Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
On the security of image encryption method
Information Processing Letters
Large encrypting binary images with higher security
Pattern Recognition Letters
Multimedia security and copyright protection
Multimedia security and copyright protection
Partial encryption for image and video communication
Partial encryption for image and video communication
A new encryption algorithm for image cryptosystems
Journal of Systems and Software
Cryptanalysis of an encryption scheme for binary images
Pattern Recognition Letters
Design of a New Cryptography System
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
MPEG Video Encryption Algorithms
Multimedia Tools and Applications
Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security)
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Journal of Systems and Software
Design and realization of a new signal security system for multimedia data transmission
EURASIP Journal on Applied Signal Processing
Cryptanalysis of a new signal security system for multimedia data transmission
EURASIP Journal on Applied Signal Processing
Cryptanalysis of the two-dimensional circulation encryption algorithm
EURASIP Journal on Applied Signal Processing
Cryptanalysis of a chaotic neural network based multimedia encryption scheme
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
Design of integrated multimedia compression and encryption systems
IEEE Transactions on Multimedia
Image encryption for secure Internet multimedia applications
IEEE Transactions on Consumer Electronics
A joint signal processing and cryptographic approach to multimedia encryption
IEEE Transactions on Image Processing
On the security defects of an image encryption scheme
Image and Vision Computing
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
Image and Vision Computing
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system
Journal of Systems and Software
Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
Collision-based flexible image encryption algorithm
Journal of Systems and Software
Cryptanalysis of a chaotic neural network based multimedia encryption scheme
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
Journal of Systems and Software
Diffusion-substitution based gray image encryption scheme
Digital Signal Processing
Hi-index | 0.00 |
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two to succeed an attack. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimental analyses are given to show the performance of the suggested known/chosen-plaintext attacks. The insecurity of RCES is due to its special design, which makes it a typical example of insecure image encryption schemes. A number of lessons are drawn from the reported cryptanalysis of RCES, consequently suggesting some common principles for ensuring a high level of security of an image encryption scheme.