WeChat Mini Program
Old Version Features

Image Encryption with Control Parameter Chaotic Map

International Conference on Computer Engineering and Technology(2010)

Cited 1|Views8
Key words
chaotic communication,cryptography,image processing,brute-force attack,control parameter chaotic map,cryptosystem security,differential attack,entropy attack,image encryption,iteration number,logistic map,statistical character,chaos,image encryption,stream cipher
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined