Image encryption algorithm based on chaotic mapping
Images are routinely used in diverse areas such as medical, military, science, engineering, art, entertainment, advertising, education as well as training. With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting the confidentiality, inte...
Main Authors: | Salleh, Mazleena (Author), Ibrahim, Subariah (Author), Isnin, Ismail Fauzi (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTM Press,
2003-12.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000) -
Adaptive image steganography based on optimal embedding and robust against chi-square attack
by: Zanganeh, Omid, et al.
Published: (2011) -
Routing protocols based on protocol operations for underwater wireless sensor network: A survey
by: Ahmed, Mukhtiar, et al.
Published: (2018) -
ITRU: NTRU-based cryptosystem using ring of integers
by: Gaithuru, Juliet Nyokabi, et al.
Published: (2017) -
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003)