A survey on security and efficiency issues in chaotic image encryption.
J. GayathriS. SubashiniPublished in: Int. J. Inf. Comput. Secur. (2016)
Keyphrases
- image encryption
- high security
- chaotic map
- chosen plaintext attack
- image encryption scheme
- chaotic maps
- image encryption algorithm
- encryption algorithms
- image scrambling
- security analysis
- authentication scheme
- security issues
- encryption algorithm
- cosine transform
- private key
- wireless communication
- chaotic sequence
- user authentication
- elliptic curve cryptography
- public key
- smart card
- security level
- intrusion detection
- data encryption
- secret sharing
- initial conditions
- security requirements