Large encrypting binary images with higher security
Pattern Recognition Letters
Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security)
Multimedia Encryption and Watermarking (Multimedia Systems and Applications)
Multimedia Encryption and Watermarking (Multimedia Systems and Applications)
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
Cryptanalysis of the RCES/RSES image encryption scheme
Journal of Systems and Software
Cryptanalysis of a chaotic neural network based multimedia encryption scheme
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
On the Design of Perceptual MPEG-Video Encryption Algorithms
IEEE Transactions on Circuits and Systems for Video Technology
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion
IEEE Transactions on Circuits and Systems for Video Technology
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system
Journal of Systems and Software
Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
Chaos based image encryption scheme based on enhanced logistic map
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
A robust hybrid method for image encryption based on Hopfield neural network
Computers and Electrical Engineering
A new image encryption scheme based on a chaotic function
Image Communication
Dynamic substitution and diffusion based image encryption using modified logistic map
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
Journal of Systems and Software
Image encryption using a lightweight stream encryption algorithm
Advances in Multimedia - Special issue on Web Services in Multimedia Communication
Image encryption based on the Jacobian elliptic maps
Journal of Systems and Software
A new 1D chaotic system for image encryption
Signal Processing
Hi-index | 0.00 |
This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K"1"0 can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: K"imod128"i"="4^1^0, which works very well when K"1"0 is not too large; (4) when K"1"0 is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information of any other plain-images encrypted by the same key.