2015
DOI: 10.1049/iet-ipr.2014.0702
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of a three‐dimensional rotation‐based image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
(18 reference statements)
0
3
0
Order By: Relevance
“…It is clear that the correlation coefficient of the proposed algorithm is smaller than that of other methods proposed in Refs. [16], [17], [23]- [26]. [17] 0.002 0.0062 0.0066 Ref.…”
Section: Correlation Analysismentioning
confidence: 99%
“…It is clear that the correlation coefficient of the proposed algorithm is smaller than that of other methods proposed in Refs. [16], [17], [23]- [26]. [17] 0.002 0.0062 0.0066 Ref.…”
Section: Correlation Analysismentioning
confidence: 99%
“…Nini and Lemmouchi [60] presented the three‐dimensional rotation scheme to perform the encoding on images. It presents promising results even without using the diffusion.…”
Section: Introductionmentioning
confidence: 99%
“…However, by a strategy of divide-and-conquer [26], a chosen-plaintext can efficiently attack this algorithm having a complex linear relation. In addition, there are numerous other cryptanalysis methods [27][28][29][30].…”
Section: Introductionmentioning
confidence: 99%