Optimizing chaos based image encryption.
Saeed NoshadianAta EbrahimzadeSeyed Javad KazemitabarPublished in: Multim. Tools Appl. (2018)
Keyphrases
- image encryption
- chaotic maps
- image encryption algorithm
- high security
- image encryption scheme
- chaotic map
- authentication scheme
- data encryption standard
- security analysis
- chosen plaintext attack
- cosine transform
- encryption algorithms
- wireless communication
- encryption algorithm
- private key
- public key
- digital images