A secure image encryption scheme based on three different chaotic maps.
Supriyo DeJaydeb BhaumikDebasis GiriPublished in: Multim. Tools Appl. (2022)
Keyphrases
- image encryption scheme
- chaotic maps
- image encryption
- encryption scheme
- authentication scheme
- security analysis
- chaotic sequence
- private key
- image encryption algorithm
- standard model
- smart card
- secret key
- data sharing
- security requirements
- encryption algorithm
- user authentication
- public key
- secret sharing
- secret sharing scheme
- authentication protocol
- ciphertext
- key distribution
- wireless communication
- lightweight