Login / Signup

Performance evaluation of DCSK system with chaotic maps.

Suwa KimJunyeong BokHeung-Gyoon Ryu
Published in: ICOIN (2013)
Keyphrases
  • chaotic maps
  • image encryption
  • image encryption algorithm
  • image encryption scheme
  • encryption algorithm
  • chaotic sequence
  • security analysis
  • intrusion detection