2022
DOI: 10.1007/978-981-19-1111-8_40
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Encryption Techniques to Encrypt Private Parts of an Image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
0
0
Order By: Relevance
“…Finally, the substitution operation is applied to each of these bytes, using the first 8 × 8 S-box. The criteria used in the substitution operation are the same as in FIPS 197 [43]. Later, the permutation P, boxes, and schedule keys are generated.…”
Section: Cipher Proceduresmentioning
confidence: 99%
“…Finally, the substitution operation is applied to each of these bytes, using the first 8 × 8 S-box. The criteria used in the substitution operation are the same as in FIPS 197 [43]. Later, the permutation P, boxes, and schedule keys are generated.…”
Section: Cipher Proceduresmentioning
confidence: 99%