Sign in

An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS.

Chandrashekhar MeshramMohammad S. ObaidatAgbotiname Lucky ImoizeIsmail BahkaliParkash TambareKuei-Fang Hsiao
Published in: CCCI (2022)
Keyphrases
  • chaotic maps
  • chaotic sequence
  • image encryption
  • authentication scheme
  • image encryption scheme
  • encryption algorithm
  • security mechanisms
  • security analysis
  • user authentication