Ads
-
Related paper
- Analysis of Chaotic Logistic Map used to Generate Secret Keys
- Analysis of Speech Cryptography Based on Segmentation and Chaotic Logistic Map Keys
- Text Files Protection using Chaotic Logistic Keys
- Detailed Analysis of Chaotic Logistic Map Model and Applications
- Improving the Use of Chaotic Keys in Message Cryptography
- Multiple 3D Chaotic Keys to Protect Digital Images
- Mixed Chaotic Keys to Protect Digital Color Image
- Secure Image Encryption Algorithm Based on Playfair using Multiple Secret Keys, Scan Pattern and Pix Transformation
- Securing Digital Image using Modified Chaotic Logistic Key
- A Novel Approach for Transmitting Secret Data Based on Chaotic Map and Spread Spectrum Watermarking in Frequency Domain