2018
DOI: 10.1016/j.sigpro.2017.12.021
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of image encryption scheme based on a new 1D chaotic system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(33 citation statements)
references
References 25 publications
0
33
0
Order By: Relevance
“…In [124], some special plain-images are selected to narrow the scope of some subkeys of a PTDWOS with less than or equal to 3 rounds. In [125], the usability of a 4round diffusion-then-permutation without substitution-box is questioned, which can be considered as a special form of 5-round PTDWOS. Furthermore, the linear relationship between plain-image and the corresponding cipher-image is derived as the adopted permutation is a static rotation of 90 degrees, which is used to support the proposed differential attack.…”
Section: Cryptanalysis Of Some Image Encryption Schemes With Complex mentioning
confidence: 99%
“…In [124], some special plain-images are selected to narrow the scope of some subkeys of a PTDWOS with less than or equal to 3 rounds. In [125], the usability of a 4round diffusion-then-permutation without substitution-box is questioned, which can be considered as a special form of 5-round PTDWOS. Furthermore, the linear relationship between plain-image and the corresponding cipher-image is derived as the adopted permutation is a static rotation of 90 degrees, which is used to support the proposed differential attack.…”
Section: Cryptanalysis Of Some Image Encryption Schemes With Complex mentioning
confidence: 99%
“…Reference image encryption methods are similar to data hiding methods. Therefore, visual quality is used for evaluating these methods because imperceptibility is very important for reference image encryption methods (Ghebleh et al, 2014;Dhall et al, 2018;Bao and Zhou, 2015;Kanso and Ghebleh, 2017;Avci et al, 2016).…”
Section: Related Workmentioning
confidence: 99%
“…These results prove the success of optimal sub-band selection and 2 k correction on reference image encryption. Image PSNR (dB) Yang et al method (Bao and Zhou, 2015) KG VMIE method (Dhall et al, 2018) The PSNR values produced by all the methods are shown in Fig. 6.…”
Section: 1mentioning
confidence: 99%
See 1 more Smart Citation
“…In the context of block cipher and image encryption cipher cryptanalysis, different cryptanalytic techniques applied to such ciphers, we have seen some strong papers recently [11][12][13][14][15][16][17][18][19][20]. These authors applied various famous cryptanalytic techniques such as, linear, differential, related-key, impossible differential and produced results for the attack.…”
Section: Related Workmentioning
confidence: 99%