Login / Signup
Image encryption using the two-dimensional logistic chaotic map.
Yue Wu
Gelan Yang
Huixia Jin
Joseph P. Noonan
Published in:
J. Electronic Imaging (2012)
Keyphrases
</>
image encryption
chaotic map
authentication scheme
security analysis
wireless communication
fault tolerant
secret sharing scheme
wireless networks
secret key
private key