PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Video signal level (colour intensity) and effectiveness of electromagnetic infiltration

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Nowadays, when we have a strong presence of computers in our everyday lives the protection of electronically processed information using digital machines becomes very important. It is related to accidental formation of electromagnetic fields which distinctive features are intrinsically linked to the nature of processed information. Although many protective measures are taken - from technical to organisational - this phenomenon still poses a great threat. Therefore, methods supporting information protection against the so-called electromagnetic infiltration are still being developed. In addition, these methods would support security of data processing and perhaps replace some of the currently used solutions characterised by high costs of implementation, or a small degree of ergonomics. Conducted research deals both with an analogue VGA and digital DVI standards. The article presents the results of the research concerning possibilities of manipulating the level of video signal (black colour intensity) and its influence on the quality of displayed images, that is, on the effectiveness of electromagnetic infiltration.
Rocznik
Strony
207--218
Opis fizyczny
Bibliogr. 25 poz., rys., wykr., tab.
Twórcy
autor
  • Military Communication Institute, 22a Warszawska St., 05-130 Zegrze, Poland
Bibliografia
  • [1] I. Kubiak, “Digital processing methods of images and signals in electromagnetic infiltration process”, Image Processing and Communications 18, DOI: 10.2478/v10248-012-0070-72014, 5-16 (2013).
  • [2] I. Kubiak, K. Grzesiak, S. Musial, and A. Przybysz, The Raster Generator in the Electromagnetic Infiltration Process, ISBN 978-83-62954-28-5, Publishing House of the Military University of Technology, Warsaw, 2012.
  • [3] I. Kubiak, “Identification of waveforms for electromagnetic fields on the basis of its measurements within a confined bandwidth of reception”, PhD Thesis, Publishing House of the Military University of Technology, Warsaw, 2000.
  • [4] I. Kubiak, Analysis Methods and Digital Processing Images in Electromagnetic Infiltration Process, ISBN 978-83-62954-86-5, Publishing House of the Military University of Technology, Warsaw, 2013.
  • [5] I. Kubiak, “Possibilities of reconstruct of data text from unwanted signal emissions using char correlation method - standard DVI”, Overview of Telecommunications and Telecommunication News 2-3, 46-50 (2014).
  • [6] I. Kubiak, “The computer font resistance to electromagnetic infiltration process”, Przegląd Elektrotechniczny 90, 207-215 (2014).
  • [7] I. Kubiak, Computer Font Resistance to Electromagnetic Infiltration, ISBN 978-83-7938-018-3, Publishing House of the Military University of Technology, Warsaw, 2014.
  • [8] I. Kubiak, Computer Font Resistance to Electromagnetic Infiltration. The Research and Analysis Results, ISBN 978-83-7938-019-0, Publishing House of the Military University of Technology, Warsaw, 2014.
  • [9] N. Chandra and A. Goel, “A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based on Sorting Group-Wise of RGB Values and Explosive Inter-Pixel Displacement”, Int. J. Image, Graphics and Signal Processing 2/2012, DOI: 10.5815/ijigsp.2012.02.03, 16-22 (2012).
  • [10] B. Jalilian and A. Chalechale, “Persian sign language recognition using radial distance and Fourier transform”, Int. J. Image, Graphics and Signal Processing 1/2014, DOI: 10.5815/ijigsp.2014.01.06, 40-46 (2014).
  • [11] N. Kulkarni, “Method for image segmentation of natural images”, Int. J. Image, Graphics and Signal Processing 1/2012, DOI: 10.5815/ijigsp.2012.01.04, 28-34 (2012).
  • [12] R.G. Lyons, Understanding Digital Signal Processing, Amazon, New York, 2004.
  • [13] T. Zielinski, Digital Signal Processing, Communication and Transport Publisher, Warsaw, 2009.
  • [14] D.J. Park and K.N. Nam, “Multiresolution edge detection techniques”, Pattern Recognition 28, 11 (1995).
  • [15] K. Pratt, Digital Image Processing, Wiley& Sons, New York, 1978.
  • [16] J.M. McCarthy, “The Pentagon worries that spies can see its computer screens, someone could watch what’s on your VDT”, The Wall Street J. 7, 8 (2000).
  • [17] R.L. Allen, Signal Analysis: Time, Frequency, Scale, and Structure, Springer, Berlin, 2004.
  • [18] H. Zeng, “Dual image processing algorithms and parameter optimization”, Seventh Int. Conf. Natural Computation (ICNC) 2, 946-950 (2011), ISSN 2157-9555.
  • [19] D.S. Sohi, Application to Enhance the Teaching and Understanding of Basic Image Processing Techniques, pp. 413-416, ISBN 0-7803-6312-4, Southeastcon, Naswille, 2000.
  • [20] S.K. Mitra, “Image processing using quadratic volterra filters”, 5th Int. Conf. on Computers and Devices for Communication (CODEC) 2012, ISBN 978-1-4673-2619-3 (2012).
  • [21] K. Grzesiak and A. Przybysz, “Emission security of laser printers”, MCC 2010: Military Communications and Information Systems Conf. 1, CD-ROM (2010).
  • [22] M. Domański, Digital Image, Publishing House of WKŁ, Warsaw, 2010.
  • [23] S. Konz, R. Jackson, J. Knowles, and M. Verschelden, “Legible and attractive transparencies”, Ergonomics Int. 88 (2), 549-551 (1988).
  • [24] I. Kubiak, K. Grzesiak, S. Musiał, and A. Przybysz, Electromagnetic Safety Information, Publishing House of Military University of Technology ISBN 978-83-61486-32-9, Warsaw, 2009.
  • [25] I. Kubiak, Results of Measurements and Analyses of Electromagnetic Compatibility of the TETRA System of the Warsaw Police Headquarters in Comparison with Other Systems in Warsaw and Its Vicinity, Military Communication Institute, Warsaw, 2000.
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-ec2336aa-91ab-49bb-b150-482bb9cc6e38
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.