Secure searchable image encryption in cloud using hyper chaos.
Shaheen AyyubPraveen KaushikPublished in: Int. Arab J. Inf. Technol. (2019)
Keyphrases
- image encryption
- chaotic map
- authentication scheme
- security analysis
- high security
- private key
- cloud computing
- image encryption scheme
- public key
- secret sharing
- chaotic maps
- user authentication
- smart card
- security requirements
- encryption algorithms
- authentication protocol
- cosine transform
- image encryption algorithm
- secret key
- encryption algorithm
- digital libraries
- encryption scheme
- image scrambling
- standard model
- key management
- digital images
- information systems
- signature scheme