A Review on Different Image Encryption Approaches.
Autor: | Souyah, Amina, Faraoun, Kamel Mohamed |
---|---|
Zdroj: | Modelling & Implementation of Complex Systems; 2016, p3-18, 16p |
Databáze: | Complementary Index |
Externí odkaz: |
Autor: | Souyah, Amina, Faraoun, Kamel Mohamed |
---|---|
Zdroj: | Modelling & Implementation of Complex Systems; 2016, p3-18, 16p |
Databáze: | Complementary Index |
Externí odkaz: |