Login / Signup
A robust image encryption technique using dual chaotic map.
Prabir Kumar Naskar
Atal Chaudhuri
Published in:
Int. J. Electron. Secur. Digit. Forensics (2015)
Keyphrases
</>
image encryption
chaotic map
authentication scheme
security analysis
piecewise linear
wireless communication
hash functions
low cost
secret sharing scheme
secret sharing
computer simulation