“…However, if the attacker is able to implement this attack, the threat of the encryption system is the largest [13][14]. Given a lot of chaos-based encryption system, many of them cannot resist this attack [15][16], the risk exists in our approach as well. Figure 4 shows the sensitivity experiments based on the approaches in this paper.…”
“…However, if the attacker is able to implement this attack, the threat of the encryption system is the largest [13][14]. Given a lot of chaos-based encryption system, many of them cannot resist this attack [15][16], the risk exists in our approach as well. Figure 4 shows the sensitivity experiments based on the approaches in this paper.…”
“…Secondly, the cross section of the fingers changes slightly. It is possible to get the image block from the vertical of the finger image [10]. Thus, the average gray value of each image block could be obtained.…”
“…For the clustering process, based on the importance, single property clustering could be achieved. During the clustering, stepwise trial method is used for each property [22]. Therefore, the threshold should be determined.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.