Research Article

Convolution Neural Network-Based Sensitive Security Parameter Identification and Analysis

Figure 8

Image samples of each trace. Unlike when the output bit streams in Section 4.1 were imaged, the images of the traces were uncharacteristic. Therefore, it is impossible to identify with the naked eye.