Login / Signup
and its applications in image encryption.
Yu-Jie Sun
Hao Zhang
Xing-Yuan Wang
Xiao-Qing Wang
Pengfei Yan
Published in:
Appl. Math. Comput. (2020)
Keyphrases
</>
image encryption
image encryption scheme
security analysis
high security
authentication scheme
data encryption standard
chaotic maps
encryption algorithms
cosine transform
image scrambling
wireless communication
image encryption algorithm
intrusion detection
cost effective
secret sharing scheme
secret sharing