2019
DOI: 10.3233/jifs-190137
|View full text |Cite
|
Sign up to set email alerts
|

BCH Codes with computational approach and its applications in image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
10

Relationship

5
5

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…[22] 99.58 28.62 Satish [23] 98.47 32.21 Huang [24] 99.42 24.94 Huang [25] 99.54 28.27 Fouda [26] 99.60 33.42 Hussain [36] 99. 30 33.40 Wang [37] 99.59 33.45 Guo [38] 99…”
Section: ) Npcr Analysismentioning
confidence: 99%
“…[22] 99.58 28.62 Satish [23] 98.47 32.21 Huang [24] 99.42 24.94 Huang [25] 99.54 28.27 Fouda [26] 99.60 33.42 Hussain [36] 99. 30 33.40 Wang [37] 99.59 33.45 Guo [38] 99…”
Section: ) Npcr Analysismentioning
confidence: 99%
“…Walter et al [ 18 ] analyze the decoding algorithm of the BCH code and design a constant-time version of the BCH decoding algorithm. Asif et al [ 19 ] constructed BCH codes with a computational approach and applied those codes in data security. Different image encryption techniques are utilized by various authors [ 20 24 ].…”
Section: Introductionmentioning
confidence: 99%
“…In [31] a novel image encryption scheme based on pixel-level filtering and DNA level diffusion. Different algorithms examined the image encryption quality [32][33][34]. Different techniques are proposed for image encryption as explained in [58][59][60].…”
Section: Introductionmentioning
confidence: 99%