Image encryption using HC-128 and HC-256 stream ciphers.
Alireza JolfaeiAhmadreza VizandanAbdolrasoul MirghadriPublished in: Int. J. Electron. Secur. Digit. Forensics (2012)
Keyphrases
- image encryption
- high security
- image encryption scheme
- data encryption standard
- authentication scheme
- security analysis
- encryption algorithms
- chaotic maps
- image encryption algorithm
- data streams
- wireless communication
- chosen plaintext attack
- secret sharing scheme
- cosine transform
- image scrambling
- information systems