Login / Signup
Comparison of Two Optical Image Encryption Techniques.
Ahmed M. Elshamy
Aziza I. Hussein
Hesham F. A. Hamed
M. A. Abdelghany
Hamdy M. Kelash
Published in:
FSDM (2018)
Keyphrases
</>
image encryption
authentication scheme
security analysis
high security
data encryption standard
encryption algorithms
image encryption scheme
cosine transform
image scrambling
chaotic maps
information systems
image encryption algorithm