Xu et al., 2008 - Google Patents
Cryptanalysis of two chaotic image encryption schemes based on permutation and xor operationsXu et al., 2008
- Document ID
- 10953791244284740093
- Author
- Xu S
- Wang Y
- Wang J
- Tian M
- Publication year
- Publication venue
- 2008 International Conference on Computational Intelligence and Security
External Links
Snippet
Recently, two chaotic image encryption schemes were presented, in which shuffling the positions and changing the grey values of image pixels were combined to confuse the relationship between the cipher-image and the plain-image. In this paper, we provide the …
- 230000000739 chaotic 0 title abstract description 33
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/125—Parallelization or pipelining, e.g. for accelerating processing of cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/582—Pseudo-random number generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Belazi et al. | Novel medical image encryption scheme based on chaos and DNA encoding | |
Ahmad et al. | A secure image encryption scheme based on chaotic maps and affine transformation | |
Chen et al. | A symmetric image encryption scheme based on 3D chaotic cat maps | |
Farajallah | Chaos-based crypto and joint crypto-compression systems for images and videos | |
Seyedzade et al. | A novel image encryption algorithm based on hash function | |
CN107220923B (en) | Digital picture feedback encryption method based on image network | |
Shu-Jiang et al. | An improved image encryption algorithm based on chaotic maps | |
Singh et al. | Image encryption and analysis using dynamic AES | |
Liu et al. | Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos | |
Hussain et al. | A noise resistant symmetric key cryptosystem based on S 8 S-boxes and chaotic maps | |
Hussain et al. | Image encryption based on Chebyshev chaotic map and S8 S-boxes | |
Li et al. | On the security of a class of image encryption schemes | |
Elamrawy et al. | An image encryption based on DNA coding and 2DLogistic chaotic map | |
Hameed et al. | Image encryption using DNA encoding and RC4 algorithm | |
Essaid et al. | A novel image encryption scheme based on permutation/diffusion process using an improved 2D chaotic system | |
Xu et al. | Cryptanalysis of two chaotic image encryption schemes based on permutation and xor operations | |
Aziz et al. | A novel symmetric image cryptosystem resistant to noise perturbation based on S8 elliptic curve S-boxes and chaotic maps | |
Mamdouh et al. | Augmented image encryption via moore’s automaton and jigsaw transform | |
Zhang et al. | A chaos-based image encryption scheme with confusion-diffusion architecture | |
Raj et al. | An expeditious chaos based digital image encryption algorithm | |
Rani et al. | A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher | |
Ma et al. | An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems | |
Mukherjee | New insights into chaos based image encryption & its application | |
Deng et al. | A novel image encryption algorithm based on hyperchaotic system and shuffling scheme | |
Hashemi | Design a new image encryption using fuzzy integral permutation with coupled chaotic maps |