An efficient and compromise-resilient image encryption scheme for resource-constrained environments
The secret keys produced by current image cryptosystems, which rely on chaotic sequences, exhibit a direct correlation with the size of the image. As the image dimensions expand, the generation of extensive chaotic sequences in the encryption and decryption procedures becomes more computationally in...
Saved in:
Published in | PloS one Vol. 19; no. 4; p. e0297534 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
United States
Public Library of Science
18.04.2024
Public Library of Science (PLoS) |
Subjects | |
Online Access | Get full text |
ISSN | 1932-6203 1932-6203 |
DOI | 10.1371/journal.pone.0297534 |
Cover
Loading…