Image Encryption through Using Chaotic Function and Graph.
Sa'ed FaridniaKarim FaezPublished in: ICCVG (1) (2010)
Keyphrases
- image encryption
- chaotic map
- image encryption scheme
- chaotic maps
- image encryption algorithm
- chaotic sequence
- high security
- security analysis
- chosen plaintext attack
- authentication scheme
- image scrambling
- data encryption standard
- piecewise linear
- encryption algorithms
- cosine transform
- chaotic systems
- private key
- user authentication
- secret sharing scheme
- secret key
- wireless communication