Author:
Dongre Akansha,Gupta Chetan,Dubey Sonam
Publisher
Springer Nature Singapore
Reference22 articles.
1. Agbedemnab PAN, Baagyere EY, Daabo MI (2019) A new image encryption and decryption technique using genetic algorithm and residual numbers. In: Proceedings of the 2019 IEEE AFRICON, pp 1–9. https://doi.org/10.1109/AFRICON46755.2019.9133919
2. Li S, Li C, Chen G, Dan Z, Nikolaos G, Bourbakis F (2004) A general cryptanalysis of permutation-only multimedia encryption algorithms. IEEE
3. Lee W, Chen T, Chieh Lee C (2003) Improvement of an encryption scheme for binary images. Pak J Inform Technol 2(2):191–200
4. EI-din H, Ahmed H, Kalash HM, Farag Allah OS (2006) Encryption quality analysis of the RC5 block cipher algorithm for digital images. Menoufia University, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menouf-32952, Egypt
5. Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. In: Institution of Image Processing Xi'an Jiaotong University, Shaanxi, This paper appears in: Circuits and Systems, ISCAS 2002. IEEE International Symposium, vol 2, pp 708–711