Login / Signup

A robust image encryption technique using dual chaotic map.

Prabir Kumar NaskarAtal Chaudhuri
Published in: Int. J. Electron. Secur. Digit. Forensics (2015)
Keyphrases
  • image encryption
  • chaotic map
  • authentication scheme
  • security analysis
  • piecewise linear
  • wireless communication
  • hash functions
  • low cost
  • secret sharing scheme
  • secret sharing
  • computer simulation