Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms
暂无分享,去创建一个
[1] Stefan Katzenbeisser,et al. Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[2] Guanrong Chen,et al. Design and FPGA-Based Realization of a Chaotic Secure Video Communication System , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Kwok-Tung Lo,et al. Breaking an Image Encryption Algorithm Based on Chaos , 2010, Int. J. Bifurc. Chaos.
[4] Yicong Zhou,et al. Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos , 2020, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Kwok-Tung Lo,et al. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2011, Signal Process..
[6] Fatih Özkaynak,et al. Brief review on application of nonlinear dynamics in image encryption , 2018, Nonlinear Dynamics.
[7] Yicong Zhou,et al. Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.
[8] Xin-Wen Wu,et al. On the Security of Permutation-Only Image Encryption Schemes , 2016, IEEE Transactions on Information Forensics and Security.
[9] Yong Liu,et al. Exploiting Optical Chaos for Color Image Encryption and Secure Resource Sharing in Cloud , 2019, IEEE Photonics Journal.
[10] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[11] K. Deergha Rao,et al. Modified Chaotic Key-Based Algorithm for Image Encryption and its VLSI Realization , 2007, 2007 15th International Conference on Digital Signal Processing.
[12] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[13] Leo Yu Zhang,et al. International Journal of Bifurcation and Chaos Breaking a Chaotic Image Encryption Algorithm Based on modulo Addition and Xor Operation , 2022 .
[14] Hang Zhou,et al. Separable Reversible Data Hiding in Encrypted JPEG Bitstreams , 2018, IEEE Transactions on Dependable and Secure Computing.
[15] Cong Xu,et al. An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm , 2020, Optics and Lasers in Engineering.
[16] Chunhua Wang,et al. A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks , 2020, Signal Process..
[17] Ming Li,et al. Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System , 2018, IEEE MultiMedia.
[18] Bhaskar Mondal,et al. A chaotic permutation and diffusion based image encryption algorithm for secure communications , 2018, Multimedia Tools and Applications.
[19] Xuejing Kang,et al. Color Image Encryption Using Pixel Scrambling Operator and Reality-Preserving MPFRHT , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Cong Wang,et al. Improved known-plaintext attack to permutation-only multimedia ciphers , 2018, Inf. Sci..
[21] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[22] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[23] Guanrong Chen,et al. Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers , 2017, Int. J. Bifurc. Chaos.
[24] Kwok-Wo Wong,et al. Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structure , 2015, ArXiv.
[25] Kwok-Wo Wong,et al. On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.
[26] Cong Xu,et al. An Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems , 2020, Int. J. Bifurc. Chaos.
[27] Di Xiao,et al. Cryptanalyzing a novel image cipher based on mixed transformed logistic maps , 2013, Multimedia Tools and Applications.
[28] D. Megías,et al. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints , 2015, IEEE Trans. Dependable Secur. Comput..
[29] Bart Preneel,et al. Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries , 2005, INDOCRYPT.
[30] Yicong Zhou,et al. Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes , 2019, IEEE Transactions on Multimedia.
[31] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[32] David Megías. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints , 2015, IEEE Transactions on Dependable and Secure Computing.
[33] I. Shatheesh Sam,et al. A novel image cipher based on mixed transformed logistic maps , 2010, Multimedia Tools and Applications.
[34] Yiyuan Xie,et al. Exploiting Optics Chaos for Image Encryption-Then-Transmission , 2016, Journal of Lightwave Technology.
[35] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[36] Hadi Seyedarabi,et al. A new secure and sensitive image encryption scheme based on new substitution with chaotic function , 2014, Multimedia Tools and Applications.
[37] Chengqing Li,et al. When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..
[38] Lei Chen,et al. Medical image cipher using hierarchical diffusion and non-sequential encryption , 2019, Nonlinear Dynamics.
[39] Ch. Gangadhar,et al. Hyperchaos Based Image Encryption , 2009, Int. J. Bifurc. Chaos.