The Unwanted Emission Signals in the Context of the Reconstruct Possibility of Data Graphics

Full Text (PDF, 1029KB), PP.1-9

Views: 0 Downloads: 0


Ireneusz Kubiak 1,*

1. Military Communication Institute, Zegrze, 05-130, Poland

* Corresponding author.


Received: 18 Jun. 2014 / Revised: 25 Jul. 2014 / Accepted: 7 Sep. 2014 / Published: 8 Oct. 2014

Index Terms

Image analysis, image reconstruction, text recognition, data processing


In its operation, every electrical device generates electromagnetic disturbance signals. They can be due to the operation of components of the device (step motors, heaters, control circuits, or electronic circuits). Quite often such signals have the characteristics of the data processed on such devices. They can have the form of a text. In each case, such signals are undesirable. However, they can be used to reproduce such data or, in other word, to conduct the process of electromagnetic infiltration. In the case of video signals (graphic mode of a computer, a laser printer), then the reproduced data can be presented in the form of graphic images that can be easily assimilated by people. Such images are transformed in order to find the data that is of interest. Reproduction of such data may lead to a disclosure of classified information.
There are many solutions that should counter the process of reproduction of such data. Such solutions are implemented in the design of equipment and influence, to a lesser or greater extent, the appearance of the equipment, as well as the related organizational methods. A new method that can be used in electromagnetic protection of process data is a software solution. It involves the use of appropriate computer fonts. 
The article presents the possibilities related to shaping the form of video signals. For this purpose, appropriate shapes of the letter characters of computer fonts were recommended. Unlike characters in standard fonts (Arial and Times New Roman), they do not have the unique decorative elements (serif), such as hooks, connectors, heels, arches, and ribbons, and consist of only vertical and horizontal lines [5]. There are no slanted and crooked lines. Due to this, the characters are often very similar. This greatly contributes to the impossibility to differentiate between the letter characters in the reproduced image that is filled with noise and numerous disturbances. The graphic elements being searched, having the form of strings of letters, cannot be read. The digital image processing methods intended to improve the quality of the image are quite ineffective.
In search for graphic characters, such as computer font letter and digit characters, one can use methods based on the similarity of the standard with a portion of the analyzed image. However, when special fonts are used, the correlation method generates many false decisions, which also prevents reading text data.

Cite This Paper

Ireneusz Kubiak,"The Unwanted Emission Signals in the Context of the Reconstruct Possibility of Data Graphics", IJIGSP, vol.6, no.11, pp.1-9, 2014. DOI: 10.5815/ijigsp.2014.11.01


[1]Kubiak I., “Possibilities of reconstruct of data text from unwanted signal emissions using character correlation method – standard DVI”, Telecommunication Review and Telecommunication News, 2014-2-3.

[2]Kubiak I., “Digital processing methods of images and signals in electromagnetic infiltration process”, Image Processing and Communications, vol. 18, no. 1, pp. 5-16, 2013, DOI: 10.2478/v10248-012-0070-7, ISSN: 1425-140X.

[3]Kubiak I., Grzesiak K., Musial S., Przybysz A., ?The generator of half-tone screening for the process of electromagnetic infiltration”, Military University of Technology 2012, ISBN 978-83-62954-28-5.

[4]Kubiak I., “Identification of waveforms for electromagnetic fields on the basis of its measurements within a confined bandwidth of reception”, PhD Thesis 2000. 

[5]Kubiak I., “Analysis methods and digital processing images in electromagnetic infiltration process”, Military University of Technology 2013, ISBN 978-83-62954-86-5.

[6]Richard G. Lyons: Understanding Digital Signal Processing (2nd Edition), 2004.

[7]Zielinski T.: “Digital Signal Processing”, Communication and Transport Publisher, 2009.

[8]Deok J. Park, Kwon M. Nam: “Multiresolution Edge Detection Techniques, Pattern Recognition”, Vol. 28, 1995.

[9]Pratt K.: “Digital Image Processing”, Wiley& Sons, New York 1978.

[10]Michael J. McCarthy, “The Pentagon worries that spies can see its computer screens, someone could watch what’s on your VDT”, The Wall Street Journal, 07.08.2000.

[11]Allen R. L., Mills D., “Signal Analysis: Time, Frequency, Scale, and Structure”, 2004.

[12]Hong Zeng, Dual image processing algorithms and parameter optimization, Seventh International Conference on Natural Computation (ICNC), Shanghai 2011, Conference materials volume 2, p.946-950, ISSN 2157-9555.

[13]Sohi D.S., Application to enhance the teaching and understanding of basic image processing techniques, Southeastcon 2000, Naswille, p. 413-416, ISBN 0-7803-6312-4.

[14]Mitra S.K., Image processing using quadratic volterra filters, 5th International Conference on Computers and Devices for Communication (CODEC), Kolkata 2012, ISBN 978-1-4673-2619-3.

[15]Grzesiak K., Przybysz A., “Emission security of laser printers”, MCC 2010: Military Communications and Information Systems Conference, Wroclaw 2010.