Alexopoulos, Bourbakis and Ioannou proposed two cryptographic schemes for encrypting 2-D gray scale images by using a large family of fractals respectively. Their schemes are based on a transposition of the image elements. However, their schemes will be vulnerable in case that they employ the unique
β¦ LIBER β¦
On the security of the WinRAR encryption feature
β Scribed by Gary S.-W. Yeo; Raphael C.-W. Phan
- Book ID
- 106296983
- Publisher
- Springer-Verlag
- Year
- 2006
- Tongue
- English
- Weight
- 470 KB
- Volume
- 5
- Category
- Article
- ISSN
- 1615-5262
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
On the security of image encryption meth
β
Jan Jinn-Ke; Tseng Yuh-Min
π
Article
π
1996
π
Elsevier Science
π
English
β 457 KB
The advantages of encryption security
π
Article
π
1983
π
Elsevier Science
β 186 KB
On the security of multiple Huffman tabl
β
Qing Zhou; Kwok-wo Wong; Xiaofeng Liao; Yue Hu
π
Article
π
2011
π
Elsevier Science
π
English
β 289 KB
On the implementation of security polici
β
Antonio Izquierdo Manzanares; Jose M. Sierra Camara; Joaquin Torres Marquez
π
Article
π
2006
π
Elsevier Science
π
English
β 491 KB
Comments on the security of Chenβs authe
β
Mohamed Rasslan; Amr Youssef
π
Article
π
2011
π
Elsevier Science
π
English
β 169 KB
Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these
Is encryption the road to security?
π
Article
π
1996
π
Elsevier Science
π
English
β 127 KB