Security Analysis of an Image Encryption Based on the Kronecker Xor Product, the Hill Cipher and the Sigmoid Logistic Map.
George TeseleanuPublished in: ICISSP (2024)
Keyphrases
- image encryption
- security analysis
- image encryption scheme
- high security
- smart card
- security requirements
- encryption algorithms
- public key
- authentication scheme
- authentication protocol
- user authentication
- encryption scheme
- encryption algorithm
- private key
- access control policies
- secret sharing
- security policies
- computer networks
- data integration