53
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Chaos based image encryption security in cloud computing

, , , , &

References

  • Meena, G., & Choudhary, S. (2019). Biometric authentication in internet of things: A conceptual view. Journal of Statistics and Management Systems, 22(4). doi: https://doi.org/10.1080/09720510.2019.1609722
  • Tiwari, A., Sharma, R. M., & Garg, R. (2020). Emerging ontology formulation of optimized internet of things (IOT) services with cloud computing. Soft Computing: Theories and Applications; Pant, M., Sharma, TK, Verma, OP, Singla, R., Sikander, A., Eds, 31-52.
  • R. Arun Raj, S.N. George, and P.P. Deepthi. An expeditious chaos based digital image encryption algorithm. In Recent Advances in Information Technology (RAIT), 2012 1st International Conference on, 2012.
  • David M. Curry. Practical application of chaos theory to systems engineering. Procedia CS, 2012.
  • Wenping Guo. A new digital image scrambling encryption algorithm based on chaotic sequence. In Computer Research and Development (ICCRD), 2011 3rd International Conference on, volume 1, 2011.
  • Dhanda, S. S., Singh, B., & Jindal, P. (2020). Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks. Journal of Interdisciplinary Mathematics, 23(2). doi: https://doi.org/10.1080/09720502.2020.1731959
  • Yue Sun and Guangyi Wang. An image encryption scheme based on modified logistic map. In Chaos-Fractals Theories and Applications (IWCFTA), 2011 Fourth International Workshop on, 2011.
  • Tiwari, A., & Sharma, R. M. (2021). OCC: A Hybrid Multiprocessing Computing Service Decision Making Using Ontology System. International Journal of Web-Based Learning and Teaching Technologies.
  • L. Kocarev and S. Lian. Chaos-based Cryptography: Theory, Algorithms and Applications. Studies in Computational Intelligence. Springer, 2011.
  • B Sivakumar. Chaos theory in hydrology: important issues and interpretations. Journal of Hydrology, (2005).
  • Mittal, G., Kumar, S., & Kumar, S. (2021). Novel public-key cryptosystems based on NTRU and algebraic structure of group rings. Journal of Information and Optimization Sciences, 42(7).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.