원문정보
보안공학연구지원센터(IJHIT)
International Journal of Hybrid Information Technology
Vol.9 No.5
2016.05
pp.321-330
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Collection and Process of Vein Image
2.1. Construct Image Smoother
2.2. Light and Dark Areas Extraction of Vein Image
2.3. The Reinforcement of Vein Image
2.4. Selection of Wavelet Basis Function
3. The Encryption Based on Chaotic Vein Images
3.1. Arnolde Mapping
3.2. The Transformation of 2D Logistic Mapping and Baker Transformation
4. Encryption Algorithm Design
5. Simulation Experiment
5.1. Correlation Analysis
5.2. Statistic Analysis
6. Conclusion
References
1. Introduction
2. Collection and Process of Vein Image
2.1. Construct Image Smoother
2.2. Light and Dark Areas Extraction of Vein Image
2.3. The Reinforcement of Vein Image
2.4. Selection of Wavelet Basis Function
3. The Encryption Based on Chaotic Vein Images
3.1. Arnolde Mapping
3.2. The Transformation of 2D Logistic Mapping and Baker Transformation
4. Encryption Algorithm Design
5. Simulation Experiment
5.1. Correlation Analysis
5.2. Statistic Analysis
6. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보