On the security of image encryption method
β Scribed by Jan Jinn-Ke; Tseng Yuh-Min
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 457 KB
- Volume
- 60
- Category
- Article
- ISSN
- 0020-0190
No coin nor oath required. For personal study only.
β¦ Synopsis
Alexopoulos, Bourbakis and Ioannou proposed two cryptographic schemes for encrypting 2-D gray scale images by using a large family of fractals respectively. Their schemes are based on a transposition of the image elements. However, their schemes will be vulnerable in case that they employ the unique key in their proposed system. In this paper, we show that their transposition encryptions can easily be broken with a pair of plain-image and cipher-sequential data. Meanwhile, we offer some suggestions for 2-D image transposition encryption.
π SIMILAR VOLUMES
Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these