Image encryption using fractional integral transforms: Vulnerabilities, threats, and future scope.
Gurpreet KaurRekha AgarwalVinod PatidarPublished in: Frontiers Appl. Math. Stat. (2022)
Keyphrases
- image encryption
- information security
- countermeasures
- security vulnerabilities
- authentication scheme
- chaotic maps
- security issues
- security analysis
- image encryption scheme
- encryption algorithms
- buffer overflow
- cosine transform
- wireless communication
- image scrambling
- data encryption standard
- image encryption algorithm
- security risks
- public key
- smart card
- wireless networks
- e government