| The article refers to the field of information extraction technology, which belongs to the branch of TEMPEST technology. On one hand, this technology is available in examining the computer's information security degree as an information processing equipment. It provides essential safeguard preventing the enemy from stealing secrets in economy, national defense and many other kinds of important situations. On the other hand, it's available in getting information. Therefore, from the two aspects of protecting and gaining, it has positive and important strategic meaning to research on the practical application of computer video frequency revelation information interception technology.On the basic of earnestly investigating the present domestic and foreign development situation of electromagnetism divulging information receive technology, the computer's bandwidth video signal, all kinds of narrowband clock signal's time range and frequency range characteristic and the modulation characteristic are analyzed thoroughly. It puts forward the requirements of the divulging video signal being intercept and captured steadily and present the computer showing theory,and the precision of in-phase signal is analysed and calculated.In order to make the non-standard signal of video frequency being shown quickly and steadily,the first step lies in how to auto-produce the in-phase signal that is identical with the real signal. In allusion to this issue,the layer average filters and comb filters are used to wipe off the yamp.And then the goupe filter is made up of by the analogy harr waveform of different scale.It filtrate the video signal with different scale.Then the cryptic character will be distilled in proper scale.The cryptic line character may be distilled by hough transform.The arithmetic of plumb integral projection and level differential coefficient is used to detect phase.The arithmetic bears the trait that it resists yamp well,with the in-phase signal high precision.The intent of showing the divulging video signal being intercept and captured is achieved. |