Extraction of the induced gate noise, channel noise, and their correlation in submicron MOSFETs from RF noise measurements

2001 ◽  
Vol 48 (12) ◽  
pp. 2884-2892 ◽  
Author(s):  
Chih-Hung Chen ◽  
M.J. Deen ◽  
Yuhua Cheng ◽  
M. Matloubian
1965 ◽  
Vol 53 (7) ◽  
pp. 728-729
Author(s):  
W.R. Curtice ◽  
L.A. MacKenzie
Keyword(s):  

2001 ◽  
Vol 11 (04) ◽  
pp. 1085-1157 ◽  
Author(s):  
CHIH-HUNG CHEN ◽  
M. JAMAL DEEN

This paper presents a through description of radio frequency (RF) noise characterization and modeling of CMOS transistors. It begins with the definition of the four noise parameter of a two-port network - minimum noise figure (NFmin), equivalent noise resistance (Rn), optimized source impedance (Ropt) and optimized source reactance (Xopt). These four parameters are used in device characterization and it is shown how they can be calculated by using the noise two-port network theory and a circuit simulator. Then two de-embedding procedures are discussed in detail for noise and scattering parameter de-embedding to get rid of the parasitic effects from the probe pads and interconnections in the device-under-test (DUT). Ideally there is no frequency and geometry limitation for the method based on a cascade configuration. Methods to directly extract the channel noise, induced gate noise and their correlation from the RF and noise measurements are developed and the extracted noise sources as a function of frequency and bias condition for different channel lengths a presented. Some design consideration for the design of low noise circuits - how to select the device size, choice of DC bias conditions and design device layout, are presented. Finally, some published noise models for the channel noise, induced gate noise and their correlation are discussed.


Author(s):  
Lars Ohlsson ◽  
Fredrik Lindelow ◽  
Cezar B. Zota ◽  
Matthias Ohlrogge ◽  
Thomas Merkle ◽  
...  

2020 ◽  
Vol 2020 (4) ◽  
pp. 76-1-76-7
Author(s):  
Swaroop Shankar Prasad ◽  
Ofer Hadar ◽  
Ilia Polian

Image steganography can have legitimate uses, for example, augmenting an image with a watermark for copyright reasons, but can also be utilized for malicious purposes. We investigate the detection of malicious steganography using neural networkbased classification when images are transmitted through a noisy channel. Noise makes detection harder because the classifier must not only detect perturbations in the image but also decide whether they are due to the malicious steganographic modifications or due to natural noise. Our results show that reliable detection is possible even for state-of-the-art steganographic algorithms that insert stego bits not affecting an image’s visual quality. The detection accuracy is high (above 85%) if the payload, or the amount of the steganographic content in an image, exceeds a certain threshold. At the same time, noise critically affects the steganographic information being transmitted, both through desynchronization (destruction of information which bits of the image contain steganographic information) and by flipping these bits themselves. This will force the adversary to use a redundant encoding with a substantial number of error-correction bits for reliable transmission, making detection feasible even for small payloads.


Author(s):  
Jinshan Xu ◽  
Z Daniel Deng ◽  
Jayson J Martinez ◽  
Thomas J Carlson ◽  
Joshua R Myers ◽  
...  

AIAA Journal ◽  
1999 ◽  
Vol 37 ◽  
pp. 154-160 ◽  
Author(s):  
Dimitri Papamoschou ◽  
Marco Debiasi

Sign in / Sign up

Export Citation Format

Share Document