This paper describes the security weakness of a recently proposed image encryption algorithm based on a logistic-like new chaotic map. We show that the chaotic map s distribution is far from ideal, thus making it a bad candidate as a pseudo-random stream generator. As a consequence, the images encrypted with this algorithm are shown to be breakable through different attacks of variable complexity
This paper studies the security of a recently proposed chaos-based cryptosystem. It is shown that th...
It is well known that encryption algorithms developed based on Logistic map suffer from limited key ...
In literature, chaotic economic systems have got much attention because of their complex dynamic beh...
This paper describes the security weakness of a recently proposed image encryption algorithm based o...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
The security of digital images attracts much attention recently, and many image encryption methods h...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
The security of digital images attracts much attention recently, and many image encryption methods h...
Digital images are an important aspect of multimedia communication in today's data transmission envi...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due t...
At the present time, the increase of data transmission over various networks in a wide range, which ...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
This paper studies the security of a recently proposed chaos-based cryptosystem. It is shown that th...
It is well known that encryption algorithms developed based on Logistic map suffer from limited key ...
In literature, chaotic economic systems have got much attention because of their complex dynamic beh...
This paper describes the security weakness of a recently proposed image encryption algorithm based o...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
The security of digital images attracts much attention recently, and many image encryption methods h...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
The security of digital images attracts much attention recently, and many image encryption methods h...
Digital images are an important aspect of multimedia communication in today's data transmission envi...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due t...
At the present time, the increase of data transmission over various networks in a wide range, which ...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
This paper studies the security of a recently proposed chaos-based cryptosystem. It is shown that th...
It is well known that encryption algorithms developed based on Logistic map suffer from limited key ...
In literature, chaotic economic systems have got much attention because of their complex dynamic beh...