期刊文献+

计算机视频电磁信息泄漏效应研究 被引量:18

The study on video electromagnetic information leakage of computer
下载PDF
导出
摘要 基于计算机电磁辐射的实测结果,对计算机视频信号的电磁辐射机理进行建模,利用计算电磁学的方法计算了计算机视频信号的远场电磁辐射;提出了利用FDTD (时域有限差分) 计算电磁辐射伴随的噪声衰落的方法,表述了随机噪声的时变和远场特性;最后针对具有20dB噪声的泄漏电磁波进行软件模拟处理,利用同步、滤波、锁相、识别和重构等技术获得了再现的文字图像,研究了电磁信息泄漏现象,讨论了有关的规律。 The video signal electromagnetic radiation model is set up based on near-field testing data of computer electromagnetic radiation, and the far-field video electromagnetic radiation is computed using computational electromagnetics method. Further more, the idea to investigate noise propagation that are accompanying with electromagnetic radiation using FDTD method is proposed, and the characteristics of time variant and far-field are elaborated. Then, the electromagnetic radiation with 20dB noise is simulated. At last, the recovered word images are given after the video electromagnetic information leakage is processed with synchronization, correlated filtering, phase lock on, identification and reconstruction technology etc. The characteristics of information leakage is studied and discussed.
出处 《通信学报》 EI CSCD 北大核心 2004年第4期41-48,共8页 Journal on Communications
基金 国家自然科学基金资助项目(60271018)
关键词 TEMPEST 电磁信息泄漏 电磁辐射 信息再现 TEMPEST electromagnetic information leakage electromagnetic radiation information reconstruction
  • 相关文献

参考文献17

  • 1BERKE D. Hidden data transmission by controlling electromagnetic emanations of computers[EB/OL], http://altem.org/berke/tempest/, 2000.
  • 2KUHN M G, ANDERSON R J. Soft Tempest: hidden data transmission using electromagnetic emanations[EB/OL]. http://www.cl.cam.ac.uk/~mgk25/ih98-tempest-slides.pdf,2001.
  • 3ANDERSON R J, KUHN M G Soft TEMPEST-An opportunity for NATO[EB/OL]. http://www.cl.cam.ac.uk, May, 2000.
  • 4VAN E W. Electromagnetic radiation form video display units: an eavesdropping risk?[J]. Computers & Security, 1985, 4: 69-286.
  • 5LU L, NIE Y, ZHANG H J. The electromagnetic leakage and protection for computer[A]. Electromagnetic Compatibility Proceedings,1997 International Symposium on EMC[C]. Beijing, 1997.378-382.
  • 6SMULDERS R The threat of information theft by reception of electromagnetic radiation form RS-232 cables[J]. Computers & Security, 1990, 9: 53-58.
  • 7DEMOULIN B, KONE L, POUDROUX C. Electromagnetic radiation of shielded data transmission lines[A]. Symposium on Electromagnetic Security for Information Protection[C]. Rome, Italy, 1991.163-173.
  • 8LACKEY R J, UPMAL D W. Speakeasy: the military software radio[J]. IEEE Communications Magazine, 1995, 33(5): 56-61.
  • 9CHEN H Y, TARN I Y. Analysis of electromagnetic radiation from a video output amplifier inside a monitor by using FDTD method[J]. IEEE Trans EMC, 1997, 39(4): 394-397.
  • 10王莉,史应文.低频段机箱屏蔽仿真的研究[J].太原理工大学学报,1999,30(3):278-280. 被引量:2

二级参考文献1

  • 1王长青.电磁场计算中的时域有限差分法[M].北京:北京大学出版社,1994.18-30,57-60.

共引文献14

同被引文献108

引证文献18

二级引证文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部