High Security Design of 2.4GHz Remote Controller in Car Anti-Theft

2013 ◽  
Vol 273 ◽  
pp. 579-582
Author(s):  
Wen Yi Zhang ◽  
Quan Ying Niu ◽  
Ming Zhe Shang

The effectiveness of car anti-theft relies upon the security of signal from its remote control. However, the signal is easily captured and decrypted for common remote controller. In this paper, the dynamic encryption technology is adopted to enhance the security of signal transmission in the theft-against system. Two random numbers were invoked in the encryption technology. The data was double encrypted according to the two algorithms which were obtained by the two random numbers, respectively. So a same data corresponding to an instruction can be encrypted into a different data. The encrypted data were emitted by NRF24L01. The corresponding instruction was not implemented until the encrypted data were double decrypted by the alarm. The encryption technology can avoid the signal decrypted and coped by the special wireless equipment

2013 ◽  
Vol 2013 ◽  
pp. 1-8 ◽  
Author(s):  
Shih Chung Chen ◽  
Aaron Raymond See ◽  
Yeou Jiunn Chen ◽  
Chia Hong Yeng ◽  
Chih Kuo Liang

People suffering from paralysis caused by serious neural disorder or spinal cord injury also need to be given a means of recreation other than general living aids. Although there have been a proliferation of brain computer interface (BCI) applications, developments for recreational activities are scarcely seen. The objective of this study is to develop a BCI-based remote control integrated with commercial devices such as the remote controlled Air Swimmer. The brain is visually stimulated using boxes flickering at preprogrammed frequencies to activate a brain response. After acquiring and processing these brain signals, the frequency of the resulting peak, which corresponds to the user’s selection, is determined by a decision model. Consequently, a command signal is sent from the computer to the wireless remote controller via a data acquisition (DAQ) module. A command selection training (CST) and simulated path test (SPT) were conducted by 12 subjects using the BCI control system and the experimental results showed a recognition accuracy rate of 89.51% and 92.31% for the CST and SPT, respectively. The fastest information transfer rate demonstrated a response of 105 bits/min and 41.79 bits/min for the CST and SPT, respectively. The BCI system was proven to be able to provide a fast and accurate response for a remote controller application.


2017 ◽  
Vol 26 (2) ◽  
pp. 66-77
Author(s):  
Atheer Hussein Zyara

Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image) by LCG algorithm (which generates a series of random numbers) to generate the encrypted cover (irregular image) , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE


Author(s):  
Ibtisam A. Aljazaery ◽  
Haider Th. Salim Alrikabi ◽  
Mustafa Rabea Aziz

<pre>One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm was proposed to conceal and encrypt data using several means.in order to ensure its preservation from detection and hackers. Wavelet transformer was used to change the shape of a wave of information (one and two-dimensional data) and its different mathematical formulas. Two sets of data were used, the first group used in a hidden process. The second group was considered as a means of both embedding and encryption.  The data in the second group is reduced to the extent of sufficient for the modulation process, by extracting its high-value properties and then removing them from the mother's information wave. The process of encrypting of the two sets of data comes together using an exponential function. The result is undetectable information signals. Algorithms were built to hide and encrypt one and two-dimensional data. High-security signals and images were obtained. Decryption algorithms were built to return encrypted data to their original forms, and getting the replica data.</pre><p> </p>


2013 ◽  
Vol 13 (2) ◽  
pp. 75-81 ◽  
Author(s):  
Bhagwati Prasad ◽  
Kunti Mishra

Abstract The intent of this paper is to propose an encryption compression scheme using multiple chaotic maps along with the concept of Galois field. This method improves the security of the encrypted data and a significant compression is also achieved. The obtained high security architectures are ideal for many real life applications such as medical images, legal documents and military and other operation


2014 ◽  
Vol 556-562 ◽  
pp. 4916-4919
Author(s):  
Shuai Kang ◽  
Guang Yi Luo

Using C51 SCM, a set of simple infrared communication system has been designed through combining with the infrared devices, and infrared wireless communication has been implemented in short distance within the function. It is different with the general infrared remote controller that doesn’t use coding and decoding chip to realize the coding and decoding of the sending and receiving, but through the SCM encoding and decoding procedures to achieve the sending and receiving of infrared signal, so as to realize the communication function of infrared remote control.


2020 ◽  
Vol 75 (12) ◽  
pp. 1025-1037
Author(s):  
Akif Akgul ◽  
Omer Faruk Boyraz ◽  
Karthikeyan Rajagopal ◽  
Emre Guleryuz ◽  
Mustafa Zahid Yildiz ◽  
...  

AbstractIn this paper, we introduce a novel 3D chaotic oscillator which shows megastability without any external excitation. Some important dynamical properties of the proposed novel system were derived and investigated. Data protection application and its security analysis were realized for electrophysiological signals such as ECG, EEG and EMG on a microcomputer. This paper includes both encryption and data hiding processes for high security. Also a user interface was developed. For the encryption process, random numbers were generated by the megastable chaotic oscillator. These random numbers were tested with NIST-800-22 test which is the most widely accepted statistical test suite. The encrypted electrophysiological signals were analyzed by entropy, differential attacks, histogram, correlation, initial condition sensitivity, etc. The results of the analysis have shown that the proposed two level security method can be used in many fields as mobile. The most important feature of this paper is that both encryption and data hiding processes were implemented for electrophysiological signals. The experimental results verify that the proposed method has high security and is suitable for the protection of vital electrophysiological signals.


2019 ◽  
Vol 29 (1) ◽  
pp. 1216-1225 ◽  
Author(s):  
Zeyad Safaa Younus ◽  
Ghada Thanoon Younus

Abstract This paper aims to propose a method for data hiding in video by utilizing the least significant bit (LSB) method and improving it by utilizing the knight tour algorithm for concealing the data inside the AVI video file and using a key function encryption method for encrypting the secret message. First, the secret message is encrypted by utilizing a mathematical equation. The key used in the equation is a set of random numbers. These numbers differ in each implementation to warrant the safety of the hidden message and to increase the security of the secret message. Then, the cover video was converted from a set of frames into separated images to take the advantage of the large size of video file. Afterward, the knight tour algorithm is utilized for random selecting of the pixels inside the frame utilized for embedding the secret message inside it to overcome the shortcoming of the conventional LSB method that utilized the serial selection of pixel and to increase the robustness and security of the proposed method. Afterward, the encrypted secret message is embedded inside the selected pixels by utilizing the LSB method in bits (7 and 8). The observational results have drawn that the proposed method has a superior performance compared to the previous steganography method in terms of quality by a high PSNR of 67.3638 dB and the lowest MSE of 0.2578. Furthermore, this method preserves the security where the secret message cannot be drawn out without knowing the decoding rules.


These days head protectors that spares a huge number of life are disregarded by the bicycle riders prompts demise of numerous lives. So as to keep away from this situation we presented shrewd head protector utilizing pic controller. Signal transmission between the protective cap unit and bicycle unit is utilizing a RF transmitter and recipient unit. Giving wellbeing to an individual while riding the bicycle is our prime concern. By finishing this undertaking it will be obligatory to wear protective cap while riding. The framework what we have wanted to configuration gives answer for this issue of evasion in wearing headgear. This framework additionally gives security to the vehicle as each bicycle will have a one of a kind cap and without which an individual neglects to begin that specific bicycle. This venture incorporates a protective cap body and a coordinated electronic framework arranged in the head protector body. It is worked through a remote control systemMoreover, the parts are separated about the head protector to give even weight appropriation to advance generally speaking parity and wellbeing


Sign in / Sign up

Export Citation Format

Share Document