Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference28 articles.
1. Bansal R, Chawla R, Gupta S (2016) A comparison of image encryption techniques based on chaotic maps. In: 2016 3Rd international conference on computing for sustainable global development (INDIACom), pp 933–938
2. Borujeni Shahram Etemadi EM (2009) Chaotic image encryption design using tompkins-paige algorithm. In: Mathematical problems in engineering 2009, vol 22, pp 762–652
3. Chen H (2019) Component Fusion Image Encryption Method Based on Composite Chaotic Model 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE). Hohhot, China, pp 493–4934
4. Chen D, Zhu Z, Yang G (2008) An improved image encryption algorithm based on chaos. In: 2008 The 9th international conference for young computer scientists, pp 2792–2796
5. Chidambaram N, et al. (2018) A Logistic Approach to Route Image in a Protected Way-a Skeptimistic Image Image Encryption a Fusion, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献