C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Image encryption using permutation generated by modified Regula-Falsi method.
Aakash Paul
Shyamalendu Kandar
Bibhas Chandra Dhara
Published in:
Appl. Intell. (2022)
Keyphrases
</>
similarity measure
bit rate
lightweight