Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyses the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two to succeed an attack. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimental analyses are given to show the performance of the suggested known/chosen-plaintext attacks. The insecurity of RCES is due to its special design, which makes it a typical example of insecure image encryption schemes. A number of lessons are drawn from the reported cryptanalysis of RCES, consequently suggesting some common princ...
The process of encoding any given piece of information or data using a particular selection of avail...
This paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem....
In this paper a number of image encryption algorithms based on chaotic maps has been proposed. Image...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
This paper studies the security of a recently-proposed chaos-based image encryption scheme and point...
In 2019, Essaid et al. introduced a chaotic map-based encryption scheme for color images. Their appr...
The security of digital images attracts much attention recently, and many image encryption methods h...
This article performs the cryptanalysis of an image encryption algorithm using an S-box generated by...
The security of digital images attracts much attention recently, and many image encryption methods h...
Copyright © 2014 Cao Guanghui et al. This is an open access article distributed under the Creative C...
In order to protect valuable data from undesirable readers or against illegal reproduction and modif...
International audienceIn the recent literature, many research studies have proven that Known and Cho...
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this pape...
The process of encoding any given piece of information or data using a particular selection of avail...
This paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem....
In this paper a number of image encryption algorithms based on chaotic maps has been proposed. Image...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
This paper studies the security of a recently-proposed chaos-based image encryption scheme and point...
In 2019, Essaid et al. introduced a chaotic map-based encryption scheme for color images. Their appr...
The security of digital images attracts much attention recently, and many image encryption methods h...
This article performs the cryptanalysis of an image encryption algorithm using an S-box generated by...
The security of digital images attracts much attention recently, and many image encryption methods h...
Copyright © 2014 Cao Guanghui et al. This is an open access article distributed under the Creative C...
In order to protect valuable data from undesirable readers or against illegal reproduction and modif...
International audienceIn the recent literature, many research studies have proven that Known and Cho...
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this pape...
The process of encoding any given piece of information or data using a particular selection of avail...
This paper is a cryptanalysis of a recently proposed multi-chaotic systems based image cryptosystem....
In this paper a number of image encryption algorithms based on chaotic maps has been proposed. Image...