Related references
Note: Only part of the references are listed.Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications
Ahmed A. Abd El-Latif et al.
SCIENTIFIC REPORTS (2020)
A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things
Nestor Tsafack et al.
IEEE ACCESS (2020)
Efficient quantum-based security protocols for information sharing and data protection in 5G networks
Ahmed A. Abd EL-Latif et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Performance Analysis and Implementation of DES Algorithm and RSA Algorithm with Image and Audio Steganography Techniques
Ankit Gambhir et al.
COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018 (2019)
Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB)
A. B. Nasution et al.
INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONICS, COMPUTER, AND INDUSTRIAL TECHNOLOGY (2018)
Data hiding in scrambled images: A new double layer security data hiding technique
Shabir A. Parah et al.
COMPUTERS & ELECTRICAL ENGINEERING (2014)
A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption
Ahmed A. Abd El-Latif et al.
OPTICS AND LASER TECHNOLOGY (2013)