• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Image encryption using permutation generated by modified Regula-Falsi method.

Aakash PaulShyamalendu KandarBibhas Chandra Dhara
Published in: Appl. Intell. (2022)
Keyphrases
  • similarity measure
  • bit rate
  • lightweight