Recently, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named multimedia cryptography system (MCS). No cryptanalytic results have been reported so far. This paper presents a differential attack to break MCS, which requires only seven chosen plaintexts. The complexity of the attack is O(N), where N is the size of plaintext. Experimental results are also given to show the real performance of the proposed attack
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
This paper investigates the weaknesses of cryptosystems that use observer based synchronized chaotic...
Copyright © 2011 Eun-Jun Yoon et al. This is an open access article distributed under the Creative C...
Recently, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named "mul...
Recently, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named “mul...
In recent years secret permutations have been widely used for protecting different types of multimed...
Wireless multimedia communications have progressed significantly in recent years. As a result, there...
Nowadays the security of multimedia data storage and transfer is becoming a major concern. The tradi...
This paper reports security problems with improper implementations of an improved version of FEA-M (...
Abstract: Problem statement: The widespread use of image, audio and video data makes media content p...
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorith...
In recent years, many multimedia and image encryption techniques based on chaotic maps have been pro...
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorith...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorith...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
This paper investigates the weaknesses of cryptosystems that use observer based synchronized chaotic...
Copyright © 2011 Eun-Jun Yoon et al. This is an open access article distributed under the Creative C...
Recently, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named "mul...
Recently, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named “mul...
In recent years secret permutations have been widely used for protecting different types of multimed...
Wireless multimedia communications have progressed significantly in recent years. As a result, there...
Nowadays the security of multimedia data storage and transfer is becoming a major concern. The tradi...
This paper reports security problems with improper implementations of an improved version of FEA-M (...
Abstract: Problem statement: The widespread use of image, audio and video data makes media content p...
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorith...
In recent years, many multimedia and image encryption techniques based on chaotic maps have been pro...
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorith...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorith...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
This paper investigates the weaknesses of cryptosystems that use observer based synchronized chaotic...
Copyright © 2011 Eun-Jun Yoon et al. This is an open access article distributed under the Creative C...