Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
On the security of image encryption method
Information Processing Letters
Large encrypting binary images with higher security
Pattern Recognition Letters
Multimedia security and copyright protection
Multimedia security and copyright protection
Partial encryption for image and video communication
Partial encryption for image and video communication
Cryptanalysis of an encryption scheme for binary images
Pattern Recognition Letters
MPEG Video Encryption Algorithms
Multimedia Tools and Applications
Design and realization of a new signal security system for multimedia data transmission
EURASIP Journal on Applied Signal Processing
Cryptanalysis of a chaotic neural network based multimedia encryption scheme
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Efficient frequency domain selective scrambling of digital video
IEEE Transactions on Multimedia
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Journal of Systems and Software
Cryptanalysis of the RCES/RSES image encryption scheme
Journal of Systems and Software
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
Image and Vision Computing
Key Independent Retrieval of Chaotic Encrypted Images
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system
Journal of Systems and Software
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
Hi-index | 0.00 |
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorithm) was proposed for real-time multimedia data transmission. This paper gives a comprehensive analysis on the security of TDCEA. The following security problems are found: (1) there exist some essential security defects in TDCEA; (2) two known-plaintext attacks can break TDCEA; (3) the chosen-plaintext and chosen-ciphertext versions of the aforementioned two known-plaintext attacks can break TDCEA even with a smaller complexity and a better performance. Some experiments are given to show the security defects of TDCEA and the feasibility of the proposed known-plaintext attacks. As a conclusion, TDCEA is not suitable for applications that require a high level of security.