Introducing real-time image encryption technology using key vault, various transforms, and phase masks.
Poonam YadavHukum SinghKavita KhannaPublished in: Multim. Tools Appl. (2023)
Keyphrases
- image encryption
- high security
- real time
- data encryption standard
- authentication scheme
- security analysis
- encryption algorithms
- private key
- image encryption scheme
- chaotic maps
- key technologies
- cosine transform
- cost effective
- public key
- low cost
- image encryption algorithm
- compression ratio
- smart card
- cryptographic algorithms
- image scrambling
- information systems