This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems: (1) there exist a number of invalid keys and weak keys, and some keys are partially equivalent for encryption/decryption; (2) given one chosen plain-image, a subkey K_{10} can be guessed with a smaller computational complexity than that of the simple brute-force attack; (3) given at most 128 chosen plain-images, a chosen-plaintext attack can possibly break the following part of the secret key: View the MathML source, which works very well when K_{10} is not too large; (4) when K_{10} is relatively small, a known-plaintext attack can be carried out with only one known plain-image to recover some visual information...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
Chaotic systems have been broadly exploited through the last two decades to build encryption methods...
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encr...
This paper studies the security of a recently-proposed chaos-based image encryption scheme and point...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
The security of digital images attracts much attention recently, and many image encryption methods h...
The security of digital images attracts much attention recently, and many image encryption methods h...
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorith...
Abstract—Recently, an image encryption algorithm based on compound chaotic sequence was proposed [To...
In 2019, Essaid et al. introduced a chaotic map-based encryption scheme for color images. Their appr...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this pape...
Copyright © 2014 Cao Guanghui et al. This is an open access article distributed under the Creative C...
In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has ...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
Chaotic systems have been broadly exploited through the last two decades to build encryption methods...
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encr...
This paper studies the security of a recently-proposed chaos-based image encryption scheme and point...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
The security of digital images attracts much attention recently, and many image encryption methods h...
The security of digital images attracts much attention recently, and many image encryption methods h...
Recently, a chaos-based image encryption algorithm called MCKBA (Modified Chaotic-Key Based Algorith...
Abstract—Recently, an image encryption algorithm based on compound chaotic sequence was proposed [To...
In 2019, Essaid et al. introduced a chaotic map-based encryption scheme for color images. Their appr...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this pape...
Copyright © 2014 Cao Guanghui et al. This is an open access article distributed under the Creative C...
In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has ...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This pa...
Chaotic systems have been broadly exploited through the last two decades to build encryption methods...
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encr...