Author of the publication

Reusing the permutation matrix dynamically for efficient image cryptographic algorithm.

, , , , and . Signal Process., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convolutional Neural Networks combined with Runge-Kutta Methods., and . CoRR, (2018)Feature selection and parameter optimization for support vector machines: A new approach based on genetic algorithm with feature chromosomes., , , , and . Expert Syst. Appl., 38 (5): 5197-5204 (2011)Medical image protection using hyperchaos-based encryption., , , and . ISMICT, page 103-107. IEEE, (2015)A New Medical Image Encryption Algorithm Using Multiple 1-D Chaotic Maps., , , , and . SMC, page 2055-2060. IEEE, (2018)An Improved Image Encryption Algorithm Based on Chaotic Maps., , and . ICNC (3), page 189-193. IEEE Computer Society, (2007)Encrypted video search: scalable, modular, and content-similar., , , and . MMSys, page 177-190. ACM, (2022)Boosting Semi-Supervised Semantic Segmentation with Probabilistic Representations., , , , , , and . AAAI, page 2938-2946. AAAI Press, (2023)A new fast color image encryption scheme using chen chaotic system., , , and . SNPD, page 121-126. IEEE Computer Society, (2017)A Chaos-Based Predictive Algorithm for Continuous Aggregate Queries over Data Streams., , , and . FSKD (3), page 391-395. IEEE Computer Society, (2007)0-7695-2874-0.A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy., , , , and . CSS, volume 8300 of Lecture Notes in Computer Science, page 52-66. Springer, (2013)