Citation to this article as recorded by
Aarthie, N. and R. Amirtharajan, 2014. Image encryption: An information security perceptive. J. Artif. Intell., 7: 123-135. CrossRefDirect Link |
Praveenkumar, P., G. Ashwin, S.P.K. Agarwal, S.N. Bharathi, V.S. Venkatachalam, K. Thenmozhi and R. Amirtharajan, 2014. Rubik's cube blend with logistic map on RGB: A way for image encryption. Res. J. Inform. Technol., 6: 207-215. CrossRefDirect Link |
Citation to this article as recorded by
New approach for attack of permutation-based image encryption
schemes International Journal of Computers and Applications |
How to cite this article
Feng Huang and Guixiang Zhang, 2013. A New Image Permutation Approach Using Combinational Chaotic Maps. Information Technology Journal, 12: 835-840.
DOI: 10.3923/itj.2013.835.840
URL: https://scialert.net/abstract/?doi=itj.2013.835.840
DOI: 10.3923/itj.2013.835.840
URL: https://scialert.net/abstract/?doi=itj.2013.835.840