A secure image encryption algorithm based on chaotic maps and SHA-3.
Guodong YeXiaoling HuangPublished in: Secur. Commun. Networks (2016)
Keyphrases
- chaotic maps
- image encryption algorithm
- image encryption
- authentication scheme
- security analysis
- image encryption scheme
- encryption scheme
- chaotic systems
- s box
- smart card
- private key
- hash functions
- security issues
- authentication protocol
- encryption algorithm
- sensitive data
- low cost
- secret sharing
- key distribution
- user authentication
- public key
- secret key
- secret sharing scheme
- multi party
- chaotic sequence
- key management
- wireless networks