Sign in
BCH Codes with computational approach and its applications in image encryption.
Muhammad Asif
Tariq Shah
Published in:
J. Intell. Fuzzy Syst. (2019)
Keyphrases
</>
image encryption
image encryption scheme
encryption algorithms
authentication scheme
security analysis
cosine transform
chaotic maps
image scrambling
data encryption standard
computer simulation
error correction
private key