Skip to main content

Recognition of Electro-Magnetic Information Leakage of Computer Based on Multi-image Blind Deconvolution

  • Conference paper
  • First Online:
Book cover Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

The security problem of screen image leakage from a display unit has become serious with the rapid speed of signal transmission technology. This paper presents a novel investigation on the characteristics of the power line compromising channel. Moreover, a measurement system has been actually developed for the leakage signal analyzing and image reconstruction. In order to overcome the degradation of reconstructed motion images and enhance the reconstructed image quality, a multi-image blind deconvolution method was proposed and test experiments were carried out to verify the effectiveness of the multi-image blind deconvolution algorithm based on the conducted signal from the power line.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Eck, W.V.: Electromagnetic radiation from video display units: an eavesdropping risk? Comput. Secur. 4(85), 269–286 (1985)

    Google Scholar 

  2. Kuhn, M.G.: Eavesdropping attacks on computer displays. Inf. Secur. Summit, 24–25 (2006). Prague

    Google Scholar 

  3. Kuhn, M.G.: Electromagnetic eavesdropping risks of flat-panel displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 88–107. Springer, Heidelberg (2005). doi:10.1007/11423409_7

    Chapter  Google Scholar 

  4. Tanaka, H., Takizawa, O., Yamamura, A.: A trial of the interception of display image using emanation of electromagnetic wave. J. Inst. Image Electron. Eng. Jpn 34(1), 147–155 (2005)

    Google Scholar 

  5. Song, T.L., Jeong, Y.R., Yook, J.G.: Modeling of leaked digital video signal and information recovery rate as a function of SNR. IEEE Trans. Electromagn. Compat. 57(2), 164–172 (2015)

    Article  Google Scholar 

  6. Yu-Lei, D.U., Ying-Hua, L.U., Zhang, J.L.: Eavesdropping the display image from conducted emission on network cable of a PC. J. China Univ. Posts Telecommun. 20, 78–84 (2013)

    Article  Google Scholar 

  7. Miskin, J., Mackay, D.J.C.: Ensemble learning for blind image separation and deconvolution. In: Girolami, M. (ed.) Advances in Independent Component Analysis, pp. 123–141. Springer, London (2000)

    Google Scholar 

  8. Palmer, J.A., Wipf, D.P., Kreutz-Delgado, K., et al.: Variational EM algorithms for non-Gaussian latent variable models. In: International Conference on Neural Information Processing Systems, pp. 1059–1066. MIT Press (2005)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Y410041104) and Special Fund program for strategic technology, Chinese Academy of Sciences, China (No. XDA06010701).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shanjing Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Yang, S., Hu, J., Huang, W. (2017). Recognition of Electro-Magnetic Information Leakage of Computer Based on Multi-image Blind Deconvolution. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_77

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_77

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics