An efficient and compromise-resilient image encryption scheme for resource-constrained environments.

The secret keys produced by current image cryptosystems, which rely on chaotic sequences, exhibit a direct correlation with the size of the image. As the image dimensions expand, the generation of extensive chaotic sequences in the encryption and decryption procedures becomes more computationally in...

Full description

Bibliographic Details
Main Authors: Abdul Nasir Khan, Abid Mehmood, Muhammad Nasir Mumtaz Bhutta, Iftikhar Ahmed Khan, Atta Ur Rehman Khan
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2024-01-01
Series:PLoS ONE
Online Access:https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0297534&type=printable