On the security defects of an image encryption scheme
This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K<...
Main Authors: | C., Li, S., Li, M., Asim, J., Nunez, G., Alvarez, G., Chen |
---|---|
Format: | Article |
Published: |
2009
|
Subjects: | |
Online Access: | http://www.scopus.com/inward/record.url?eid=2-s2.0-67349203285&partnerID=40&md5=5385f9470ba91a7ead6bdefd47b999d7 http://www.scopus.com/inward/record.url?eid=2-s2.0-67349203285&partnerID=40&md5=5385f9470ba91a7ead6bdefd47b999d7 http://eprints.utp.edu.my/457/1/paper.pdf |
Similar Items
-
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012) -
Partial encryption of compressed images employing FPGA
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005) -
Defect detection on electrical power equipment using thermal imaging technology
by: Geoffrey, Ogadimma Asiegbu
Published: (2013) -
Noise Elimination for Image Subtraction in Printed Circuit Board Defect Detection Algorithm
by: Zuwairie, Ibrahim, et al.
Published: (2013) -
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
by: Low, Chiau Thian
Published: (2017)