๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Security analysis of a chaos-based image encryption algorithm

โœ Scribed by Shiguo Lian; Jinsheng Sun; Zhiquan Wang


Publisher
Elsevier Science
Year
2005
Tongue
English
Weight
339 KB
Volume
351
Category
Article
ISSN
0378-4371

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


A new compound mode of confusion and dif
โœ Xing-yuan Wang; Feng Chen; Tian Wang ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 557 KB

A block encryption for image using combination of confusion and diffusion is proposed in this paper. In this encryption, a new compound mode is proposed. Baker map is used to generate a pseudo-random sequence, and several one-dimension chaotic maps are dynamically selected to encrypt blocks of image

A block encryption algorithm based on dy
โœ Xing-yuan Wang; Qing Yu ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 485 KB

A block encryption algorithm using dynamic sequences generated by multiple chaotic systems is proposed in this paper. In this algorithm, several one-dimension chaotic maps generate pseudo-random sequences, which are independent and approximately uniform. After a series of transformations, the sequen

Analysis and improvement of a chaos-base
โœ Shaojiang Deng; Yantao Li; Di Xiao ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 752 KB

The construction of a new Hash function attracts much attention recently. In Kwok and Tang (2005) [Kwok HS, Tang WKS. A chaos-based cryptographic Hash function for message authentication. Int J Bifurcat Chaos 2005;15:4043-50], a chaos-based Hash function has been proposed. In this paper, the potenti

A realistic security analysis of identif
โœ Poupard, Guillaume ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 863 KB

In this paper, we analyze the security of two zero-knowledge identification schemes based on cornbinatorial NP-cornplete problems, PKP (Shamir [3]) and CLE (Stem [5]). We use two different approaches in order to determine, on the one hand, the theoretical limit to the efficiency of the known attacks

A Web-Based Secure System for the Distri
โœ Ping Wah Wong; Daniel Tretter; Thomas Kite; Qian Lin; Hugh Nguyen ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 292 KB

We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. The main feature of the system is that it allows previewing and printing of selected documents and images, where only a certain number of hardcopies can be generated based o