ニュース

This respository contains the code which does the the Key generation , Encryption and Decryption followed by the Security and Perfomance Analysis.The repo also cotains the block diagram and ...
Abstract: Aiming at the problems of weak key sensitivity and strong pixel correlation of adjacent pixels in image encryption schemes, This paper constructs an image encryption scheme incorporating a ...