Image and video encryption. From digital rights management to secured personal communication
From MaRDI portal
Publication:1768954
DOI10.1007/b101495zbMath1062.68136OpenAlexW4253377950MaRDI QIDQ1768954
Publication date: 15 March 2005
Published in: Advances in Information Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b101495
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Computing methodologies for image processing (68U10) Data encryption (aspects in computer science) (68P25)
Related Items (3)
A cryptosystem for lossless/lossy grayscale images in IWT domain using chaotic map-based generated key matrices ⋮ Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm ⋮ A new hybrid chaotic map and its application on image encryption and hiding
Uses Software
This page was built for publication: Image and video encryption. From digital rights management to secured personal communication