Author of the publication

A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512.

, , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IDHOCNET: A Novel ID Centric Architecture for Ad Hoc Networks., , , and . Journal Comp. Netw. and Communic., (2016)HANDY: A Hybrid Association Rules Mining Approach for Network Layer Discovery of Services for Mobile Ad hoc Network., , , and . CoRR, (2017)Bio-inspired energy harvesting in WSN: a survey., , , and . ICC, page 145:1-145:9. ACM, (2017)A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2., and . Multimedia Tools Appl., 78 (2): 2105-2133 (2019)Selective encryption for gray images based on chaos and DNA complementary rules., , , and . Multimedia Tools Appl., 74 (13): 4655-4677 (2015)QoS Enhancement of AODV Routing for MBANs., , , and . Wirel. Pers. Commun., 116 (2): 1379-1406 (2021)HANDY: a hybrid association rules mining approach for network layer discovery of services for mobile ad hoc network., , , and . Wireless Networks, 19 (8): 1961-1977 (2013)Proactive Security Mechanism and Design for Firewall., , , and . J. Information Security, 2 (3): 122-130 (2011)A Toolkit for Prototype Implementation of E-Governance Service System Readiness Assessment Framework., , and . HCI (22), volume 9752 of Lecture Notes in Computer Science, page 259-270. Springer, (2016)An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules., , , and . Multimedia Tools Appl., 75 (1): 1-23 (2016)