2018
DOI: 10.1109/tcyb.2017.2682561
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of a Class of Diffusion Mechanisms for Image Encryption

Abstract: The need for fast and strong image cryptosystems motivates researchers to develop new techniques to apply traditional cryptographic primitives in order to exploit the intrinsic features of digital images. One of the most popular and mature technique is the use of complex dynamic phenomena, including chaotic orbits and quantum walks, to generate the required key stream. In this paper, under the assumption of plaintext attacks we investigate the security of a classic diffusion mechanism (and of its variants) use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 104 publications
(45 citation statements)
references
References 66 publications
(155 reference statements)
0
41
0
Order By: Relevance
“…In [119], Zhu et al propose a chosen-plaintext attack on another one-round PTDWOS, where diffusion is implemented by modulo addition and XOR. The equivalent secret key of such diffusion mechanism can be easily recovered [120].…”
Section: Cryptanalysis Of Single Round Ptdwosmentioning
confidence: 99%
“…In [119], Zhu et al propose a chosen-plaintext attack on another one-round PTDWOS, where diffusion is implemented by modulo addition and XOR. The equivalent secret key of such diffusion mechanism can be easily recovered [120].…”
Section: Cryptanalysis Of Single Round Ptdwosmentioning
confidence: 99%
“…where x 0 , μ, α, and j are the initial or seed parameters of the TD-ERCS. e seed parameters in the TD-ERCS are as follows: 1], and α ∈ [0, π] and the tangentdelay parameters m (m � 1, 2, 3, 4, 5, 6, . .…”
Section: Tangent-delay Ellipse Reflecting Cavity-map Systemmentioning
confidence: 99%
“…Individuals can now join a variety of different networks to access and share various types of multimedia and data. However, online networks are not without risks, and due to the open nature of many networks, public concerns regarding the security and safety of data that is exchanged online are now higher than ever [1].…”
Section: Introductionmentioning
confidence: 99%
“…Besides, while encoding shading pictures, this plan just scrambles every segment of the shading picture separately, which demonstrates no flexibility from scrambling a dim picture to a shading one. Zhang et al [5] researched the security of an exemplary dispersion system (and of its variations) utilized as the center cryptographic primitive in some picture cryptosystems in view of the previously mentioned complex dynamic marvels. Gonçalves and Costa [6] overviewed late advancements in encryption and protection in remote sensor systems sent for transmissions of picture depictions, surveying imaginative ways to deal with give distinctive levels of security.…”
Section: Related Workmentioning
confidence: 99%