Publication | Closed Access
Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps
40
Citations
21
References
2016
Year
Data Encryption StandardEngineeringCryptographic TechnologyChaotic MapsImage TransmissionDiffusion OperationsComputer ScienceMultimedia SecurityImage EncryptionSecurity AlgorithmCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1