Author:
Ghosh Gopal,Anand Divya,Kavita ,Verma Sahil,Jhanjhi N. Z.,Talib M. N.
Reference20 articles.
1. Stinson DR, Paterson M (2018) Cryptography: theory and practice. CRC Press
2. Fridrich J (1997) Image encryption based on chaotic maps. In: 1997 IEEE international conference on systems, man, and cybernetics. Computational cybernetics and simulation, vol 2. IEEE, pp 1105–1110
3. Yang G, Jan MA, Rehman AU, Babar M, Aimal MM, Verma S (2020) Interoperability and data storage in internet of multimedia things: investigating current trends, research challenges and future directions. IEEE Access 8:124382–124401
4. Sobhy MI, Shehata AE (2001) Methods of attacking chaotic encryption and countermeasures. In: 2001 IEEE international conference on acoustics, speech, and signal processing. Proceedings (Cat. No. 01CH37221), vol. 2. IEEE, pp 1001–1004
5. Belkhouche F, Qidwai U (2003) Binary image encoding using 1D chaotic maps. In: Annual technical conference IEEE region 5. IEEE, pp 39–43
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Improve Business Processes by Implementing Decision Trees (DT);2023 6th International Conference on Contemporary Computing and Informatics (IC3I);2023-09-14
2. Atrial fibrillation medical image encryption algorithm based on deep learning and adaptive block;International Journal of Communication Networks and Distributed Systems;2023
3. Hybrid Watermarking and Encryption Techniques for Securing Medical Images;Computer Systems Science and Engineering;2023
4. Hybrid security scheme for a colored image using DNA and chaotic map;2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS);2022-11-12
5. Data Mining Model Framework for GTD (Global Terrorism Database);2022 International Conference on Cyber Resilience (ICCR);2022-10-06