News

As governments renew their push for encryption access, practitioners on the front lines argue that trust, privacy, and ...
In substitution operations, the pixel values of the sub-images are changed with the help of XOR and circular shift operators with appropriate keys. In permutation operation, the position of the pixels ...
To address this, a novel encryption method for medical ... initializes by processing the original image through the Secure Hash Algorithm (SHA) to derive the initial conditions for the Chen chaotic ...
1 School of Computer Science and Technology, Changsha University of Science and Technology, Changsha, China 2 School of Information Engineering, Changsha Medical University, Changsha, China With the ...
Abstract: In this paper, an image encryption algorithm based on Ikeda and Henon chaotic maps is presented. One of the most used in image encryption techniques which is shuffling and diffusion ...