Login / Signup
Security analysis of image cryptosystems only or partially based on a chaotic permutation.
Houcemeddine Hermassi
Rhouma Rhouma
Safya Belghith
Published in:
J. Syst. Softw. (2012)
Keyphrases
</>
security analysis
image data
multiscale
image representation
security requirements
public key
similarity measure
low cost
fine grained
smart card
private key
high security