• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document : 40 / 128 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) ÄõµåÆ®¸® ¹æ½ÄÀÇ ÇÁ·¹³Ú¸´ º¯È¯À» ÀÌ¿ëÇÑ ¿µ»óÀÇ ¾Ïȣȭ ±â¹ý
¿µ¹®Á¦¸ñ(English Title) A New Image Encryption Method using Quad-tree based Fresnelet Transform
ÀúÀÚ(Author) ¼­¿µÈ£   ÀÌÀ±Çõ   ±èµ¿¿í   Young-ho Seo   Yoon-hyuk Lee   Dong-wook Kim  
¿ø¹®¼ö·Ïó(Citation) VOL 19 NO. 12 PP. 2933 ~ 2942 (2015. 12)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®¿¡¼­´Â ÀÌ»ê ÇÁ·¹³Ú¸´ º¯È¯(Fresnelet transform, FRNLT)À» ÀÌ¿ëÇÏ¿© 2Â÷¿ø ÀÚ¿¬ ¿µ»óÀÇ Áß¿ä ¼ººÐÀ» ÃßÀûÇÏ°í ¾ÏȣȭÇÏ´Â ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù. FRNLTÀ» ÅëÇؼ­ ¾ò¾îÁø ºÎ´ë¿ªÀÇ Æ¯¼ºÀ» ºÐ¼®ÇÏ¿© ¿µ»óÀ» ¾ÏȣȭÇϱâ À§ÇÑ Á¤º¸¸¦ ÃßÃâÇÑ´Ù. FRNLT ·¹º§, ºÎ´ë¿ªÀÇ ¿¡³ÊÁö, ±×¸®°í ½Ã°¢ÀûÀÎ È¿°ú¸¦ °í·ÁÇÏ¿© ¾Ïȣȭ¸¦ À§ÇÑ ÃÖÀûÈ­µÈ ÁöÁ¡À» µµÃàÇÑ´Ù. ´Ù¾çÇÑ ·¹º§°ú ¾Ïȣȭ ¿µ¿ªÀ» ¼±ÅÃÇÔÀ¸·Î½á ´Ù¾çÇÑ °­µµ·Î ¾Ïȣȭ°¡ °¡´ÉÇÏ´Ù. ¾Ïȣȭ È¿°ú´Â Á¤·®ÀûÀÎ PSNR °á°ú, ¾Ïȣȭ¸¦ À§ÇÑ CPU ½Ã°£, ¾Ïȣȭ ¿µ¿ªÀÇ Å©±â, ±×¸®°í ½Ã°¢ÀûÀÎ ¿µÇâ µîÀÇ Ç×À¸·Î ºÐ¼®ÇÏ¿© °æÇ⼺À» Á¦½ÃÇÑ´Ù. µû¶ó¼­ º°µµÀÇ ºÐ¼®°úÁ¤ ¾øÀÌ º» ³í¹®¿¡¼­ Á¦½ÃµÈ ÆĶó¹ÌÅ͸¦ ÀÌ¿ëÇÏ¿© ÀÀ¿ëºÐ¾ß¿¡ µû¶ó¼­ È¿À²ÀûÀ¸·Î ¾Ïȣȭ¸¦ ¼öÇàÇÒ ¼ö ÀÖ´Ù. ½ÇÇè°á°ú¸¦ »ìÆ캸¸é Lth=4ÀÌ°í Eth=60ÀÎ °æ¿ì¿¡ Àüü µ¥ÀÌÅÍ Áß¿¡¼­ 0.42%¸¸À» ¾ÏȣȭÇÏ¿©µµ ¿ø·¡ÀÇ ¿µÇâÀ» ºÐ°£ÇÒ ¼ö ¾øÀ» ¸¸Å­ ¾Ïȣȭ È¿°ú¸¦ ¾òÀ» ¼ö ÀÖ¾ú´Ù.
¿µ¹®³»¿ë
(English Abstract)
This paper proposes a new method which traces significant element of 2-dimensional natural images and encrypts them by using Fresnelet transform (FRNLT). After analyzing property of the subbands obtained by the FRNLT, we estimated the information for ciphering 2D images. Considering FRNLT levels, energy of subbands, and visual effect, we estimated the optimized point for encryption. By selecting various levels and encrypting region, we can encrypt 2D image with various robustness. Encryption effectiveness was showed by analyzing numerical result, executing time for encryption, area of encrypted region, and visual observation. Therefore encryption for various application can be applied by using the suggested parameters without additional analysis. Identifying the experimental result, in the case of Lth=4 and Eth=60, an image was not recognized through encrypting only 0.42% among the entire data.
Å°¿öµå(Keyword) ¾Ïȣȭ   ÀÌ»ê ÇÁ·¹³Ú¸´ º¯È¯   ÄõµåÆ®¸®   ºÎ´ë¿ª ¿¡³ÊÁö   Encryption   Discrete Fresnelet Transform   Quad Tree   Subband Energy  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå