An efficient and compromise-resilient image encryption scheme for resource-constrained environments

The secret keys produced by current image cryptosystems, which rely on chaotic sequences, exhibit a direct correlation with the size of the image. As the image dimensions expand, the generation of extensive chaotic sequences in the encryption and decryption procedures becomes more computationally in...

Full description

Saved in:
Bibliographic Details
Published inPloS one Vol. 19; no. 4; p. e0297534
Main Authors Khan, Abdul Nasir, Mehmood, Abid, Bhutta, Muhammad Nasir Mumtaz, Khan, Iftikhar Ahmed, Khan, Atta ur Rehman
Format Journal Article
LanguageEnglish
Published United States Public Library of Science 18.04.2024
Public Library of Science (PLoS)
Subjects
Online AccessGet full text
ISSN1932-6203
1932-6203
DOI10.1371/journal.pone.0297534

Cover

Loading…