𝔖 Bobbio Scriptorium
✦   LIBER   ✦

On the security of image encryption method

✍ Scribed by Jan Jinn-Ke; Tseng Yuh-Min


Publisher
Elsevier Science
Year
1996
Tongue
English
Weight
457 KB
Volume
60
Category
Article
ISSN
0020-0190

No coin nor oath required. For personal study only.

✦ Synopsis


Alexopoulos, Bourbakis and Ioannou proposed two cryptographic schemes for encrypting 2-D gray scale images by using a large family of fractals respectively. Their schemes are based on a transposition of the image elements. However, their schemes will be vulnerable in case that they employ the unique key in their proposed system. In this paper, we show that their transposition encryptions can easily be broken with a pair of plain-image and cipher-sequential data. Meanwhile, we offer some suggestions for 2-D image transposition encryption.


πŸ“œ SIMILAR VOLUMES


Comments on the security of Chen’s authe
✍ Mohamed Rasslan; Amr Youssef πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 169 KB

Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these