Multidimensional comparative analysis of image encryption using gauss iterated and logistic maps


Multimedia data are transferred through various networks for personal and professional uses. Hence, everyone wants to send or receive the data in a secure manner without any interruption or modification. In general, data security is done using cryptographic techniques or chaotic techniques. This paper focuses on an image encryption technique using… (More)

7 Figures and Tables


  • Presentations referencing similar topics