A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256.
Shuqin ZhuCongxu ZhuWenhong WangPublished in: Entropy (2018)
Keyphrases
- image encryption algorithm
- chaotic systems
- hash functions
- image encryption
- authentication scheme
- chaotic maps
- authentication protocol
- encryption scheme
- secret key
- security analysis
- initial conditions
- adaptive control
- similarity search
- encryption algorithm
- control method
- s box
- particle swarm optimization
- security mechanisms
- cryptographic protocols
- control parameters
- reinforcement learning
- signature scheme
- key distribution
- private key