메뉴 건너뛰기




Volumn 85, Issue 9, 2012, Pages 2133-2144

Security analysis of image cryptosystems only or partially based on a chaotic permutation

Author keywords

Chaos; Cryptanalysis; Cryptosystem; Image; Permutation

Indexed keywords

CHOSEN-PLAINTEXT ATTACK; CRYPTANALYSIS; IMAGE; IMAGE ENCRYPTION SCHEME; PERMUTATION; PERMUTATION VECTORS; SECURITY ANALYSIS;

EID: 84863099032     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2012.04.031     Document Type: Conference Paper
Times cited : (37)

References (30)
  • 3
    • 47349093930 scopus 로고    scopus 로고
    • Modified Baptista type chaotic cryptosystem via matrix secret key
    • M. Ariffin, and M. Noorani Modified Baptista type chaotic cryptosystem via matrix secret key Physics Letter A 372 2008 5427 5430
    • (2008) Physics Letter A , vol.372 , pp. 5427-5430
    • Ariffin, M.1    Noorani, M.2
  • 6
    • 84863098164 scopus 로고    scopus 로고
    • FileFormat.Info
    • FileFormat.Info. http://www.filoformat.info/tip/web/imagesize.htm.
  • 9
    • 54949098467 scopus 로고    scopus 로고
    • Self-synchronizing chaotic stream ciphers
    • A. Kurian, and S. Puthusserypady Self-synchronizing chaotic stream ciphers Signal Processing 88 2008 2442 2452
    • (2008) Signal Processing , vol.88 , pp. 2442-2452
    • Kurian, A.1    Puthusserypady, S.2
  • 10
    • 78650867097 scopus 로고    scopus 로고
    • Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    • C. Li, and K.-T. Lo Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Processing 91 2011 949 954
    • (2011) Signal Processing , vol.91 , pp. 949-954
    • Li, C.1    Lo, K.-T.2
  • 11
    • 42049108003 scopus 로고    scopus 로고
    • A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    • S. Li, C. Li, G. Chen, N.G. Bourbakis, and K.-T. Lo A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks Signal Processing: Image Communication 23 2008 212 223
    • (2008) Signal Processing: Image Communication , vol.23 , pp. 212-223
    • Li, S.1    Li, C.2    Chen, G.3    Bourbakis, N.G.4    Lo, K.-T.5
  • 12
    • 67349148877 scopus 로고    scopus 로고
    • Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
    • C. Li, S. Li, G. Chen, and W.A. Halang Cryptanalysis of an image encryption scheme based on a compound chaotic sequence Image and Vision Computing 27 2009 1035 1039
    • (2009) Image and Vision Computing , vol.27 , pp. 1035-1039
    • Li, C.1    Li, S.2    Chen, G.3    Halang, W.A.4
  • 13
    • 77956063929 scopus 로고    scopus 로고
    • Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps
    • C. Li, S. Li, and K.-T. Lo Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps Communications in Nonlinear Science and Numerical Simulation 16 2011 837 843
    • (2011) Communications in Nonlinear Science and Numerical Simulation , vol.16 , pp. 837-843
    • Li, C.1    Li, S.2    Lo, K.-T.3
  • 14
    • 84863098171 scopus 로고    scopus 로고
    • Nist, Nist special publication 800-22
    • Nist, Nist special publication 800-22. http://csrc.nist.gov/rng/rng2. html.
  • 15
    • 84863094683 scopus 로고    scopus 로고
    • Nist, Fips pub 140-2: security requirements for cryptographic modules
    • Nist, Fips pub 140-2: security requirements for cryptographic modules. http://csrc.nist.gov/publications/Pubsfips.html.
  • 16
    • 60049083969 scopus 로고    scopus 로고
    • A new substitution-diffusion based image cipher using chaotic standard and logistic maps
    • V. Patidar, N.K. Pareek, and K.K. Sud A new substitution-diffusion based image cipher using chaotic standard and logistic maps Commun Nonlinear Sci Numer Simulat 14 2009 3056 3075
    • (2009) Commun Nonlinear Sci Numer Simulat , vol.14 , pp. 3056-3075
    • Patidar, V.1    Pareek, N.K.2    Sud, K.K.3
  • 20
    • 68749105566 scopus 로고    scopus 로고
    • Comment on "modified Baptista type chaotic cryptosystem via matrix secret key"
    • R. Rhouma, E. Solak, D. Arroyo, S. Li, G. Alvarez, and S. Belghith Comment on "Modified Baptista type chaotic cryptosystem via matrix secret key" Physics Letters A 373 2009 3398 3400
    • (2009) Physics Letters A , vol.373 , pp. 3398-3400
    • Rhouma, R.1    Solak, E.2    Arroyo, D.3    Li, S.4    Alvarez, G.5    Belghith, S.6
  • 24
    • 77958084060 scopus 로고    scopus 로고
    • Algebraic break of image ciphers based on discretized chaotic map lattices
    • E. Solak, and C. Cokal Algebraic break of image ciphers based on discretized chaotic map lattices Information Sciences 181 2011 227 233
    • (2011) Information Sciences , vol.181 , pp. 227-233
    • Solak, E.1    Cokal, C.2
  • 25
    • 78651457419 scopus 로고    scopus 로고
    • A novel scheme for image encryption based on 2D piecwise chaotic map
    • F. Sun, Z. Lü, and S. Liu A novel scheme for image encryption based on 2D piecwise chaotic map Optics Communications 283 2010 3259 3266
    • (2010) Optics Communications , vol.283 , pp. 3259-3266
    • Sun, F.1    Lü, Z.2    Liu, S.3
  • 27
  • 28
    • 75149134193 scopus 로고    scopus 로고
    • Image scrambling encryption algorithm of pixel bit based on chaos map
    • G. Ye Image scrambling encryption algorithm of pixel bit based on chaos map Pattern Recognition Letters 31 2010 347 354
    • (2010) Pattern Recognition Letters , vol.31 , pp. 347-354
    • Ye, G.1
  • 30
    • 84863392976 scopus 로고    scopus 로고
    • On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption
    • L. Zhao, A. Adhikari, D. Xiao, and K. Sakurai On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption Communications in Nonlinear Science and Numerical Simulation 17 2012 3303 3327
    • (2012) Communications in Nonlinear Science and Numerical Simulation , vol.17 , pp. 3303-3327
    • Zhao, L.1    Adhikari, A.2    Xiao, D.3    Sakurai, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.