Author of the publication

A novel combination of information confidentiality and data hiding mechanism.

, , , and . Multim. Tools Appl., 82 (5): 6917-6941 (February 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication., , , , , and . IEEE Access, (2024)Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map., , , , and . Math. Comput. Simul., (2021)Efficient and secure image encryption using key substitution process with discrete wavelet transform., , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (7): 101613 (July 2023)An Efficient Audio Encryption Scheme Based on Finite Fields., , , , , and . IEEE Access, (2021)A Novel Scheme of Image Encryption Based on Elliptic Curves Isomorphism and Substitution Boxes., , , , and . IEEE Access, (2021)Cryptanalysis of Internet of Health Things Encryption Scheme Based on Chaotic Maps., , , , , , and . IEEE Access, (2021)Integration of Spatial and Frequency Domain Encryption for Digital Images., , , and . IEEE Access, (2021)Construction of S-Boxes Using Different Maps Over Elliptic Curves for Image Encryption., , , , and . IEEE Access, (2021)New image encryption scheme based on Arnold map and cuckoo search optimization algorithm., , , , and . Multim. Tools Appl., 82 (5): 7419-7441 (February 2023)New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes., , , , and . Multim. Tools Appl., 82 (5): 6943-6964 (February 2023)