2,377 research outputs found

    On the Implementation of Spread Spectrum Fingerprinting in Asymmetric Cryptographic Protocol

    Get PDF
    <p/> <p>Digital fingerprinting of multimedia contents involves the generation of a fingerprint, the embedding operation, and the realization of traceability from redistributed contents. Considering a buyer's right, the asymmetric property in the transaction between a buyer and a seller must be achieved using a cryptographic protocol. In the conventional schemes, the implementation of a watermarking algorithm into the cryptographic protocol is not deeply discussed. In this paper, we propose the method for implementing the spread spectrum watermarking technique in the fingerprinting protocol based on the homomorphic encryption scheme. We first develop a rounding operation which converts real values into integer and its compensation, and then explore the tradeoff between the robustness and communication overhead. Experimental results show that our system can simulate Cox's spread spectrum watermarking method into asymmetric fingerprinting protocol.</p

    Collusion Resistive Framework for Multimedia Security

    Get PDF
    The recent advances in multimedia and Internet technology rises the need for multimedia security.The frequent distribution of multimedia content can cause security breach and violate copyright protection law.The legitimate user can come together to generate illegitimate copy to use it for unintended purpose.The most effective such kind of attack is collusion,involve group of user to contribute with their copies of content to generate a new copy. Fingerprinting,a unique mark is embedded have one to one corresponds with user,is the solution to tackle collusion attack problem.A colluder involve in collusion leaves its trace in alter copy,so the effectiveness of mounting a successful attack lies in how effectively a colluder alter the image by leaving minimum trace.A framework,step by step procedure to tackle collusion attack, involves fingerprint generation and embedding.Various fingerprint generation and embedding techniques are used to make collusion resistive framework effective.Spread spectrum embedding with coded modulation is most effective framework to tackle collusion attack problem.The spread spectrum framework shows high collusion resistant and traceability but it can be attacked with some special collusion attack like interleaving attack and combination of average attack.Various attacks have different post effect on multimedia in different domains. The thesis provide a detail analysis of various collusion attack in different domains which serve as basis for designing the framework to resist collusion.Various statistical and experimental resuslts are drwan to show the behavior of collusion attack.The thesis also proposed a framework here uses modified ECC coded fingerprint for generation and robust watermarking embedding using wave atom.The system shows high collusion resistance against various attack.Various experiments are are drawn and system shows high collusion resistance and much better performance than literature System

    Preprint: Using RF-DNA Fingerprints To Classify OFDM Transmitters Under Rayleigh Fading Conditions

    Full text link
    The Internet of Things (IoT) is a collection of Internet connected devices capable of interacting with the physical world and computer systems. It is estimated that the IoT will consist of approximately fifty billion devices by the year 2020. In addition to the sheer numbers, the need for IoT security is exacerbated by the fact that many of the edge devices employ weak to no encryption of the communication link. It has been estimated that almost 70% of IoT devices use no form of encryption. Previous research has suggested the use of Specific Emitter Identification (SEI), a physical layer technique, as a means of augmenting bit-level security mechanism such as encryption. The work presented here integrates a Nelder-Mead based approach for estimating the Rayleigh fading channel coefficients prior to the SEI approach known as RF-DNA fingerprinting. The performance of this estimator is assessed for degrading signal-to-noise ratio and compared with least square and minimum mean squared error channel estimators. Additionally, this work presents classification results using RF-DNA fingerprints that were extracted from received signals that have undergone Rayleigh fading channel correction using Minimum Mean Squared Error (MMSE) equalization. This work also performs radio discrimination using RF-DNA fingerprints generated from the normalized magnitude-squared and phase response of Gabor coefficients as well as two classifiers. Discrimination of four 802.11a Wi-Fi radios achieves an average percent correct classification of 90% or better for signal-to-noise ratios of 18 and 21 dB or greater using a Rayleigh fading channel comprised of two and five paths, respectively.Comment: 13 pages, 14 total figures/images, Currently under review by the IEEE Transactions on Information Forensics and Securit

    The impact of Rayleigh fading channel effects on the RF-DNA fingerprinting process

    Get PDF
    The Internet of Things (IoT) consists of many electronic and electromechanical devices connected to the Internet. It is estimated that the number of connected IoT devices will be between 20 and 50 billion by the year 2020. The need for mechanisms to secure IoT networks will increase dramatically as 70% of the edge devices have no encryption. Previous research has proposed RF-DNA fingerprinting to provide wireless network access security through the exploitation of PHY layer features. RF-DNA fingerprinting takes advantage of unique and distinct characteristics that unintentionally occur within a given radioโ€™s transmit chain during waveform generation. In this work, the application of RF-DNA fingerprinting is extended by developing a Nelder-Mead-based algorithm that estimates the coefficients of an indoor Rayleigh fading channel. The performance of the Nelder-Mead estimator is compared to the Least Square estimator and is assessed with degrading signal-to-noise ratio. The Rayleigh channel coefficients set estimated by the Nelder-Mead estimator is used to remove the multipath channel effects from the radio signal. The resulting channel-compensated signal is the region where the RF-DNA fingerprints are generated and classified. For a signal-to-noise ratio greater than 21 decibels, an average percent correct classification of more than 95% was achieved in a two-reflector channel

    Digital audio watermarking for broadcast monitoring and content identification

    Get PDF
    Copyright legislation was prompted exactly 300 years ago by a desire to protect authors against exploitation of their work by others. With regard to modern content owners, Digital Rights Management (DRM) issues have become very important since the advent of the Internet. Piracy, or illegal copying, costs content owners billions of dollars every year. DRM is just one tool that can assist content owners in exercising their rights. Two categories of DRM technologies have evolved in digital signal processing recently, namely digital fingerprinting and digital watermarking. One area of Copyright that is consistently overlooked in DRM developments is 'Public Performance'. The research described in this thesis analysed the administration of public performance rights within the music industry in general, with specific focus on the collective rights and broadcasting sectors in Ireland. Limitations in the administration of artists' rights were identified. The impact of these limitations on the careers of developing artists was evaluated. A digital audio watermarking scheme is proposed that would meet the requirements of both the broadcast and collective rights sectors. The goal of the scheme is to embed a standard identifier within an audio signal via modification of its spectral properties in such a way that it would be robust and perceptually transparent. Modification of the audio signal spectrum was attempted in a variety of ways. A method based on a super-resolution frequency identification technique was found to be most effective. The watermarking scheme was evaluated for robustness and found to be extremely effective in recovering embedded watermarks in music signals using a semi-blind decoding process. The final digital audio watermarking algorithm proposed facilitates the development of other applications in the domain of broadcast monitoring for the purposes of equitable royalty distribution along with additional applications and extension to other domains

    Learning Robust Radio Frequency Fingerprints Using Deep Convolutional Neural Networks

    Get PDF
    Radio Frequency Fingerprinting (RFF) techniques, which attribute uniquely identifiable signal distortions to emitters via Machine Learning (ML) classifiers, are limited by fingerprint variability under different operational conditions. First, this work studied the effect of frequency channel for typical RFF techniques. Performance characterization using the multi-class Matthews Correlation Coefficient (MCC) revealed that using frequency channels other than those used to train the models leads to deterioration in MCC to under 0.05 (random guess), indicating that single-channel models are inadequate for realistic operation. Second, this work presented a novel way of studying fingerprint variability through Fingerprint Extraction through Distortion Reconstruction (FEDR), a neural network-based approach for quantifying signal distortions in a relative distortion latent space. Coupled with a Dense network, FEDR fingerprints were evaluated against common RFF techniques for up to 100 unseen classes, where FEDR achieved best performance with MCC ranging from 0.945 (5 classes) to 0.746 (100 classes), using 73% fewer training parameters than the next-best technique

    Physical Layer Defenses Against Primary User Emulation Attacks

    Get PDF
    Cognitive Radio (CR) is a promising technology that works by detecting unused parts of the spectrum and automatically reconfiguring the communication system\u27s parameters in order to operate in the available communication channels while minimizing interference. CR enables efficient use of the Radio Frequency (RF) spectrum by generating waveforms that can coexist with existing users in licensed spectrum bands. Spectrum sensing is one of the most important components of CR systems because it provides awareness of its operating environment, as well as detecting the presence of primary (licensed) users of the spectrum

    Automatic Wi-Fi Fingerprint System based on Unsupervised Learning

    Get PDF
    Recently, smartphones and Wi-Fi appliances have been generalized in daily life, and location-based service(LBS) has gradually been extended to indoor environments. Unlike outdoor positioning, which is typically handled by the global positioning system(GPS), indoor positioning technologies for providing LBSs have been studied with algorithms using various short-range wireless communications such as Wi-Fi, Ultra-wideband, Bluetooth, etc. Fingerprint-based positioning technology, a representative indoor LBS, estimates user locations using the received signal strength indicator(RSSI), indicating the relative transmission power of the access point(AP). Therefore, a fingerprint-based algorithm has the advantage of being robust to distorted wireless environments, such as radio wave reflections and refractions, compared to the time-of-arrival(TOA) method for non-line-of-sight(NLOS), where many obstacles exist. Fingerprint is divided into a training phase in which a radio map is generated by measuring the RSSIs of all indoor APs and positioning phase in which the positions of users are estimated by comparing the RSSIs of the generated radio map in real-time. In the training phase, the user collects the RSSIs of all APs measured at reference points set at regular intervals of 2 to 3m, creating a radio map. In the positioning phase, the reference point, which is most similar to the RSSI, compares the generated radio map from the training phase to the RSSI measured from user movements. This estimates the real-time indoor position. Fingerprint algorithms based on supervised and semi-supervised learning such as support vector machines and principal component analysis are essential for measuring the RSSIs in all indoor areas to produce a radio map. As the building size and the complexity of structures increases, the amount of work and time required also increase. The radio map generation algorithm that uses channel modeling does not require direct measurement, but it requires considerable effort because of building material, three-dimensional reflection coefficient, and numerical modeling of all obstacles. To overcome these problems, this thesis proposes an automatic Wi-Fi fingerprint system that combines an unsupervised dual radio mapping(UDRM) algorithm that reduces the time taken to acquire Wi-Fi signals and leverages an indoor environment with a minimum description length principle(MDLP)-based radio map feedback(RMF) algorithm to simultaneously optimize and update the radio map. The proposed UDRM algorithm in the training phase generates a radio map of the entire building based on the measured radio map of one reference floor by selectively applying the autoencoder and the generative adversarial network(GAN) according to the spatial structures. The proposed learning-based UDRM algorithm does not require labeled data, which is essential for supervised and semi-supervised learning algorithms. It has a relatively low dependency on RSSI datasets. Additionally, it has a high accuracy of radio map prediction than existing models because it learns the indoor environment simultaneously via a indoor two-dimensional map(2-D map). The produced radio map is used to estimate the real-time positioning of users in the positioning phase. Simultaneously, the proposed MDLP-based RMF algorithm analyzes the distribution characteristics of the RSSIs of newly measured APs and feeds the analyzed results back to the radio map. The MDLP, which is applied to the proposed algorithm, improves the performance of the positioning and optimizes the size of the radio map by preventing the indefinite update of the RSSI and by updating the newly added APs to the radio map. The proposed algorithm is compared with a real measurement-based radio map, confirming the high stability and accuracy of the proposed fingerprint system. Additionally, by generating a radio map of indoor areas with different structures, the proposed system is shown to be robust against the change in indoor environment, thus reducing the time cost. Finally, via a euclidean distance-based experiment, it is confirmed that the accuracy of the proposed fingerprint system is almost the same as that of the RSSI-based fingerprint system.|์ตœ๊ทผ ์Šค๋งˆํŠธํฐ๊ณผ Wi-Fi๊ฐ€ ์‹ค์ƒํ™œ์— ๋ณดํŽธํ™”๋˜๋ฉด์„œ ์œ„์น˜๊ธฐ๋ฐ˜ ์„œ๋น„์Šค์— ๋Œ€ํ•œ ๊ฐœ๋ฐœ ๋ถ„์•ผ๊ฐ€ ์‹ค๋‚ด ํ™˜๊ฒฝ์œผ๋กœ ์ ์ฐจ ํ™•๋Œ€๋˜๊ณ  ์žˆ๋‹ค. GPS๋กœ ๋Œ€ํ‘œ๋˜๋Š” ์‹ค์™ธ ์œ„์น˜ ์ธ์‹๊ณผ ๋‹ฌ๋ฆฌ ์œ„์น˜๊ธฐ๋ฐ˜ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•œ ์‹ค๋‚ด ์œ„์น˜ ์ธ์‹ ๊ธฐ์ˆ ์€ Wi-Fi, UWB, ๋ธ”๋ฃจํˆฌ์Šค ๋“ฑ๊ณผ ๊ฐ™์€ ๋‹ค์–‘ํ•œ ๊ทผ๊ฑฐ๋ฆฌ ๋ฌด์„  ํ†ต์‹  ๊ธฐ๋ฐ˜์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์ด ์—ฐ๊ตฌ๋˜๊ณ  ์žˆ๋‹ค. ๋Œ€ํ‘œ์ ์ธ ์‹ค๋‚ด ์œ„์น˜์ธ์‹ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ค‘ ํ•˜๋‚˜์ธ Fingerprint๋Š” ์‚ฌ์šฉ์ž๊ฐ€ ์ˆ˜์‹ ํ•œ AP ์‹ ํ˜ธ์˜ ์ƒ๋Œ€์ ์ธ ํฌ๊ธฐ๋ฅผ ๋‚˜ํƒ€๋‚ด๋Š” RSSI๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์œ„์น˜๋ฅผ ์ถ”์ •ํ•œ๋‹ค. ๋”ฐ๋ผ์„œ Fingerprint๊ธฐ๋ฐ˜์˜ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์žฅ์• ๋ฌผ์ด ๋งŽ์ด ์กด์žฌํ•˜๋Š” ๋น„๊ฐ€์‹œ ๊ฑฐ๋ฆฌ์—์„œ TOA ๋ฐฉ์‹์— ๋น„ํ•ด ์ „ํŒŒ์˜ ๋ฐ˜์‚ฌ ๋ฐ ๊ตด์ ˆ๊ณผ ๊ฐ™์ด ์™œ๊ณก๋œ ๋ฌด์„  ํ™˜๊ฒฝ์— ๊ฐ•์ธํ•˜๋‹ค๋Š” ์žฅ์ ์ด ์žˆ๋‹ค. Fingerprint๋Š” ์‹ค๋‚ด์˜ ๋ชจ๋“  AP์˜ RSSI๋“ค์„ ์ธก์ •ํ•˜์—ฌ Radio map์„ ์ œ์ž‘ํ•˜๋Š” ๊ณผ์ •์ธ ํ•™์Šต ๋‹จ๊ณ„์™€ ์ƒ์„ฑ๋œ Radio map์˜ RSSI๋“ค์„ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ธก์ •๋œ RSSI์™€ ๋น„๊ตํ•˜์—ฌ ์‚ฌ์šฉ์ž์˜ ์œ„์น˜๋ฅผ ์ถ”์ •ํ•˜๋Š” ์œ„์น˜์ธ์‹ ๋‹จ๊ณ„๋กœ ๋‚˜๋ˆ„์–ด์ง„๋‹ค. ํ•™์Šต ๋‹จ๊ณ„์—์„œ๋Š” ์œ„์น˜๋ฅผ ๊ตฌ๋ถ„ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์‚ฌ์šฉ์ž๊ฐ€ 2~3m์˜ ์ผ์ •ํ•œ ๊ฐ„๊ฒฉ์œผ๋กœ ์„ค์ •๋œ ์ฐธ์กฐ ์œ„์น˜๋“ค๋งˆ๋‹ค ์ธก์ •๋˜๋Š” ๋ชจ๋“  AP๋“ค์˜ RSSI๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  Radio map์œผ๋กœ ์ œ์ž‘ํ•œ๋‹ค. ์œ„์น˜์ธ์‹ ๋‹จ๊ณ„์—์„œ๋Š” ํ•™์Šต ๋‹จ๊ณ„์—์„œ ์ œ์ž‘๋œ Radio map๊ณผ ์‚ฌ์šฉ์ž์˜ ์ด๋™์— ์˜ํ•ด ์ธก์ •๋˜๋Š” RSSI์˜ ๋น„๊ต๋ฅผ ํ†ตํ•ด ๊ฐ€์žฅ ์œ ์‚ฌํ•œ RSSI ํŒจํ„ด์„ ๊ฐ€์ง€๋Š” ์ฐธ์กฐ ์œ„์น˜๊ฐ€ ์‹ค์‹œ๊ฐ„ ์‹ค๋‚ด ์œ„์น˜๋กœ ์ถ”์ •๋œ๋‹ค. ์„œํฌํŠธ ๋ฒกํ„ฐ ๋จธ์‹ (SVM), ์ฃผ์„ฑ๋ถ„ ๋ถ„์„(PCA) ๋“ฑ๊ณผ ๊ฐ™์ด ์ง€๋„ ๋ฐ ์ค€์ง€๋„ ํ•™์Šต๊ธฐ๋ฐ˜์˜ Fingerprint ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ Radio map์„ ์ œ์ž‘ํ•˜๊ธฐ ์œ„ํ•ด ๋ชจ๋“  ์‹ค๋‚ด ๊ณต๊ฐ„์—์„œ RSSI์˜ ์ธก์ •์ด ํ•„์ˆ˜์ ์ด๋‹ค. ์ด๋Ÿฌํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์€ ๊ฑด๋ฌผ์ด ๋Œ€ํ˜•ํ™”๋˜๊ณ  ๊ตฌ์กฐ๊ฐ€ ๋ณต์žกํ•ด์งˆ์ˆ˜๋ก ์ธก์ • ๊ณต๊ฐ„์ด ๋Š˜์–ด๋‚˜๋ฉด์„œ ์ž‘์—…๊ณผ ์‹œ๊ฐ„ ์†Œ๋ชจ๊ฐ€ ๋˜ํ•œ ๊ธ‰๊ฒฉํžˆ ์ฆ๊ฐ€ํ•œ๋‹ค. ์ฑ„๋„๋ชจ๋ธ๋ง์„ ํ†ตํ•œ Radio map ์ƒ์„ฑ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์ง์ ‘์ ์ธ ์ธก์ • ๊ณผ์ •์ด ๋ถˆํ•„์š”ํ•œ ๋ฐ˜๋ฉด์— ๊ฑด๋ฌผ์˜ ์žฌ์งˆ, 3์ฐจ์›์ ์ธ ๊ตฌ์กฐ์— ๋”ฐ๋ฅธ ๋ฐ˜์‚ฌ ๊ณ„์ˆ˜ ๋ฐ ๋ชจ๋“  ์žฅ์• ๋ฌผ์— ๋Œ€ํ•œ ์ˆ˜์น˜์ ์ธ ๋ชจ๋ธ๋ง์ด ํ•„์ˆ˜์ ์ด๊ธฐ ๋•Œ๋ฌธ์— ์ƒ๋‹นํžˆ ๋งŽ์€ ์ž‘์—…๋Ÿ‰์ด ์š”๊ตฌ๋œ๋‹ค. ๋”ฐ๋ผ์„œ ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ๋ฌธ์ œ์ ๋“ค์„ ํ•ด๊ฒฐํ•˜๊ณ ์ž ํ•™์Šต ๋‹จ๊ณ„์—์„œ Wi-Fi ์‹ ํ˜ธ์˜ ์ˆ˜์ง‘์‹œ๊ฐ„์„ ์ตœ์†Œํ™”ํ•˜๋ฉด์„œ ์‹ค๋‚ด ํ™˜๊ฒฝ์ด ๊ณ ๋ ค๋œ Unsupervised Dual Radio Mapping(UDRM) ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ ์œ„์น˜์ธ์‹ ๋‹จ๊ณ„์—์„œ Radio map์˜ ์ตœ์ ํ™”๊ฐ€ ๋™์‹œ์— ๊ฐ€๋Šฅํ•œ Minimum description length principle(MDLP)๊ธฐ๋ฐ˜์˜ Radio map Feedback(RMF) ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด ๊ฒฐํ•ฉ๋œ ๋น„์ง€๋„ํ•™์Šต๊ธฐ๋ฐ˜์˜ ์ž๋™ Wi-Fi Fingerprint๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ํ•™์Šต ๋‹จ๊ณ„์—์„œ ์ œ์•ˆํ•˜๋Š” UDRM ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ๋‰ด๋Ÿด ๋„คํŠธ์›Œํฌ ๊ธฐ๋ฐ˜์˜ ๋น„์ง€๋„ ํ•™์Šต ์•Œ๊ณ ๋ฆฌ์ฆ˜์ธ Autoencoder์™€ Generative Adversarial Network (GAN)๋ฅผ ๊ณต๊ฐ„๊ตฌ์กฐ์— ๋”ฐ๋ผ ์„ ํƒ์ ์œผ๋กœ ์ ์šฉํ•˜์—ฌ ํ•˜๋‚˜์˜ ์ฐธ์กฐ ์ธต์—์„œ ์ธก์ •๋œ Radio map์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ฑด๋ฌผ์ „์ฒด์˜ Radio map์„ ์ƒ์„ฑํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๋น„์ง€๋„ ํ•™์Šต ๊ธฐ๋ฐ˜ UDRM ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์ง€๋„ ๋ฐ ์ค€์ง€๋„ ํ•™์Šต์—์„œ ํ•„์ˆ˜์ ์ธ Labeled data๊ฐ€ ํ•„์š”ํ•˜์ง€ ์•Š์œผ๋ฉฐ RSSI ๋ฐ์ดํ„ฐ ์„ธํŠธ์˜ ์˜์กด์„ฑ์ด ์ƒ๋Œ€์ ์œผ๋กœ ๋‚ฎ๋‹ค. ๋˜ํ•œ 2์ฐจ์› ์‹ค๋‚ด ์ง€๋„๋ฅผ ํ†ตํ•ด ์‹ค๋‚ด ํ™˜๊ฒฝ์„ ๋™์‹œ์— ํ•™์Šตํ•˜๊ธฐ ๋•Œ๋ฌธ์— ๊ธฐ์กด์˜ ์˜ˆ์ธก ๋ชจ๋ธ์— ๋น„ํ•ด Radio map์˜ ์˜ˆ์ธก ์ •ํ™•๋„๊ฐ€ ๋†’๋‹ค. ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์— ์˜ํ•ด ์ œ์ž‘๋œ Radio map์€ ์œ„์น˜์ธ์‹ ๋‹จ๊ณ„์—์„œ ์‚ฌ์šฉ์ž์˜ ์‹ค์‹œ๊ฐ„ ์œ„์น˜์ธ์‹์— ์ ์šฉ๋œ๋‹ค. ๋™์‹œ์— ์ œ์•ˆํ•˜๋Š” MDLP ๊ธฐ๋ฐ˜์˜ ์ž๋™ Wi-Fi ์—…๋ฐ์ดํŠธ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์ƒˆ๋กญ๊ฒŒ ์ธก์ •๋˜๋Š” AP๋“ค์˜ RSSI์˜ ๋ถ„ํฌํŠน์„ฑ์„ ๋ถ„์„ํ•˜๊ณ  ๊ทธ ๊ฒฐ๊ณผ๋ฅผ Radio map์— ํ”ผ๋“œ๋ฐฑํ•œ๋‹ค. ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์— ์ ์šฉ๋œ MDLP๋Š” ๋ฌด๋ถ„๋ณ„ํ•œ RSSI์˜ ์—…๋ฐ์ดํŒ…์„ ๋ฐฉ์ง€ํ•˜๊ณ  ์ถ”๊ฐ€๋˜๋Š” AP๋ฅผ Radio map์— ์—…๋ฐ์ดํŠธํ•จ์œผ๋กœ์„œ ์œ„์น˜์ธ์‹์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ณ  Radio map์˜ ํฌ๊ธฐ์˜ ์ตœ์ ํ™”๊ฐ€ ๊ฐ€๋Šฅํ•˜๋‹ค. ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ์‹ค์ œ ์ธก์ •๊ธฐ๋ฐ˜์˜ Radio map๊ณผ ์„œ๋กœ ๋น„๊ต๋ฅผ ํ†ตํ•ด ์ œ์•ˆํ•œ Fingerprint ์‹œ์Šคํ…œ์˜ ๋†’์€ ์•ˆ์ •์„ฑ๊ณผ ์ •ํ™•๋„๋ฅผ ํ™•์ธํ•˜์˜€๋‹ค. ๋˜ํ•œ ๊ตฌ์กฐ๊ฐ€ ๋‹ค๋ฅธ ์‹ค๋‚ด๊ณต๊ฐ„์˜ Radio map ์ƒ์„ฑ ๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด ์‹ค๋‚ด ํ™˜๊ฒฝ ๋ณ€ํ™”์— ๊ฐ•์ธํ•จ๊ณผ ํ•™์Šต ์‹œ๊ฐ„ ์ธก์ •์„ ํ†ตํ•œ ์‹œ๊ฐ„ ๋น„์šฉ์ด ๊ฐ์†Œํ•จ์„ ํ™•์ธํ•˜์˜€๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ Euclidean distance ๊ธฐ๋ฐ˜ ์‹คํ—˜์„ ํ†ตํ•˜์—ฌ ์‹ค์ œ ์ธก์ •ํ•œ RSSI๊ธฐ๋ฐ˜์˜ Fingerprint ์‹œ์Šคํ…œ๊ณผ ์ œ์•ˆํ•œ ์‹œ์Šคํ…œ์˜ ์œ„์น˜์ธ์‹ ์ •ํ™•๋„๊ฐ€ ๊ฑฐ์˜ ์ผ์น˜ํ•จ์„ ํ™•์ธํ•˜์˜€๋‹ค.Contents Contents โ…ฐ Lists of Figures and Tables โ…ฒ Abstract โ…ต Chapter 1 Introduction 01 1.1 Background and Necessity for Research 01 1.2 Objectives and Contents for Research 04 Chapter 2 Wi-Fi Positioning and Unsupervised Learning 07 2.1 Wi-Fi Positioning 07 2.1.1 Wi-Fi Signal and Fingerprint 07 2.1.2 Fingerprint Techniques 15 2.2 Unsupervised Learning 23 2.2.1 Neural Network 23 2.2.2 Autoencoder 28 2.2.3 Generative Adversarial Network 31 Chapter 3 Proposed Fingerprint System 36 3.1 Unsupervised Dual Radio Mapping Algorithm 36 3.2 MDLP-based Radio Map Feedback Algorithm 47 Chapter 4 Experiment and Result 51 4.1 Experimental Environment and Configuration 51 4.2 Results of Unsupervised Dual Radio Mapping Algorithm 56 4.2 Results of MDLP-based Radio Map Feedback Algorithm 69 Chapter 5 Conclusion 79 Reference 81Docto
    • โ€ฆ
    corecore