Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique

Robust protocols are needed to create a secure computing system. Protocols designed without considering various design criteria result in many vulnerabilities. Security has many aspects. The slightest defect in the design processes affects the whole system security. Chaos based image encryption algo...

תיאור מלא

מידע ביבליוגרפי
Main Authors: Zahir Muhammed Ziad Muhammad, Fatih Ozkaynak
פורמט: Article
שפה:English
יצא לאור: IEEE 2019-01-01
סדרה:IEEE Access
נושאים:
גישה מקוונת:https://ieeexplore.ieee.org/document/8769963/