Login / Signup
Utilizing LFSR and Feistel networks in image encryption.
Sherif H. Abdel Haleem
Ahmed G. Radwan
Salwa K. Abd-El-Hafiz
Published in:
ICECS (2013)
Keyphrases
</>
image encryption
high security
authentication scheme
chaotic maps
image encryption scheme
social networks
cosine transform
data encryption standard
network structure
security analysis
encryption algorithms
image scrambling
wireless networks
computer networks
wireless communication
image encryption algorithm