최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국정보통신학회논문지 = Journal of the Korea Institute of Information and Communication Engineering, v.24 no.11, 2020년, pp.1507 - 1518
김기환 (Department of Ubequertus IT, Dongseo University) , 이훈재 (Department of Computer Engineering, Dongseo University)
High-quality images have a lot of information, so sensitive data is stored by encryption for private company, military etc. Encrypted images can only be decrypted with a secret key, but the original data cannot be retained when attacked by the Shear attack and Noise pollution attack techniques that ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Security news, CCTV data deletion to hide negligence is useless! [Internet]. Available: https://www.boannews.com/media/view.asp?idx63311
JoongAng Ilbo, CCTV footage that disappeared one day and the scheme of daycare center directors. [Internet]. Available: https://news.joins.com/article/23493244
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangle, D. Banks, A. Heckert, J. Dray, and S. Vo. "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, Sp 800-22 rev. 1a, 2001.
M. Makoto. "Linear feedback shift register," US Patent No. 5,090,035, to NEC Corp, Patent and Trademark Office, Tokyo, 1992.
S. Liu, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Optics & Laser Technology, vol. 57, pp. 327-342, Apr. 2014.
Y. Liu, J. Wang, J. Fan, and L. Gong, "Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences," Multimedia Tools and Applications, vol. 75, no. 8, pp. 4363-4382, Feb. 2015.
Y. Wu, J. Noonan, and S. Agaian, "NPCR and UACI randomness tests for image encryption," Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications, vol. 1, no. 2, pp. 31-38, Apr. 2011.
X. Wang and J. Yang, "A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system," Optik, vol. 217, no. 164884, May. 2020.
Y. Su, W. X. Su, and Z. Jie, "Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography," Optics and Lasers in Engineering, vol. 128, no. 106042, Jan. 2020.
F. Yang, J. Mou, C. Ma, and Y. Cao, "Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application," Optics and Lasers in Engineering, vol. 129, 106031, Jan. 2020.
C. Pak and L. Huang, "A new color image encryption using combination of the 1D chaotic map," Signal Processing, vol. 138, pp. 129-137, Mar. 2017.
H. Liu and X. Wang, "Image encryption using DNA complementary rule and chaotic maps," Applied Soft Computing, vol. 12, no. 5, pp. 1457-1466, Dec. 2014.
D. E. ElKamchouchi, H. G. Mohamed, and K. H. Moussa, "A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion," Entropy, vol. 22, no. 2, 180, Feb. 2020.
Y. Wan, S. Gu, and B. Du, "A New Image Encryption Algorithm Based on Composite Chaos and Hyperchaos Combined with DNA Coding," Entropy, vol. 22, no. 2, 171, Jan. 2020.
I. Jarin, S. A. Fattah, and C. Shahnaz, "Natural and Medical Image Encryption using Self-Adaptive Permutation and DNA Encoding," in Proceeding of the 2018 IEEE International WIE Conference on Electrical and Computer Engineering, Chonburi: Thailand, pp. 99-102, 2018.
X. Y. Wang and Z. M. Li, "A color image encryption algorithm based on Hopfield chaotic neural network," Optics and Lasers in Engineering, vol. 115, pp. 107-118, Apr. 2019.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.