Login / Signup
A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding.
Yohan Suryanto
Suryadi
Kalamullah Ramli
Published in:
J. Inf. Hiding Multim. Signal Process. (2016)
Keyphrases
</>
image encryption
authentication scheme
chaotic map
chaotic maps
image encryption scheme
image encryption algorithm
high security
chosen plaintext attack
security analysis
smart card
encryption scheme
secret sharing
user authentication
secret key
private key