On the security defects of an image encryption scheme
This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K<...
| Main Authors: | C., Li, S., Li, M., Asim, J., Nunez, G., Alvarez, G., Chen |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/457/ http://scholars.utp.edu.my/id/eprint/457/1/paper.pdf |
Similar Items
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Development of image recognition system for steel defects detection
by: Chen, Wai Yang
Published: (2022)
by: Chen, Wai Yang
Published: (2022)
Partial encryption of compressed images employing FPGA
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005)
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)
by: Sundara Morthty, Nirmala Devi
Published: (2012)
Morphological image segmentation for detection and classification of PCB defects
by: Indera Putera, Siti Hazurah
Published: (2007)
by: Indera Putera, Siti Hazurah
Published: (2007)
Defect detection in thermal image using thresholding technique
by: Heriansyah, Rudi, et al.
Published: (2007)
by: Heriansyah, Rudi, et al.
Published: (2007)
Estimations on the security aspect of Brands' electronic cash scheme
by: Chang, Yu Cheng, et al.
Published: (2005)
by: Chang, Yu Cheng, et al.
Published: (2005)
Image Processing Scheme For Single Pixel Imaging
by: Ng, Jian Hau
Published: (2021)
by: Ng, Jian Hau
Published: (2021)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
Defect detection on electrical power equipment using thermal imaging technology
by: Geoffrey, Ogadimma Asiegbu
Published: (2013)
by: Geoffrey, Ogadimma Asiegbu
Published: (2013)
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
by: Nurnajmin Qasrina Ann, ., et al.
Published: (2022)
by: Nurnajmin Qasrina Ann, ., et al.
Published: (2022)
Noise Elimination for Image Subtraction in Printed Circuit Board Defect Detection Algorithm
by: Zuwairie, Ibrahim, et al.
Published: (2013)
by: Zuwairie, Ibrahim, et al.
Published: (2013)
Secured HF image transmission system
by: Shameri, Ahmad Zuri
Published: (2006)
by: Shameri, Ahmad Zuri
Published: (2006)
Implementation of pipelined data encryption standard (DES) using altera CPLD
by: Teo, Pock Chueng, et al.
Published: (2000)
by: Teo, Pock Chueng, et al.
Published: (2000)
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
by: Khor, Lay Hoong
Published: (2006)
by: Khor, Lay Hoong
Published: (2006)
An Optical Set-Up For Inspecting Edge Chipping Defects Of Dws Solar Wafer
by: Lim, Thai Li
Published: (2019)
by: Lim, Thai Li
Published: (2019)
Wavelet-based PCA defect classification and quantification for pulsed eddy current NDT
by: Tian, G.Y., et al.
Published: (2005)
by: Tian, G.Y., et al.
Published: (2005)
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
by: Nurnajmin Qasrina Ann, Ayop Azmi
Published: (2023)
by: Nurnajmin Qasrina Ann, Ayop Azmi
Published: (2023)
Design of a secure and efficient multiple coins plus multiple denominations e-cash scheme
by: Chang, Yu Cheng
Published: (2004)
by: Chang, Yu Cheng
Published: (2004)
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
by: Ismail, Mohd. Izuan
Published: (2006)
by: Ismail, Mohd. Izuan
Published: (2006)
Speed Efficient Hardware Implementation Of Advanced Encryption Standard (Aes)
by: Low, Chiau Thian
Published: (2017)
by: Low, Chiau Thian
Published: (2017)
Image enhancement: A composite image approach using contourlet transform
by: Asmare , M.H., et al.
Published: (2009)
by: Asmare , M.H., et al.
Published: (2009)
Defect Signal Analysis For Nondestructive Testing Assesment
by: Damhuji, Rifai, et al.
Published: (2016)
by: Damhuji, Rifai, et al.
Published: (2016)
Neural network paradigm for classification of defects on PCB
by: Heriansyah, Rudi, et al.
Published: (2003)
by: Heriansyah, Rudi, et al.
Published: (2003)
Design of eddy current testing probe for surface defect evaluation
by: Mohd Mawardi, Saari, et al.
Published: (2019)
by: Mohd Mawardi, Saari, et al.
Published: (2019)
Performance evaluation of phase encoding schemes in multi-user networks
by: Thio, T. H. G., et al.
Published: (2014)
by: Thio, T. H. G., et al.
Published: (2014)
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
by: Ting, Kung Chuang
Published: (2022)
by: Ting, Kung Chuang
Published: (2022)
On Defect Oriented Testing for Hybrid CMOS/memristor Memory
by: Haron, Nor Zaidi, et al.
Published: (2011)
by: Haron, Nor Zaidi, et al.
Published: (2011)
On Defect Oriented Testing for Hybrid CMOS/memristor Memory
by: Haron, Nor Zaidi, et al.
Published: (2011)
by: Haron, Nor Zaidi, et al.
Published: (2011)
A flame imaging system using optical sensors
by: Susiapan, Yvette Shaan-Li
Published: (2007)
by: Susiapan, Yvette Shaan-Li
Published: (2007)
Evolutionary Fuzzy ARTMAP Neural Networks for Classification of Semiconductor Defects
by: Zuwairie, Ibrahim, et al.
Published: (2014)
by: Zuwairie, Ibrahim, et al.
Published: (2014)
The design of an optimum sensor array for fast defect inspection in pipeline
by: Samsuri, Fahmi B., et al.
by: Samsuri, Fahmi B., et al.
Multi-Excitation Signal for Depth Crack Defect in Eddy Current Testing
by: Kharudin, Ali, et al.
Published: (2017)
by: Kharudin, Ali, et al.
Published: (2017)
Coarse Resolution Defect Localization Algorithm For An Automated Visual Pcb Inspection
by: Ibrahim, Zuwairie, et al.
Published: (2002)
by: Ibrahim, Zuwairie, et al.
Published: (2002)
An algorithm to group defects on printed circuit board for automated visual inspection
by: Khalid, Noor Khafifah, et al.
Published: (2008)
by: Khalid, Noor Khafifah, et al.
Published: (2008)
Defect depth estimation in passive thermography using neural network paradigm
by: Heriansyah, Rudi, et al.
Published: (2007)
by: Heriansyah, Rudi, et al.
Published: (2007)
Glove defect detection via YOLO V5
by: Yong, Chen How, et al.
Published: (2021)
by: Yong, Chen How, et al.
Published: (2021)
Microprocessor Solder Bump Bridging Defects Screening Strategy In Manufacturing Test Flow
by: Loo , Kean Ann
Published: (2017)
by: Loo , Kean Ann
Published: (2017)
Development of software system for detecting defective symbols on integrated circuit chip with adjustable readability level
by: Aris, Ishak, et al.
Published: (2005)
by: Aris, Ishak, et al.
Published: (2005)
Similar Items
-
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020) -
Enhanced chaotic image encryption algorithm based on Baker's map
by: Salleh, Mazleena, et al.
Published: (2003) -
Development of image recognition system for steel defects detection
by: Chen, Wai Yang
Published: (2022) -
Partial encryption of compressed images employing FPGA
by: Reaz, Mamun Bin Ibne Ibne, et al.
Published: (2005) -
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)