Security analysis of a binary image permutation scheme based on Logistic map
Chengqing LiKwok-Tung LoPublished in: CoRR (2009)
Keyphrases
- security analysis
- binary images
- connected components
- gray scale
- security requirements
- mutual authentication
- public key
- high security
- security model
- authentication scheme
- image encryption
- euclidean distance transform
- security properties
- smart card
- encryption scheme
- authentication protocol
- user authentication
- private key
- input image
- gray level images
- distance transformation
- proxy signature scheme
- query processing
- data structure