Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme.
P. L. ChithraR. AparnaPublished in: Int. J. Inf. Comput. Secur. (2023)
Keyphrases
- image encryption
- high security
- authentication scheme
- security analysis
- image encryption scheme
- chosen plaintext attack
- encryption algorithms
- private key
- image scrambling
- elliptic curve cryptography
- secret sharing scheme
- chaotic maps
- public key
- smart card
- authentication protocol
- security level
- secret sharing
- secret key
- security requirements
- wireless communication
- user authentication
- encryption scheme
- hash functions
- information systems
- key distribution
- elliptic curve
- key management
- security issues
- network security
- wireless networks
- intrusion detection