Publication | Closed Access
An image encryption scheme with a pseudorandom permutation based on chaotic maps
154
Citations
17
References
2010
Year
Hardware SecurityEngineeringSecurity AlgorithmCryptographic ProtectionImage Encryption SchemeCryptographic TechnologyChaotic MapsMultimedia SecurityPseudorandom PermutationData SecurityCryptographyCryptanalysis
| Year | Citations | |
|---|---|---|
Page 1
Page 1