Login / Signup

A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation.

Majid KhanZeeshan Asghar
Published in: Neural Comput. Appl. (2018)
Keyphrases
  • image encryption
  • chaotic map
  • authentication scheme
  • security analysis
  • wireless communication
  • secret sharing scheme
  • secret sharing
  • computer networks
  • piecewise linear