2018
DOI: 10.1007/s11042-018-6015-4
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 42 publications
0
6
0
Order By: Relevance
“…In [124], some special plain-images are selected to narrow the scope of some subkeys of a PTDWOS with less than or equal to 3 rounds. In [125], the usability of a 4round diffusion-then-permutation without substitution-box is questioned, which can be considered as a special form of 5-round PTDWOS.…”
Section: Cryptanalysis Of Some Image Encryption Schemes With Complex ...mentioning
confidence: 99%
“…In [124], some special plain-images are selected to narrow the scope of some subkeys of a PTDWOS with less than or equal to 3 rounds. In [125], the usability of a 4round diffusion-then-permutation without substitution-box is questioned, which can be considered as a special form of 5-round PTDWOS.…”
Section: Cryptanalysis Of Some Image Encryption Schemes With Complex ...mentioning
confidence: 99%
“…The attacker knows some parts of plaintext and its corresponding ciphertext and uses this information to partially or completely crypt-analyze the encrypted data or get any information regarding the used secret key. This is done using mathematical or statistical analysis [27]. In image and video encryption algorithms, known-plaintext attacks are evaluated using the error concealment attack, and format compliance test analyzed below.…”
Section: E Known Plaintext Attackmentioning
confidence: 99%
“…With the development of network technology, multimedia information transmission is becoming more and more common, and image transmission security is also facing various forms of threats, such as differential attack, chosen plaintext attack [1][2][3], violent resolution, etc. Therefore, ensuring the security of image transmission is the research direction of many scholars in recent years [4,5].…”
Section: Introductionmentioning
confidence: 99%