Login / Signup
Secure visual communication with advanced cryptographic and ımage processing techniques.
Vallikutti Sathananthavathi
K. Ganesh Kumar
M. Sathish Kumar
Published in:
Multim. Tools Appl. (2024)
Keyphrases
</>
key management
cryptographic protocols
security protocols
real time
encryption key
encryption scheme
public key encryption
data processing
digital signature
security properties
stream cipher
hash functions
lightweight
data sets
database
high assurance
homomorphic encryption