Login / Signup
Chaotic image encryption based on circular substitution box and key stream buffer.
Xuanping Zhang
Zhongmeng Zhao
Jiayin Wang
Published in:
Signal Process. Image Commun. (2014)
Keyphrases
</>
image encryption
high security
chaotic map
chaotic maps
image encryption algorithm
image encryption scheme
data encryption standard
security analysis
private key
encryption algorithms
chosen plaintext attack
authentication scheme
cosine transform
data streams
public key
image scrambling
wireless communication