News
As governments renew their push for encryption access, practitioners on the front lines argue that trust, privacy, and ...
In substitution operations, the pixel values of the sub-images are changed with the help of XOR and circular shift operators with appropriate keys. In permutation operation, the position of the pixels ...
To address this, a novel encryption method for medical ... initializes by processing the original image through the Secure Hash Algorithm (SHA) to derive the initial conditions for the Chen chaotic ...
1 School of Computer Science and Technology, Changsha University of Science and Technology, Changsha, China 2 School of Information Engineering, Changsha Medical University, Changsha, China With the ...
Abstract: In this paper, an image encryption algorithm based on Ikeda and Henon chaotic maps is presented. One of the most used in image encryption techniques which is shuffling and diffusion ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results