Login / Signup

Image encryption using the two-dimensional logistic chaotic map.

Yue WuGelan YangHuixia JinJoseph P. Noonan
Published in: J. Electronic Imaging (2012)
Keyphrases
  • image encryption
  • chaotic map
  • authentication scheme
  • security analysis
  • wireless communication
  • fault tolerant
  • secret sharing scheme
  • wireless networks
  • secret key
  • private key