Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (12)

Search Parameters:
Keywords = compromising emanation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
10 pages, 409 KiB  
Article
Reconceptualizing Intrauterine Resuscitation and Its Short-Term Impact
by Lawrence D. Devoe, David W. Britt, Christian R. Macedonia, Jaqueline M. Worth, George M. Mussalli, Myriam Mondestin-Sorrentino and Mark I. Evans
Diagnostics 2025, 15(3), 255; https://doi.org/10.3390/diagnostics15030255 - 23 Jan 2025
Viewed by 878
Abstract
Objective: Intrauterine resuscitation (IR) may be employed during labor to reduce emergency deliveries with concerns for fetal wellbeing emanating mostly from increased uterine contraction frequency and/or intensity. However, there is no standard definition of what constitutes IR, and how its impact is [...] Read more.
Objective: Intrauterine resuscitation (IR) may be employed during labor to reduce emergency deliveries with concerns for fetal wellbeing emanating mostly from increased uterine contraction frequency and/or intensity. However, there is no standard definition of what constitutes IR, and how its impact is assessed. Here, we have created two measures of relative IR effectiveness, determined over a two-hour time frame after Pitocin was first initiated, and asked how fetal risk severity at the time of its initiation impacted IR effectiveness and the clinical decisions made. Methods: We analyzed 118 patients receiving Pitocin who underwent IR at least once during labor. Retrospectively, we assessed risk levels using our Fetal Reserve Index version 2 (FRI v2) scores that were calculated in 20 min timeframes. FRIv2 scores include various maternal, obstetric, and fetal risk factors, uterine contraction frequency, and FHR baseline rate, variability, accelerations, and decelerations. We define 3 IR scenarios to assess relative IR effectiveness. (1) No reduction in PIT infusion rates (PITSAME), (2) decreased PIT infusion rates (DPIT), or (3) PIT turned off (PIT OFF). Maternal repositioning and oxygen administration are nearly universal across all types and, therefore, are not considered in groupings. We then created two measures of IR effectiveness by classifying changes in FRI v2 scores over six 20 min windows coincident with and following IR use as (1) “Improvement” (improvement relative to the FRIv2 score at IR initiation) and (2) “Stabilization” (no further decrease in FRI score relative to the FRIv2 score in the sixth 20 min epoch after IR initiation). We evaluated the relative effectiveness of the three PIT options, and to test whether the level of fetal risk at the time of IR initiation affected its short-term effectiveness, FRI v2 risk scores were assigned to one of three groups (Green [1.00–0.625]; Yellow [0.50–0.25]; Red 0.25–0.0]). Higher scores indicate lower risk. Statistical analysis was performed with ANOVA and t- tests. Results: Overall, the first and/or the only initiation of IR resulted in improvement in 71% of cases and stabilization in 78% of cases. The remaining 22% were failures, meaning that the FRIv2 score in the 6th 20 min period was lower than the score at the time of initiation. There were modest, but not statistically significant, differences in effectiveness (improvement or stabilization) by type of IR. There was a trend toward lower IR effectiveness of PIT OFF during IR initiation when compared to PIT continuation or decreased groups. Conclusions: IR initiation or type did not vary significantly by retrospectively calculated levels of fetal risk, showing that wide variation in clinician practices, not necessarily correlated with what we believe actual risk was, determine how IR was used. The FRI provides contextualization of FHR elements by adding maternal, fetal, and obstetric risk factors, and increased uterine activity enables a more rigorous and reproducible approach to analysis of emerging fetal compromise and IR effectiveness. As practice has shifted from the over-aggressiveness of PIT use to now premature discontinuations with any tracing variation, we need better metrics. FRIv2 further improves its physiologic underpinnings. Thus, we propose a new approach to the overall assessment of IR practice. Full article
(This article belongs to the Special Issue Diagnosis and Management in Prenatal Medicine, 3rd Edition)
Show Figures

Figure 1

19 pages, 26982 KiB  
Article
Detection of the Compromising Audio Signal by Analyzing Its AM Demodulated Spectrum
by Alexandru Madalin Vizitiu, Lidia Dobrescu, Bogdan Catalin Trip, Vlad Florian Butnariu, Cristian Molder and Simona Viorica Halunga
Symmetry 2024, 16(2), 209; https://doi.org/10.3390/sym16020209 - 9 Feb 2024
Cited by 4 | Viewed by 1775
Abstract
The information technology and communication (IT&C) market consists of computing and telecommunication technology systems, which also include a variety of audio devices. Preserving the confidentiality of transmitted information through these devices stands as a critical concern across various domains and businesses. Notably, spurious [...] Read more.
The information technology and communication (IT&C) market consists of computing and telecommunication technology systems, which also include a variety of audio devices. Preserving the confidentiality of transmitted information through these devices stands as a critical concern across various domains and businesses. Notably, spurious electromagnetic emanations emitted by audio devices can be captured and processed, potentially leading to eavesdropping incidents. The evaluation of electronic devices for potential security vulnerabilities often involves employing Transient Electromagnetic Pulse Emanation Standard (TEMPEST) technology. This paper introduces a novel approach to TEMPEST testing specifically tailored for audio devices. The outcomes of the proposed approach offer valuable insights into TEMPEST equipment testing, aiming to mitigate the potential risks posed by threats exploitable by eavesdroppers in everyday scenarios. The present work delves into the examination of two ubiquitous global electronic devices: a notebook and a pair of in-ear headphones. The symmetrical framework of this study arises from the intrinsic similarity that, despite belonging to distinct categories, both devices possess the capability to emit electromagnetic emissions that contain compromised audio signals. This assertion is substantiated by the measurement results presented herein. The proposed methodology involves the analysis of the audio amplitude modulation (AM) demodulated signal in the frequency domain. This innovative approach not only mitigates operator fatigue but also significantly reduces the testing time required for these devices and instrument running hours and leads to the development of new applications. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

21 pages, 5611 KiB  
Article
Molecular Basis of XRN2-Deficient Cancer Cell Sensitivity to Poly(ADP-ribose) Polymerase Inhibition
by Talysa Viera, Quinn Abfalterer, Alyssa Neal, Richard Trujillo and Praveen L. Patidar
Cancers 2024, 16(3), 595; https://doi.org/10.3390/cancers16030595 - 30 Jan 2024
Cited by 2 | Viewed by 2134
Abstract
R-loops (RNA–DNA hybrids with displaced single-stranded DNA) have emerged as a potent source of DNA damage and genomic instability. The termination of defective RNA polymerase II (RNAPII) is one of the major sources of R-loop formation. 5′-3′-exoribonuclease 2 (XRN2) promotes genome-wide efficient RNAPII [...] Read more.
R-loops (RNA–DNA hybrids with displaced single-stranded DNA) have emerged as a potent source of DNA damage and genomic instability. The termination of defective RNA polymerase II (RNAPII) is one of the major sources of R-loop formation. 5′-3′-exoribonuclease 2 (XRN2) promotes genome-wide efficient RNAPII termination, and XRN2-deficient cells exhibit increased DNA damage emanating from elevated R-loops. Recently, we showed that DNA damage instigated by XRN2 depletion in human fibroblast cells resulted in enhanced poly(ADP-ribose) polymerase 1 (PARP1) activity. Additionally, we established a synthetic lethal relationship between XRN2 and PARP1. However, the underlying cellular stress response promoting this synthetic lethality remains elusive. Here, we delineate the molecular consequences leading to the synthetic lethality of XRN2-deficient cancer cells induced by PARP inhibition. We found that XRN2-deficient lung and breast cancer cells display sensitivity to two clinically relevant PARP inhibitors, Rucaparib and Olaparib. At a mechanistic level, PARP inhibition combined with XRN2 deficiency exacerbates R-loop and DNA double-strand break formation in cancer cells. Consistent with our previous findings using several different siRNAs, we also show that XRN2 deficiency in cancer cells hyperactivates PARP1. Furthermore, we observed enhanced replication stress in XRN2-deficient cancer cells treated with PARP inhibitors. Finally, the enhanced stress response instigated by compromised PARP1 catalytic function in XRN2-deficient cells activates caspase-3 to initiate cell death. Collectively, these findings provide mechanistic insights into the sensitivity of XRN2-deficient cancer cells to PARP inhibition and strengthen the underlying translational implications for targeted therapy. Full article
(This article belongs to the Collection Genome Maintenance in Cancer Biology and Therapy)
Show Figures

Figure 1

23 pages, 2549 KiB  
Article
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning
by Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
Future Internet 2024, 16(2), 45; https://doi.org/10.3390/fi16020045 - 29 Jan 2024
Cited by 2 | Viewed by 1964
Abstract
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, or electromagnetic emanation, to compromise cryptographic [...] Read more.
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, or electromagnetic emanation, to compromise cryptographic operations and extract the secret key. This work presents a side channel analysis of a cryptographic hardware accelerator for the Elliptic Curve Scalar Multiplication operation, implemented in a Field-Programmable Gate Array and as an Application-Specific Integrated Circuit. The presented framework consists of initial key extraction using a state-of-the-art statistical horizontal attack and is followed by regularized Artificial Neural Networks, which take, as input, the partially incorrect key guesses from the horizontal attack and correct them iteratively. The initial correctness of the horizontal attack, measured as the fraction of correctly extracted bits of the secret key, was improved from 75% to 98% by applying the iterative learning. Full article
Show Figures

Figure 1

34 pages, 39340 KiB  
Article
An RGB Pseudo-Colorization Method for Filtering of Multi-Source Graphical Data
by Ireneusz Kubiak and Artur Przybysz
Electronics 2023, 12(22), 4583; https://doi.org/10.3390/electronics12224583 - 9 Nov 2023
Cited by 2 | Viewed by 1722
Abstract
Artificial colorization (pseudo-colorization) is a commonly used method to improve the readability of images obtained from sources (sensors) that do not reflect the original color of the object of observation (e.g., X-ray). It is designed to draw the observer’s attention to the important [...] Read more.
Artificial colorization (pseudo-colorization) is a commonly used method to improve the readability of images obtained from sources (sensors) that do not reflect the original color of the object of observation (e.g., X-ray). It is designed to draw the observer’s attention to the important details of the analyzed image (e.g., disease changes in medical imaging). Analogous needs occur in the process of assessing the emission security (EMSEC) of imaging devices used to process classified information, which is made on the basis of the analysis of images reproduced from compromising emanations related to the operation of these devices. The presence of many graphic elements in an image may reduce the level of perception of the information contained in it. Such images may be very noisy or contain overlapping graphic symbols, the source of which is devices processing graphic information operating in close proximity to each other. The use of various types of measures enabling data filtration at various stages of their processing, e.g., the use of a directional antenna, frequency filtering, point filtering or contextual contrast modification, does not always prove effective. The solution to the filtration problem is the pseudo-colorization of the image. However, the image colorization used based on the typical “Hot”, “Radar” or “Cold” color palettes does not meet the requirements for filtering graphic data from many sources. It is necessary to use a filter that will allow the sharp cut-off of graphic data at the border between the background and the graphic symbol. For the pseudo-colorization process itself, the exponential function as a function of transforming the amplitudes of image pixels from the gray color space to the RGB color space is sufficient. However, the smooth transition of the function shape from zero values to values greater than zero results in a low efficiency of filtering graphic data from noise. In this article, a method of filtering an image based on the pseudo-colorization of its content, i.e., reproduction of a compromising emanation signal level in the RGB value of image pixel color components, was proposed. A quadratic function was proposed as the transformation function. The higher effectiveness of the method based on the use of a square function (compared to the exponential function) was shown by conducting tests on many images, some of which are presented in this article. The proposed solution is a universal approach and can be used in various fields related to image analysis and the need for their filtration. Its universality is related to the possibility of changing function parameters affecting its position on the value axis from 0 to 255, its width, its minimum and its maximum value for each RGB channel. Full article
(This article belongs to the Special Issue Signal, Image and Video Processing: Development and Applications)
Show Figures

Figure 1

16 pages, 2114 KiB  
Article
Perforated Concave Earplug (pCEP): A Proof-of-Concept Earplug to Improve Sound Localization without Compromising Noise Attenuation
by Nir Fink, Rachel Levitas, Arik Eisenkraft, Linn Wagnert-Avraham, S. David Gertz and Leah Fostick
Sensors 2023, 23(17), 7410; https://doi.org/10.3390/s23177410 - 25 Aug 2023
Cited by 1 | Viewed by 1622
Abstract
Combat soldiers are currently faced with using a hearing-protection device (HPD) at the cost of adequately detecting critical signals impacting mission success. The current study tested the performance of the Perforated-Concave-Earplug (pCEP), a proof-of-concept passive HPD consisting of a concave bowl-like rigid structure [...] Read more.
Combat soldiers are currently faced with using a hearing-protection device (HPD) at the cost of adequately detecting critical signals impacting mission success. The current study tested the performance of the Perforated-Concave-Earplug (pCEP), a proof-of-concept passive HPD consisting of a concave bowl-like rigid structure attached to a commercial roll-down earplug, designed to improve sound localization with minimal compromising of noise attenuation. Primarily intended for combat/military training settings, our aim was an evaluation of localization of relevant sound sources (single/multiple gunfire, continuous noise, spoken word) compared to 3M™-Combat-Arms™4.1 earplugs in open-mode and 3M™-E-A-R™-Classic™ earplugs. Ninety normal-hearing participants, aged 20–35 years, were asked to localize stimuli delivered from monitors evenly distributed around them in no-HPD and with-HPD conditions. The results showed (1) localization abilities worsened using HPDs; (2) the spoken word was localized less accurately than other stimuli; (3) mean root mean square errors (RMSEs) were largest for stimuli emanating from rear monitors; and (4) localization abilities corresponded to HPD attenuation levels (largest attenuation and mean RMSE: 3M™-E-A-R™-Classic™; smallest attenuation and mean RMSE: 3M™-Combat-Arms™4.1; pCEP was mid-range on both). These findings suggest that the pCEP may benefit in military settings by providing improved sound localization relative to 3M™ E-A-R™-Classic™ and higher attenuation relative to 3M™-Combat Arms™-4.1, recommending its use in noisy environments. Full article
(This article belongs to the Section Biomedical Sensors)
Show Figures

Figure 1

27 pages, 26738 KiB  
Article
Pseudo-Coloring as an Effective Tool to Improve the Readability of Images Obtained in an Electromagnetic Infiltration Process
by Ireneusz Kubiak and Artur Przybysz
Appl. Sci. 2023, 13(17), 9496; https://doi.org/10.3390/app13179496 - 22 Aug 2023
Cited by 3 | Viewed by 1926
Abstract
The article presents a method of improving the readability of images obtained in the process of electromagnetic infiltration for sources processing information in a visual form (texts, images). The method uses the so-called technique of pseudo-coloring. The proposed method is based on LUT [...] Read more.
The article presents a method of improving the readability of images obtained in the process of electromagnetic infiltration for sources processing information in a visual form (texts, images). The method uses the so-called technique of pseudo-coloring. The proposed method is based on LUT tables using the exponential function mapping the signal level of the compromising emanations into a point of the RGB color space. The conducted analyses showed that the proposed function determining the coefficients of the LUT table is an effective tool in the process of improving the level of visual perception, i.e., it increases the perception of shapes and the ability to extract elements from the background. In image processing, LUT can be identified as a color map, i.e., a structure that reflects the gray shade of an image pixel into its color representation in the RGB color space. The proposed method assumes the use of exponential functions for this reflection. As an assessment of the effectiveness of the proposed methods of pseudo-coloring images, both a subjective assessment based on the visual perception of a group of observers and an analytical assessment, which was carried out by analyzing the contrast of the assessed images, were adopted. This allowed for the same assessment and usefulness of the proposed function in determining the RGB value in the process of pseudo-coloring of images obtained during electromagnetic infiltration. The obtained results confirmed that the proposed method significantly improves contrast parameter of images, which is also confirmed by the visual assessment of these images. Full article
(This article belongs to the Special Issue Wireless Communication: Applications, Security and Reliability)
Show Figures

Figure 1

18 pages, 2173 KiB  
Article
Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security
by Maxwell Martin, Funlade Sunmola and David Lauder
Sensors 2022, 22(18), 7064; https://doi.org/10.3390/s22187064 - 18 Sep 2022
Viewed by 2205
Abstract
Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of the associated causal factors and their interrelationships. Several factors that [...] Read more.
Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of the associated causal factors and their interrelationships. Several factors that can cause unintentional electromagnetic emanations that can lead to the compromise of ITE have been found in the literature. This paper confirms the list of causal factors reported in previous work, categorizes the factors as belonging to threat, vulnerability, or impact, and develops an interpretive structural model of the vulnerability factors. A participatory modelling approach was used consisting of focus groups of RF engineers. The resulting hierarchical structural model shows the relationships between factors and illustrates their relative significance. The paper concludes that the resulting model can motivate a deeper understanding of the structural relationship of the factors that can be incorporated in the RF engineers’ assessment process. Areas of future work are suggested. Full article
(This article belongs to the Special Issue State of the Art of Security Technology)
Show Figures

Figure 1

18 pages, 16049 KiB  
Article
The Possibility to Recreate the Shapes of Objects on the Basis of Printer Vibration in the Additive Printing Process
by Andrzej Stańczak, Ireneusz Kubiak, Artur Przybysz and Anna Witenberg
Appl. Sci. 2021, 11(11), 5305; https://doi.org/10.3390/app11115305 - 7 Jun 2021
Cited by 3 | Viewed by 3233
Abstract
Information protection is an important safety issue in many human activity fields. Technological advances and related ubiquitous computerization bring new challenges in this area. In particular, the problem concerns the protection of devices against non-invasive acquisition processed information in ICT systems. It is [...] Read more.
Information protection is an important safety issue in many human activity fields. Technological advances and related ubiquitous computerization bring new challenges in this area. In particular, the problem concerns the protection of devices against non-invasive acquisition processed information in ICT systems. It is known that, e.g., VGA, DVI/HDMI interfaces or laser printer formatter systems that process visual signals are the effective sources of compromising electromagnetic emanations. The emission safety of the more and more commonly used 3D printers is less known. In many cases, the disclosure of information about printed objects might constitute an infringement of the state/industrial/commercial secret, copyright, patent protection, etc. In order to analyze the existing threat, a selected printer using FDM technology was tested. During the tests, simple objects were printed to identify the operation of the stepper motor and the movements of the printer head and the printer platform, which are sources of emissions in the secondary channels. The analyses performed focused on finding the correlation between the recorded vibration signals and the printer head movements when an object was printed. It was shown that the analysis of the registered sensitive signal runtimes and their spectrograms allowed to recreate the printed object shape. Three simple objects (a trihedron, a tube and a tetrahedron) were selected for testing because they include elements that allow the four major movements of the printer head to be easily recognized: along the X axis, along the Y axis, along an arc and diagonally (between the X and Y axes). The paper presents the test results and their analyses. Full article
Show Figures

Figure 1

19 pages, 1232 KiB  
Review
The Importance of Oxidative Stress in Determining the Functionality of Mammalian Spermatozoa: A Two-Edged Sword
by Robert J. Aitken and Joel R. Drevet
Antioxidants 2020, 9(2), 111; https://doi.org/10.3390/antiox9020111 - 27 Jan 2020
Cited by 166 | Viewed by 10837
Abstract
This article addresses the importance of oxidative processes in both the generation of functional gametes and the aetiology of defective sperm function. Functionally, sperm capacitation is recognized as a redox-regulated process, wherein a low level of reactive oxygen species (ROS) generation is intimately [...] Read more.
This article addresses the importance of oxidative processes in both the generation of functional gametes and the aetiology of defective sperm function. Functionally, sperm capacitation is recognized as a redox-regulated process, wherein a low level of reactive oxygen species (ROS) generation is intimately involved in driving such events as the stimulation of tyrosine phosphorylation, the facilitation of cholesterol efflux and the promotion of cAMP generation. However, the continuous generation of ROS ultimately creates problems for spermatozoa because their unique physical architecture and unusual biochemical composition means that they are vulnerable to oxidative stress. As a consequence, they are heavily dependent on the antioxidant protection afforded by the fluids in the male and female reproductive tracts and, during the precarious process of insemination, seminal plasma. If this antioxidant protection should be compromised for any reason, then the spermatozoa experience pathological oxidative damage. In addition, situations may prevail that cause the spermatozoa to become exposed to high levels of ROS emanating either from other cells in the immediate vicinity (particularly neutrophils) or from the spermatozoa themselves. The environmental and lifestyle factors that promote ROS generation by the spermatozoa are reviewed in this article, as are the techniques that might be used in a diagnostic context to identify patients whose reproductive capacity is under oxidative threat. Understanding the strengths and weaknesses of ROS-monitoring methodologies is critical if we are to effectively identify those patients for whom treatment with antioxidants might be considered a rational management strategy. Full article
(This article belongs to the Special Issue Reactive Oxygen Species and Male Fertility)
Show Figures

Graphical abstract

14 pages, 12505 KiB  
Article
LED Arrays of Laser Printers as Valuable Sources of Electromagnetic Waves for Acquisition of Graphic Data
by Ireneusz Kubiak and Joe Loughry
Electronics 2019, 8(10), 1078; https://doi.org/10.3390/electronics8101078 - 23 Sep 2019
Cited by 15 | Viewed by 5127
Abstract
Classified information may be derivable from unintended electromagnetic signals. This article presents a technical analysis of LED arrays used in monochrome computer printers and their contribution to unintentional electromagnetic emanations. Analyses were based on realistic type sizes and distribution of glyphs. Usable pictures [...] Read more.
Classified information may be derivable from unintended electromagnetic signals. This article presents a technical analysis of LED arrays used in monochrome computer printers and their contribution to unintentional electromagnetic emanations. Analyses were based on realistic type sizes and distribution of glyphs. Usable pictures were reconstructed from intercepted radio frequency (RF) emanations. We observed differences in the legibility of information receivable at a distance that we attribute to different ways used by printer designers to control the LED arrays, particularly the difference between relatively high voltage single-ended waveforms and lower-voltage differential signals. To decode the compromising emanations required knowledge of—or guessing—printer operating parameters including resolution, printing speed, and paper size. Measurements were carried out across differences in construction and control of the LED arrays in tested printers. Full article
(This article belongs to the Special Issue Applications of Electromagnetic Waves)
Show Figures

Figure 1

20 pages, 10701 KiB  
Article
The Effectiveness of TMDS Coding in Counteracting the Non-Invasive Acquisition of Graphic Data
by Ireneusz Kubiak and Artur Przybysz
Electronics 2019, 8(10), 1063; https://doi.org/10.3390/electronics8101063 - 20 Sep 2019
Cited by 2 | Viewed by 3620
Abstract
Modern video display terminals commonly use digital video signals. Transition minimized differential signaling (TMDS) coding implemented in video signal transmission using DVI (Digital Visual Interface) standard is commonly used. The aim of the coding scheme adopted by this solution is to eliminate the [...] Read more.
Modern video display terminals commonly use digital video signals. Transition minimized differential signaling (TMDS) coding implemented in video signal transmission using DVI (Digital Visual Interface) standard is commonly used. The aim of the coding scheme adopted by this solution is to eliminate the constant component of the electrical signal, increase the resistance to electromagnetic (EM) interference, and reduce electronic interference between cables. Professionals and hobbyists interested in the problems relating to protecting information against electromagnetic infiltration believe that TMDS coding, in contrast to the VGA (Video Graphics Array) analogue standard, significantly improves the electromagnetic security of processed graphic information. This paper shows a comparison of the abovementioned standards in terms of information protection against electromagnetic infiltration. The paper presents the results of computer simulations and studies dealing with practical compromising emanations for DVI standard and its susceptibility to electromagnetic radiation spying. The obtained results show that the commonly expressed ideas of digital standards being fully secure are false. The obtained test results show that the level of electromagnetic protection can be increased by using appropriate pairs of colors for the text and background. This solution has to be connected with a mode that smooths the edges of graphic signs. Then, the number of frequencies in which valuable emissions exist can be limited. In this paper, pairs of colors for which the level of protection of information can be increased are shown. The authors present their analyses on the basis of the method of colors. The method is connected to possibilities of selection of smoothing modes of edges. As Windows is the most commonly used system in classified work stations (so-called TEMPEST computers), this operating system was considered from the viewpoint of the protection of processed information. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Back to TopTop