22 February 2018 0 160 Report

Some author claim that they have successfully applied differential attack to their scheme which involve Fourier transform and other linear transform in which they are doing pixel to pixel transformation. Also as domain changes, what would be formula of UACI.

More Phool Singh's questions See All
Similar questions and discussions