Research Article

Citations for "Image Encryption: An Information Security Perceptive"


Citation to this article as recorded by ASCI logo


Praveenkumar, P., G.U. Priyanga, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2015. Chain of shuffling and chaos: A tied encryptic approach. Asian J. Scient. Res., 8: 359-366.
CrossRef  |  Direct Link  |  

Praveenkumar, P., P. Rajalakshmi, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2016. Horse DNA runs on image: A novel road to image encryption. Res. J. Inform. Technol., 8: 1-9.
CrossRef  |  Direct Link  |  

Praveenkumar, P., R. Nisha, K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2016. Image merger encryptor: A chaotic and chebyshev key approach. Res. J. Inform. Technol., 8: 10-16.
CrossRef  |  Direct Link  |  


Citation to this article as recorded by Crossref logo


Two-Round Symmetric Cryptography for Medical Image Infosecurity Against-Hacker Attacks in a Picture Archiving and Communication System
IEEE Access

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved