Login / Signup

Security analysis of image cryptosystems only or partially based on a chaotic permutation.

Houcemeddine HermassiRhouma RhoumaSafya Belghith
Published in: J. Syst. Softw. (2012)
Keyphrases
  • security analysis
  • image data
  • multiscale
  • image representation
  • security requirements
  • public key
  • similarity measure
  • low cost
  • fine grained
  • smart card
  • private key
  • high security