Login / Signup
Assessment of diverse image encryption mechanisms under prevalent invasion.
Anjali Malik
Sunil Jadav
Shailender Gupta
Published in:
Multim. Tools Appl. (2021)
Keyphrases
</>
image encryption
security analysis
high security
image encryption scheme
chaotic maps
encryption algorithms
data encryption standard
authentication scheme
cosine transform
wireless communication
image scrambling
image encryption algorithm
secret sharing scheme