Outsourcing chaotic selective image encryption to the cloud with steganography.
Tao XiangJia HuJianglin SunPublished in: Digit. Signal Process. (2015)
Keyphrases
- image encryption
- chaotic map
- chaotic maps
- image encryption algorithm
- image encryption scheme
- cloud computing
- authentication scheme
- security analysis
- chosen plaintext attack
- cosine transform
- encryption algorithms
- wireless communication
- image scrambling
- information systems
- data hiding
- secret sharing scheme
- information security
- wireless networks