures against side channel attacks Nikita Veshchikov, Stephane Fernandes Medeiros, Liran Lerman Department of computer sciences, Université libre de Bruxelles, Brussel,

More information

Evoked Potentials (EPs)

Evoked Potentials (EPs) EVOKED POTENTIALS Evoked Potentials (EPs) Event-related brain activity where the stimulus is usually of sensory origin. Acquired with conventional EEG electrodes. Time-synchronized = time interval from

More information

ARM BASED WAVELET TRANSFORM IMPLEMENTATION FOR EMBEDDED SYSTEM APPLİCATİONS

ARM BASED WAVELET TRANSFORM IMPLEMENTATION FOR EMBEDDED SYSTEM APPLİCATİONS ARM BASED WAVELET TRANSFORM IMPLEMENTATION FOR EMBEDDED SYSTEM APPLİCATİONS 1 FEDORA LIA DIAS, 2 JAGADANAND G 1,2 Department of Electrical Engineering, National Institute of Technology, Calicut, India

More information

Power Analysis Attacks on SASEBO January 6, 2010

Power Analysis Attacks on SASEBO January 6, 2010 Power Analysis Attacks on SASEBO January 6, 2010 Research Center for Information Security, National Institute of Advanced Industrial Science and Technology Table of Contents Page 1. OVERVIEW... 1 2. POWER

More information

CHAPTER 3 WAVELET TRANSFORM BASED CONTROLLER FOR INDUCTION MOTOR DRIVES

CHAPTER 3 WAVELET TRANSFORM BASED CONTROLLER FOR INDUCTION MOTOR DRIVES 49 CHAPTER 3 WAVELET TRANSFORM BASED CONTROLLER FOR INDUCTION MOTOR DRIVES 3.1 INTRODUCTION The wavelet transform is a very popular tool for signal processing and analysis. It is widely used for the analysis

More information

Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis

Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis Colin O'Flynn and Zhizhang (David) Chen Dalhousie University, Halifax, Canada {coflynn, z.chen}@dal.ca Abstract.

More information

Wavelet Transform Based Islanding Characterization Method for Distributed Generation

Wavelet Transform Based Islanding Characterization Method for Distributed Generation Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 6) Wavelet Transform Based Islanding Characterization Method for Distributed Generation O. A.

More information

Wavelet Transform. From C. Valens article, A Really Friendly Guide to Wavelets, 1999

Wavelet Transform. From C. Valens article, A Really Friendly Guide to Wavelets, 1999 Wavelet Transform From C. Valens article, A Really Friendly Guide to Wavelets, 1999 Fourier theory: a signal can be expressed as the sum of a series of sines and cosines. The big disadvantage of a Fourier

More information

A Novel Approach for MRI Image De-noising and Resolution Enhancement

A Novel Approach for MRI Image De-noising and Resolution Enhancement A Novel Approach for MRI Image De-noising and Resolution Enhancement 1 Pravin P. Shetti, 2 Prof. A. P. Patil 1 PG Student, 2 Assistant Professor Department of Electronics Engineering, Dr. J. J. Magdum

More information

Recommendations for Secure IC s and ASIC s

Recommendations for Secure IC s and ASIC s Recommendations for Secure IC s and ASIC s F. Mace, F.-X. Standaert, J.D. Legat, J.-J. Quisquater UCL Crypto Group, Microelectronics laboratory(dice), Universite Catholique de Louvain(UCL), Belgium email:

More information

Test Apparatus for Side-Channel Resistance Compliance Testing

Test Apparatus for Side-Channel Resistance Compliance Testing Test Apparatus for Side-Channel Resistance Compliance Testing Michael Hutter, Mario Kirschbaum, Thomas Plos, and Jörn-Marc Schmidt Institute for Applied Information Processing and Communications (IAIK),

More information

DETECTING POWER ATTACKS ON RECONFIGURABLE HARDWARE. Adrien Le Masle, Wayne Luk

DETECTING POWER ATTACKS ON RECONFIGURABLE HARDWARE. Adrien Le Masle, Wayne Luk DETECTING POWER ATTACKS ON RECONFIGURABLE HARDWARE Adrien Le Masle, Wayne Luk Department of Computing, Imperial College London 180 Queen s Gate, London SW7 2BZ, UK email: {al1108,wl}@doc.ic.ac.uk ABSTRACT

More information

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005 Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005 Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown.

More information

Wavelet Denoising Technique for Improvement of the Low Cost MEMS-GPS Integrated System

Wavelet Denoising Technique for Improvement of the Low Cost MEMS-GPS Integrated System International Symposium on GPS/GNSS October 6-8,. Wavelet Denoising Technique for Improvement of the Low Cost MEMS-GPS Integrated System Chul Woo Kang, Chang Ho Kang, and Chan Gook Park 3* Seoul National

More information

A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies

A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies Francesco Regazzoni 1, Stéphane Badel 2, Thomas Eisenbarth

More information

Multimodal Face Recognition using Hybrid Correlation Filters

Multimodal Face Recognition using Hybrid Correlation Filters Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com

More information

Introduction to Wavelet Transform. Chapter 7 Instructor: Hossein Pourghassem

Introduction to Wavelet Transform. Chapter 7 Instructor: Hossein Pourghassem Introduction to Wavelet Transform Chapter 7 Instructor: Hossein Pourghassem Introduction Most of the signals in practice, are TIME-DOMAIN signals in their raw format. It means that measured signal is a

More information

Synchronization Method for SCA and Fault Attacks

Synchronization Method for SCA and Fault Attacks Journal of Cryptographic Engineering (2011) 1:71-77 DOI 10.1007/s13389-011-0004-0 Synchronization Method for SCA and Fault Attacks Sergei Skorobogatov Received: 15 November 2010 / Accepted: 16 January

More information

Differential Power Analysis Attack on FPGA Implementation of AES

Differential Power Analysis Attack on FPGA Implementation of AES 1 Differential Power Analysis Attack on FPGA Implementation of AES Rajesh Velegalati, Panasayya S V V K Yalla Abstract Cryptographic devices have found their way into a wide range of application and the

More information

IMPROVING CPA ATTACK AGAINST DSA AND ECDSA

IMPROVING CPA ATTACK AGAINST DSA AND ECDSA Journal of ELECTRICAL ENGINEERING, VOL. 66, NO. 3, 2015, 159 163 IMPROVING CPA ATTACK AGAINST DSA AND ECDSA Marek Repka Michal Varchola Miloš Drutarovský In this work, we improved Correlation Power Analysis

More information

Optimization of DWT parameters for jamming excision in DSSS Systems

Optimization of DWT parameters for jamming excision in DSSS Systems Optimization of DWT parameters for jamming excision in DSSS Systems G.C. Cardarilli 1, L. Di Nunzio 1, R. Fazzolari 1, A. Fereidountabar 1, F. Giuliani 1, M. Re 1, L. Simone 2 1 University of Rome Tor

More information

FPGA implementation of LSB Steganography method

FPGA implementation of LSB Steganography method FPGA implementation of LSB Steganography method Pangavhane S.M. 1 &Punde S.S. 2 1,2 (E&TC Engg. Dept.,S.I.E.RAgaskhind, SPP Univ., Pune(MS), India) Abstract : "Steganography is a Greek origin word which

More information

AN ERROR LIMITED AREA EFFICIENT TRUNCATED MULTIPLIER FOR IMAGE COMPRESSION

AN ERROR LIMITED AREA EFFICIENT TRUNCATED MULTIPLIER FOR IMAGE COMPRESSION AN ERROR LIMITED AREA EFFICIENT TRUNCATED MULTIPLIER FOR IMAGE COMPRESSION K.Mahesh #1, M.Pushpalatha *2 #1 M.Phil.,(Scholar), Padmavani Arts and Science College. *2 Assistant Professor, Padmavani Arts

More information

THE APPLICATION WAVELET TRANSFORM ALGORITHM IN TESTING ADC EFFECTIVE NUMBER OF BITS

THE APPLICATION WAVELET TRANSFORM ALGORITHM IN TESTING ADC EFFECTIVE NUMBER OF BITS ABSTRACT THE APPLICATION WAVELET TRANSFORM ALGORITHM IN TESTING EFFECTIVE NUMBER OF BITS Emad A. Awada Department of Electrical and Computer Engineering, Applied Science University, Amman, Jordan In evaluating

More information

Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. Praveen Vadnala

Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers. Praveen Vadnala Time-Memory Trade-Offs for Side-Channel Resistant Implementations of Block Ciphers Praveen Vadnala Differential Power Analysis Implementations of cryptographic systems leak Leaks from bit 1 and bit 0 are

More information

Wavelet Transform. From C. Valens article, A Really Friendly Guide to Wavelets, 1999

Wavelet Transform. From C. Valens article, A Really Friendly Guide to Wavelets, 1999 Wavelet Transform From C. Valens article, A Really Friendly Guide to Wavelets, 1999 Fourier theory: a signal can be expressed as the sum of a, possibly infinite, series of sines and cosines. This sum is

More information

Keywords Decomposition; Reconstruction; SNR; Speech signal; Super soft Thresholding.

Keywords Decomposition; Reconstruction; SNR; Speech signal; Super soft Thresholding. Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Speech Enhancement

More information

Application of Wavelet Transform to Process Electromagnetic Pulses from Explosion of Flexible Linear Shaped Charge

Application of Wavelet Transform to Process Electromagnetic Pulses from Explosion of Flexible Linear Shaped Charge 21 3rd International Conference on Computer and Electrical Engineering (ICCEE 21) IPCSIT vol. 53 (212) (212) IACSIT Press, Singapore DOI: 1.7763/IPCSIT.212.V53.No.1.56 Application of Wavelet Transform

More information

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION Mr. Jaykumar. S. Dhage Assistant Professor, Department of Computer Science & Engineering

More information

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,

More information

A DWT Approach for Detection and Classification of Transmission Line Faults

A DWT Approach for Detection and Classification of Transmission Line Faults IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): 2349-6010 A DWT Approach for Detection and Classification of Transmission Line Faults

More information

Information Leakage from Cryptographic Hardware via Common-Mode Current

Information Leakage from Cryptographic Hardware via Common-Mode Current Information Leakage from Cryptographic Hardware via Common-Mode Current Yu-ichi Hayashi #1, Takeshi Sugawara #1, Yoshiki Kayano #2, Naofumi Homma #1 Takaaki Mizuki #1, Akashi Satoh #3, Takafumi Aoki #1,

More information

Nonlinear Companding Transform Algorithm for Suppression of PAPR in OFDM Systems

Nonlinear Companding Transform Algorithm for Suppression of PAPR in OFDM Systems Nonlinear Companding Transform Algorithm for Suppression of PAPR in OFDM Systems P. Guru Vamsikrishna Reddy 1, Dr. C. Subhas 2 1 Student, Department of ECE, Sree Vidyanikethan Engineering College, Andhra

More information

Partial Discharge Signal Denoising by Discrete Wavelet Transformation

Partial Discharge Signal Denoising by Discrete Wavelet Transformation EPI International Journal of Engineering Vol. 1, No. 1, February 2018, pp. 76-82 DOI: 10.25042/epi-ije.022018.12 ISSN:2615-5109 Partial Discharge Signal Denoising by Discrete Wavelet Transformation Trinurkalid

More information

Number Theory and Public Key Cryptography Kathryn Sommers

Number Theory and Public Key Cryptography Kathryn Sommers Page!1 Math 409H Fall 2016 Texas A&M University Professor: David Larson Introduction Number Theory and Public Key Cryptography Kathryn Sommers Number theory is a very broad and encompassing subject. At

More information

[Panday* et al., 5(5): May, 2016] ISSN: IC Value: 3.00 Impact Factor: 3.785

[Panday* et al., 5(5): May, 2016] ISSN: IC Value: 3.00 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY PERFORMANCE OF WAVELET PACKET BASED SPECTRUM SENSING IN COGNITIVE RADIO FOR DIFFERENT WAVELET FAMILIES Saloni Pandya *, Prof.

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2017 IJSRSET Volume 3 Issue 8 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology Hybridization of DBA-DWT Algorithm for Enhancement and Restoration of Impulse Noise

More information

High capacity robust audio watermarking scheme based on DWT transform

High capacity robust audio watermarking scheme based on DWT transform High capacity robust audio watermarking scheme based on DWT transform Davod Zangene * (Sama technical and vocational training college, Islamic Azad University, Mahshahr Branch, Mahshahr, Iran) davodzangene@mail.com

More information

Comparison of Profiling Power Analysis Attacks Using Templates and Multi-Layer Perceptron Network

Comparison of Profiling Power Analysis Attacks Using Templates and Multi-Layer Perceptron Network Comparison of Profiling Power Analysis Attacks Using Templates and Multi-Layer Perceptron Network Zdenek Martinasek and Lukas Malina Abstract In recent years, the cryptographic community has explored new

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

An on-chip glitchy-clock generator and its application to safe-error attack

An on-chip glitchy-clock generator and its application to safe-error attack An on-chip glitchy-clock generator and its application to safe-error attack Sho Endo, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki and Akashi Satoh Graduate School of Information Sciences, Tohoku University

More information

SUBTHRESHOLD DESIGN SPACE EXPLORATION FOR GAUSSIAN NORMAL BASIS MULTIPLIER

SUBTHRESHOLD DESIGN SPACE EXPLORATION FOR GAUSSIAN NORMAL BASIS MULTIPLIER SUBTHRESHOLD DESIGN SPACE EXPLORATION FOR GAUSSIAN NORMAL BASIS MULTIPLIER H. Kanitkar and D. Kudithipudi Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY-14623 Email:

More information

Linearization Method Using Variable Capacitance in Inter-Stage Matching Networks for CMOS Power Amplifier

Linearization Method Using Variable Capacitance in Inter-Stage Matching Networks for CMOS Power Amplifier Linearization Method Using Variable Capacitance in Inter-Stage Matching Networks for CMOS Power Amplifier Jaehyuk Yoon* (corresponding author) School of Electronic Engineering, College of Information Technology,

More information

Discrete Wavelet Transform For Image Compression And Quality Assessment Of Compressed Images

Discrete Wavelet Transform For Image Compression And Quality Assessment Of Compressed Images Research Paper Volume 2 Issue 9 May 2015 International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Discrete Wavelet Transform For Image Compression And Quality Assessment Of Compressed

More information

Power System Failure Analysis by Using The Discrete Wavelet Transform

Power System Failure Analysis by Using The Discrete Wavelet Transform Power System Failure Analysis by Using The Discrete Wavelet Transform ISMAIL YILMAZLAR, GULDEN KOKTURK Dept. Electrical and Electronic Engineering Dokuz Eylul University Campus Kaynaklar, Buca 35160 Izmir

More information

Power Quality Monitoring of a Power System using Wavelet Transform

Power Quality Monitoring of a Power System using Wavelet Transform International Journal of Electrical Engineering. ISSN 0974-2158 Volume 3, Number 3 (2010), pp. 189--199 International Research Publication House http://www.irphouse.com Power Quality Monitoring of a Power

More information

Characterization of Voltage Sag due to Faults and Induction Motor Starting

Characterization of Voltage Sag due to Faults and Induction Motor Starting Characterization of Voltage Sag due to Faults and Induction Motor Starting Dépt. of Electrical Engineering, SSGMCE, Shegaon, India, Dépt. of Electronics & Telecommunication Engineering, SITS, Pune, India

More information

Enhancement of Speech Signal by Adaptation of Scales and Thresholds of Bionic Wavelet Transform Coefficients

Enhancement of Speech Signal by Adaptation of Scales and Thresholds of Bionic Wavelet Transform Coefficients ISSN (Print) : 232 3765 An ISO 3297: 27 Certified Organization Vol. 3, Special Issue 3, April 214 Paiyanoor-63 14, Tamil Nadu, India Enhancement of Speech Signal by Adaptation of Scales and Thresholds

More information

When Electromagnetic Side Channels Meet Radio Transceivers

When Electromagnetic Side Channels Meet Radio Transceivers Screaming Channels When Electromagnetic Side Channels Meet Radio Transceivers Giovanni Camurati, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon What s this all about? - A novel attack

More information

VU Signal and Image Processing. Torsten Möller + Hrvoje Bogunović + Raphael Sahann

VU Signal and Image Processing. Torsten Möller + Hrvoje Bogunović + Raphael Sahann 052600 VU Signal and Image Processing Torsten Möller + Hrvoje Bogunović + Raphael Sahann torsten.moeller@univie.ac.at hrvoje.bogunovic@meduniwien.ac.at raphael.sahann@univie.ac.at vda.cs.univie.ac.at/teaching/sip/17s/

More information

Design and Implementation of Current-Mode Multiplier/Divider Circuits in Analog Processing

Design and Implementation of Current-Mode Multiplier/Divider Circuits in Analog Processing Design and Implementation of Current-Mode Multiplier/Divider Circuits in Analog Processing N.Rajini MTech Student A.Akhila Assistant Professor Nihar HoD Abstract This project presents two original implementations

More information

A Modified Image Coder using HVS Characteristics

A Modified Image Coder using HVS Characteristics A Modified Image Coder using HVS Characteristics Mrs Shikha Tripathi, Prof R.C. Jain Birla Institute Of Technology & Science, Pilani, Rajasthan-333 031 shikha@bits-pilani.ac.in, rcjain@bits-pilani.ac.in

More information

An Implementation of LSB Steganography Using DWT Technique

An Implementation of LSB Steganography Using DWT Technique An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication

More information

Power Analysis an overview. Agenda. Measuring power consumption. Measuring power consumption (2) Benedikt Gierlichs, KU Leuven - COSIC.

Power Analysis an overview. Agenda. Measuring power consumption. Measuring power consumption (2) Benedikt Gierlichs, KU Leuven - COSIC. Power Analysis an overview Agenda Benedikt Gierlichs KU Leuven COSIC, Belgium benedikt.gierlichs@esat.kuleuven.be Measurements Analysis Pre-processing Summer School on Design and security of cryptographic

More information

Design and Testing of DWT based Image Fusion System using MATLAB Simulink

Design and Testing of DWT based Image Fusion System using MATLAB Simulink Design and Testing of DWT based Image Fusion System using MATLAB Simulink Ms. Sulochana T 1, Mr. Dilip Chandra E 2, Dr. S S Manvi 3, Mr. Imran Rasheed 4 M.Tech Scholar (VLSI Design And Embedded System),

More information

A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals

A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals Takehiko Kato, Satoru Ito, Jun Anzai, and Natsume Matsuzaki Advanced Mobile Telecommunications Security Technology

More information

ICA & Wavelet as a Method for Speech Signal Denoising

ICA & Wavelet as a Method for Speech Signal Denoising ICA & Wavelet as a Method for Speech Signal Denoising Ms. Niti Gupta 1 and Dr. Poonam Bansal 2 International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(3), pp. 035 041 DOI: http://dx.doi.org/10.21172/1.73.505

More information

A Novel Encryption System using Layered Cellular Automata

A Novel Encryption System using Layered Cellular Automata A Novel Encryption System using Layered Cellular Automata M Phani Krishna Kishore 1 S Kanthi Kiran 2 B Bangaru Bhavya 3 S Harsha Chaitanya S 4 Abstract As the technology is rapidly advancing day by day

More information

Fault Location Technique for UHV Lines Using Wavelet Transform

Fault Location Technique for UHV Lines Using Wavelet Transform International Journal of Electrical Engineering. ISSN 0974-2158 Volume 6, Number 1 (2013), pp. 77-88 International Research Publication House http://www.irphouse.com Fault Location Technique for UHV Lines

More information

A DUAL TREE COMPLEX WAVELET TRANSFORM CONSTRUCTION AND ITS APPLICATION TO IMAGE DENOISING

A DUAL TREE COMPLEX WAVELET TRANSFORM CONSTRUCTION AND ITS APPLICATION TO IMAGE DENOISING A DUAL TREE COMPLEX WAVELET TRANSFORM CONSTRUCTION AND ITS APPLICATION TO IMAGE DENOISING Sathesh Assistant professor / ECE / School of Electrical Science Karunya University, Coimbatore, 641114, India

More information

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error. Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Entropy

More information

GEARBOX FAULT DETECTION BY MOTOR CURRENT SIGNATURE ANALYSIS. A. R. Mohanty

GEARBOX FAULT DETECTION BY MOTOR CURRENT SIGNATURE ANALYSIS. A. R. Mohanty ICSV14 Cairns Australia 9-12 July, 2007 GEARBOX FAULT DETECTION BY MOTOR CURRENT SIGNATURE ANALYSIS A. R. Mohanty Department of Mechanical Engineering Indian Institute of Technology, Kharagpur Kharagpur,

More information

Threshold Implementations. Svetla Nikova

Threshold Implementations. Svetla Nikova Threshold Implementations Svetla Nikova Threshold Implementations A provably secure countermeasure Against (first) order power analysis based on multi party computation and secret sharing 2 Outline Threshold

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

(i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters

(i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters FIR Filter Design Chapter Intended Learning Outcomes: (i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters (ii) Ability to design linear-phase FIR filters according

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

An Adaptive Wavelet and Level Dependent Thresholding Using Median Filter for Medical Image Compression

An Adaptive Wavelet and Level Dependent Thresholding Using Median Filter for Medical Image Compression An Adaptive Wavelet and Level Dependent Thresholding Using Median Filter for Medical Image Compression Komal Narang M.Tech (Embedded Systems), Department of EECE, The North Cap University, Huda, Sector

More information

A multi-mode structural health monitoring system for wind turbine blades and components

A multi-mode structural health monitoring system for wind turbine blades and components A multi-mode structural health monitoring system for wind turbine blades and components Robert B. Owen 1, Daniel J. Inman 2, and Dong S. Ha 2 1 Extreme Diagnostics, Inc., Boulder, CO, 80302, USA rowen@extremediagnostics.com

More information

Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise

Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 4, Jul - Aug 2016 RESEARCH ARTICLE OPEN ACCESS Implementation of Block based Mean and Median Filter for Removal of

More information

A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios

A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios A Weighted Least Squares Algorithm for Passive Localization in Multipath Scenarios Noha El Gemayel, Holger Jäkel, Friedrich K. Jondral Karlsruhe Institute of Technology, Germany, {noha.gemayel,holger.jaekel,friedrich.jondral}@kit.edu

More information

REAL-TIME DENOISING OF AE SIGNALS BY SHORT TIME FOURIER TRANSFORM AND WAVELET TRANSFORM

REAL-TIME DENOISING OF AE SIGNALS BY SHORT TIME FOURIER TRANSFORM AND WAVELET TRANSFORM REAL-TIME DENOISING OF AE SIGNALS BY SHORT TIME FOURIER TRANSFORM AND WAVELET TRANSFORM KAITA ITO and MANABU ENOKI Department of Materials Engineering, The University of Tokyo, 7-3-1 Hongo, Bunkyo, Tokyo

More information

Ultra wideband pulse generator circuits using Multiband OFDM

Ultra wideband pulse generator circuits using Multiband OFDM Ultra wideband pulse generator circuits using Multiband OFDM J.Balamurugan, S.Vignesh, G. Mohaboob Basha Abstract Ultra wideband technology is the cutting edge technology for wireless communication with

More information

Keywords: symlet wavelet, recoil acceleration, sensor, filtering

Keywords: symlet wavelet, recoil acceleration, sensor, filtering 4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Analysis of Artillery Firing Recoil Movement Characteristics Based on Symlet Wavelet Filtering

More information

MC CDMA PAPR Reduction Using Discrete Logarithmic Method

MC CDMA PAPR Reduction Using Discrete Logarithmic Method International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 4 (June 2012), PP.38-43 www.ijerd.com MC CDMA PAPR Reduction Using Discrete Logarithmic Method B.Sarala 1,

More information

DPA Leakage Models for CMOS Logic Circuits

DPA Leakage Models for CMOS Logic Circuits CHES 25 in Edinburgh DPA Leakage Models for CMOS Logic Circuits Daisuke Suzuki Minoru Saeki Mitsubishi Electric Corporation, Information Technology R&D Center Tetsuya Ichikawa Mitsubishi Electric Engineering

More information

4. Design Principles of Block Ciphers and Differential Attacks

4. Design Principles of Block Ciphers and Differential Attacks 4. Design Principles of Block Ciphers and Differential Attacks Nonli near 28-bits Trans forma tion 28-bits Model of Block Ciphers @G. Gong A. Introduction to Block Ciphers A Block Cipher Algorithm: E and

More information

Some Cryptanalysis of the Block Cipher BCMPQ

Some Cryptanalysis of the Block Cipher BCMPQ Some Cryptanalysis of the Block Cipher BCMPQ V. Dimitrova, M. Kostadinoski, Z. Trajcheska, M. Petkovska and D. Buhov Faculty of Computer Science and Engineering Ss. Cyril and Methodius University, Skopje,

More information

(i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters

(i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters FIR Filter Design Chapter Intended Learning Outcomes: (i) Understanding of the characteristics of linear-phase finite impulse response (FIR) filters (ii) Ability to design linear-phase FIR filters according

More information

Keywords: dynamic P-Box and S-box, modular calculations, prime numbers, key encryption, code breaking.

Keywords: dynamic P-Box and S-box, modular calculations, prime numbers, key encryption, code breaking. INTRODUCING DYNAMIC P-BOX AND S-BOX BASED ON MODULAR CALCULATION AND KEY ENCRYPTION FOR ADDING TO CURRENT CRYPTOGRAPHIC SYSTEMS AGAINST THE LINEAR AND DIFFERENTIAL CRYPTANALYSIS M. Zobeiri and B. Mazloom-Nezhad

More information

Introduction to Wavelets Michael Phipps Vallary Bhopatkar

Introduction to Wavelets Michael Phipps Vallary Bhopatkar Introduction to Wavelets Michael Phipps Vallary Bhopatkar *Amended from The Wavelet Tutorial by Robi Polikar, http://users.rowan.edu/~polikar/wavelets/wttutoria Who can tell me what this means? NR3, pg

More information

Keywords Medical scans, PSNR, MSE, wavelet, image compression.

Keywords Medical scans, PSNR, MSE, wavelet, image compression. Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effect of Image

More information

A NOVEL DESIGN OF CURRENT MODE MULTIPLIER/DIVIDER CIRCUITS FOR ANALOG SIGNAL PROCESSING

A NOVEL DESIGN OF CURRENT MODE MULTIPLIER/DIVIDER CIRCUITS FOR ANALOG SIGNAL PROCESSING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 10, October 2014,

More information

Nonlinear Filtering in ECG Signal Denoising

Nonlinear Filtering in ECG Signal Denoising Acta Universitatis Sapientiae Electrical and Mechanical Engineering, 2 (2) 36-45 Nonlinear Filtering in ECG Signal Denoising Zoltán GERMÁN-SALLÓ Department of Electrical Engineering, Faculty of Engineering,

More information

Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich *

Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Orthonormal bases and tilings of the time-frequency plane for music processing Juan M. Vuletich * Dept. of Computer Science, University of Buenos Aires, Argentina ABSTRACT Conventional techniques for signal

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

Evaluation of the Masked Logic Style MDPL on a Prototype Chip

Evaluation of the Masked Logic Style MDPL on a Prototype Chip Evaluation of the Masked Logic Style MDPL on a Prototype Chip Thomas Popp 1, Mario Kirschbaum 1, Thomas Zefferer 1, and Stefan Mangard 2, 1 Institute for Applied Information Processing and Communications

More information

HTTP Compression for 1-D signal based on Multiresolution Analysis and Run length Encoding

HTTP Compression for 1-D signal based on Multiresolution Analysis and Run length Encoding 0 International Conference on Information and Electronics Engineering IPCSIT vol.6 (0) (0) IACSIT Press, Singapore HTTP for -D signal based on Multiresolution Analysis and Run length Encoding Raneet Kumar

More information

A Case Study of Side-Channel Analysis using Decoupling Capacitor Power Measurement with

A Case Study of Side-Channel Analysis using Decoupling Capacitor Power Measurement with A Case Study of Side-Channel Analysis using Decoupling Capacitor Power Measurement with the OpenADC Colin O'Flynn and Zhizhang Chen Dalhousie University, Halifax, Canada {coflynn, z.chen}@dal.ca Abstract.

More information

Analysis of Secure Text Embedding using Steganography

Analysis of Secure Text Embedding using Steganography Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science

More information

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney

More information

LabVIEW Based Condition Monitoring Of Induction Motor

LabVIEW Based Condition Monitoring Of Induction Motor RESEARCH ARTICLE OPEN ACCESS LabVIEW Based Condition Monitoring Of Induction Motor 1PG student Rushikesh V. Deshmukh Prof. 2Asst. professor Anjali U. Jawadekar Department of Electrical Engineering SSGMCE,

More information