2022
DOI: 10.11591/ijeecs.v27.i3.pp1698-1703
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic map technique for enhancement security for android mobile system based on image encryption

Abstract: Network <span>security continues to be the priority of many organizations. To ensure the protection of their data, they pay great attention to Encryption systems. Moreover, because of the enormous developments in networks of connection particularly the internet which has used by several people to share a variety of data kinds. The security of data has been a significant issue. As a result, there is a significant focus in using methods of decryption and encryption. Numerous encryption techniques have beco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Decryption and encryption methods to solve the security issues. Several encryption approaches to protect data protection, chaotic encryption systems widely applying a chaotic map for encrypting the data [23]. Fusion of CS and hill climbing techniques (CSHC) based select the best forwarder selection and notice the abnormal nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Decryption and encryption methods to solve the security issues. Several encryption approaches to protect data protection, chaotic encryption systems widely applying a chaotic map for encrypting the data [23]. Fusion of CS and hill climbing techniques (CSHC) based select the best forwarder selection and notice the abnormal nodes.…”
Section: Introductionmentioning
confidence: 99%