Author of the publication

Security analysis of a color image encryption based on bit-level and chaotic map.

, , , , , , , , , , and . Multim. Tools Appl., 83 (2): 4133-4149 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-quality color image compression-encryption using chaos and block permutation., , and . J. King Saud Univ. Comput. Inf. Sci., 35 (8): 101660 (September 2023)Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding., and . Expert Syst. Appl., 237 (Part B): 121514 (March 2024)Robust Long-Term Tracking via Localizing Occluders., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (2s): 89:1-89:15 (2023)Boundary region-based variable precision covering rough set models., , , and . Inf. Sci., (2022)Security analysis of a color image encryption based on bit-level and chaotic map., , , , , , , , , and 1 other author(s). Multim. Tools Appl., 83 (2): 4133-4149 (January 2024)Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM., , , , , , , , , and 4 other author(s). Entropy, 24 (10): 1332 (2022)Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos., , , and . Expert Syst. Appl., (2024)Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography., , , , and . J. King Saud Univ. Comput. Inf. Sci., 36 (1): 101871 (January 2024)Localization-Aware Meta Tracker Guided With Adversarial Features., , , , , and . IEEE Access, (2019)Cryptanalyzing an image cipher using multiple chaos and DNA operations., and . J. King Saud Univ. Comput. Inf. Sci., 35 (7): 101612 (July 2023)