Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps.
M. EssaidIsmail AkharrazAbderrahim SaaidiAli MouhibPublished in: J. Inf. Secur. Appl. (2019)
Keyphrases
- image encryption scheme
- chaotic maps
- encryption scheme
- image encryption
- authentication scheme
- security analysis
- chaotic sequence
- standard model
- private key
- public key
- secret sharing
- image encryption algorithm
- user authentication
- secret key
- secret sharing scheme
- security requirements
- lightweight
- key management
- smart card
- data sharing
- encryption algorithm
- bit rate
- information security
- cryptographic protocols
- key distribution
- ciphertext
- authentication protocol
- peer to peer
- conflict resolution
- security issues
- lossless compression