Mayfly optimization with chaos-based image encryption technique for cloud computing environment.
Sheela JustinSathesh Kumar KaruppusamyPublished in: J. Electronic Imaging (2022)
Keyphrases
- image encryption
- cloud computing environment
- chaotic maps
- high security
- chaotic map
- image encryption scheme
- cloud computing
- security analysis
- authentication scheme
- image encryption algorithm
- load balancing
- wireless communication
- image scrambling
- chosen plaintext attack
- wireless sensor networks
- secret sharing scheme
- virtual machine
- smart card
- cost effective
- data mining