Login / Signup

A secure image encryption algorithm based on hyper-chaotic and bit-level permutation.

Deyun WeiMingjie JiangYang Deng
Published in: Expert Syst. Appl. (2023)
Keyphrases
  • image encryption algorithm
  • s box
  • image encryption
  • chaotic maps
  • authentication scheme
  • chaotic systems
  • security analysis
  • authentication protocol