Your selections:
On the security of permutation-only image encryption schemes
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
Preserving the confidentiality of digital images using a chaotic encryption scheme
- Jolfaei, Alireza, Matinfar, Ahmadreza, Mirghadri, Abdolrasoul
Are you sure you would like to clear your session, including search history and login status?