Combined image encryption and steganography technique for enhanced security using multiple chaotic maps.
H. AparnaJ. MadhumithaPublished in: Comput. Electr. Eng. (2023)
Keyphrases
- image encryption
- chaotic maps
- security analysis
- authentication scheme
- image scrambling
- image encryption scheme
- encryption algorithm
- image encryption algorithm
- private key
- information security
- security requirements
- user authentication
- smart card
- security issues
- encryption scheme
- chaotic sequence
- authentication protocol
- access control
- network security
- intrusion detection