Login / Signup
Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps.
Houcemeddine Hermassi
Akram Belazi
Rhouma Rhouma
Safya Belghith
Published in:
Multim. Tools Appl. (2014)
Keyphrases
</>
image encryption
security analysis
chaotic maps
image encryption algorithm
encryption algorithm
image encryption scheme
public key
authentication scheme
security requirements
authentication protocol
smart card
private key
encryption scheme
user authentication
wireless communication