Analysis and improvement of a hash-based image encryption algorithm (Q551119): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q2392002
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Yan Tao Li / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.cnsns.2010.12.016 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2072152672 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5715832 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis and improvement of a chaos-based image encryption algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: A novel image encryption algorithm based on self-adaptive wave transmission / rank
 
Normal rank
Property / cites work
 
Property / cites work: A fast image encryption and authentication scheme based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Image encryption using chaotic coupled map lattices with time-varying delays / rank
 
Normal rank
Property / cites work
 
Property / cites work: An image encryption scheme with a pseudorandom permutation based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: A symmetric image encryption scheme based on 3D chaotic cat maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication Theory of Secrecy Systems* / rank
 
Normal rank

Latest revision as of 07:29, 4 July 2024

scientific article
Language Label Description Also known as
English
Analysis and improvement of a hash-based image encryption algorithm
scientific article

    Statements

    Analysis and improvement of a hash-based image encryption algorithm (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    13 July 2011
    0 references
    0 references
    information security
    0 references
    image encryption
    0 references
    hash algorithm
    0 references
    self-adaptive encryption
    0 references
    0 references
    0 references