Towards the growth of image encryption and authentication schemes.
Amitesh Singh RajputNishchol MishraSanjeev Kumar SharmaPublished in: ICACCI (2013)
Keyphrases
- image encryption
- authentication scheme
- security analysis
- high security
- image encryption scheme
- smart card
- chaotic maps
- user authentication
- data encryption standard
- private key
- encryption algorithms
- image scrambling
- elliptic curve cryptography
- authentication protocol
- public key
- image encryption algorithm
- cosine transform
- secret key
- security requirements
- wireless communication
- wireless networks