Large encrypting binary images with higher security
Pattern Recognition Letters
A new encryption algorithm for image cryptosystems
Journal of Systems and Software
Cryptanalysis of an encryption scheme for binary images
Pattern Recognition Letters
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Journal of Systems and Software
Cryptanalysis of the RCES/RSES image encryption scheme
Journal of Systems and Software
Self-synchronizing chaotic stream ciphers
Signal Processing
On the security defects of an image encryption scheme
Image and Vision Computing
Image scrambling encryption algorithm of pixel bit based on chaos map
Pattern Recognition Letters
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
Collision-based flexible image encryption algorithm
Journal of Systems and Software
Cryptanalyzing a chaos-based image encryption algorithm using alternate structure
Journal of Systems and Software
Security analysis of image cryptosystems only or partially based on a chaotic permutation
Journal of Systems and Software
Breaking row-column shuffle based image cipher
Proceedings of the 20th ACM international conference on Multimedia
Hi-index | 0.08 |
Recently, an image scrambling encryption algorithm of pixel bit based on chaos map was proposed. Considering the algorithm as a typical binary image scrambling/permutation algorithm exerting on plaintext of size Mx(8N), this paper proposes a novel optimal method to break it with some known/chosen-plaintexts. The spatial complexity and computational complexity of the attack are only O(32.MN) and O(16.n"0.MN) respectively, where n"0 is the number of known/chosen-plaintexts used. The method can be easily extended to break any permutation-only encryption scheme exerting on plaintext of size MxN and with L different levels of values. The corresponding spatial complexity and computational complexity are only O(MN) and O(@?log"L(MN)@?.MN) respectively. In addition, some specific remarks on the performance of the image scrambling encryption algorithm are presented.