How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Citations since 2017
2 Research Items
This paper introduces an effective image encryption approach that merges a chaotic map and polynomial with a block cipher. According to this scheme, there are three levels of encryption. In the first level, pixel positions of the image are scuffled into blocks randomly based on a chaotic map. In the second level, the polynomials are constructed by...
Zigbee is a technology operates under IEEE 802.15.4 standard. It has been developed to define a specific set of communication protocols that support short-range, low cost and low power consumption wireless networking that are designed for control and monitoring applications. These applications are merely require security, reliability, in addition t...
Hiding information by embedding secret data into an innocuous medium is often referred to as steganography. Steganography can be applied electronically by taking a message (a binary file) and some sort of cover (often a sound or image file) and combining both to obtain a “stego-object”. The stego-object is essentially the cover with its redundant i...