Secure image encryption scheme based on polar decomposition and chaotic map.
Oussama NouiAssia BeloucifLemnouar NouiPublished in: Int. J. Inf. Commun. Technol. (2017)
Keyphrases
- image encryption
- chaotic map
- image encryption scheme
- authentication scheme
- security analysis
- private key
- public key
- security requirements
- smart card
- secret sharing
- user authentication
- authentication protocol
- secret key
- multi party
- encryption scheme
- frequency domain
- security issues
- wireless communication
- secret sharing scheme