A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
暂无分享,去创建一个
Nikolaos G. Bourbakis | Guanrong Chen | Shujun Li | Kwok-Tung Lo | Chengqing Li | Guanrong Chen | S. Li | N. Bourbakis | Chengqing Li | K. Lo | Shujun Li | K. Lo
[1] Guanrong Chen,et al. On the security of a class of image encryption schemes , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[2] Klara Nahrstedt,et al. Is MPEG encryption by using random list instead of zigzag order secure? , 1997, ISCE '97. Proceedings of 1997 IEEE International Symposium on Consumer Electronics (Cat. No.97TH8348).
[3] Xiaojun Tong,et al. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..
[4] J.-C. Yeo,et al. Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation , 2000 .
[5] Fred Piper,et al. Secure Speech Communications , 1985 .
[6] Wenjun Zeng,et al. Multimedia Security Technologies for Digital Rights Management , 2006 .
[7] Gonzalo Alvarez,et al. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.
[8] Howard Cheng,et al. Partial encryption for image and video communication , 1998 .
[9] Min Wu,et al. A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.
[10] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[11] Ed Dawson,et al. Fast Fourier transform based speech encryption system , 1991 .
[12] Nikolaos G. Bourbakis,et al. Image encryption method using a class of fractals , 1995, J. Electronic Imaging.
[13] Shujun Li,et al. On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.
[14] Darko Kirovski,et al. Multimedia Security Handbook , 2004 .
[15] Kai Wang,et al. On the security of 3D Cat map based symmetric image encryption scheme , 2005 .
[16] Hun-Chen Chen,et al. A new cryptography system and its VLSI realization , 2003, Journal of systems architecture.
[17] Guanrong Chen,et al. Chaos-Based Encryption for Digital Images and Videos , 2004 .
[18] Xiaobo Li,et al. Image compression and encryption using tree structures , 1997, Pattern Recognit. Lett..
[19] Sang-Uk Shin,et al. A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption , 1999, ISW.
[20] Lintian Qiao,et al. Multimedia Security and Copyright Protection , 1998 .
[21] Lei Tang,et al. Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.
[22] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[23] Shujun Li,et al. On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) , 2005, J. Syst. Softw..
[24] Markus G. Kuhn,et al. Analysis of the Nagravision Video Scrambling Method , 1998 .
[25] Andreas Uhl,et al. Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .
[26] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[27] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[28] Yossi Matias,et al. A Video Scrambling Technique Based On Space Filling Curves , 1987, CRYPTO.
[29] Randall K. Nichols,et al. Wireless Security: Models, Threats, and Solutions , 2001 .
[30] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[31] N. Bourbakis,et al. SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..
[32] Henry Ker-Chang Chang,et al. A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..
[33] Ernest F. Brickell,et al. Cryptanalysis of Video Encryption Based on Space-Filling Curves , 1990, EUROCRYPT.
[34] S. Li,et al. On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.
[35] Ed Dawson,et al. Design and Cryptanalysis of Transform-Based Analog Speech Scamblers , 1993, IEEE J. Sel. Areas Commun..
[36] A. Pisarchik,et al. Encryption and decryption of images with chaotic map lattices. , 2006, Chaos.
[37] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[38] Chin-Chen Chang,et al. A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..
[39] Dan Zhang,et al. Decryption of pure-position permutation algorithms , 2004, Journal of Zhejiang University. Science.
[40] Rhouma Rhouma,et al. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem , 2008 .
[41] Jinsheng Sun,et al. Perceptual cryptography on wavelet-transform encoded videos , 2004, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, 2004..
[42] S. Li,et al. Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .
[43] Guanrong Chen,et al. Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..
[44] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[45] Wenjiang Pei,et al. Symbolic dynamics approach to parameter estimation without initial value , 2009 .
[46] Kuo-Liang Chung,et al. Large encrypting binary images with higher security , 1998, Pattern Recognit. Lett..
[47] Chin-Chen Chang,et al. Cryptanalysis of an encryption scheme for binary images , 2002, Pattern Recognit. Lett..
[48] Borko Furht,et al. Multimedia Encryption and Watermarking (Multimedia Systems and Applications) , 2005 .
[49] Borko Furht,et al. Multimedia encryption and watermarking , 2005, Multimedia systems and applications.
[50] R. Zunino. Fractal circuit layout for spatial decorrelation of images , 1998 .
[51] Borko Furht,et al. Fundamentals of Multimedia Encryption Techniques , 2006 .
[52] Ed Dawson,et al. Speech encryption in the transform domain , 1990 .
[53] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[54] Klara Nahrstedt,et al. Comparison of MPEG encryption algorithms , 1998, Comput. Graph..
[55] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[56] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[57] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[58] Chen Gang,et al. Ergodic matrix in image encryption , 2002, Other Conferences.
[59] Jiun-In Guo,et al. EURASIP Journal on Applied Signal Processing 2003:13, 1291–1305 c ○ 2003 Hindawi Publishing Corporation Design and Realization of a New Signal Security System for Multimedia Data Transmission , 2003 .
[60] Guanrong Chen,et al. On the security defects of an image encryption scheme , 2009, Image Vis. Comput..
[61] Shiguo Lian,et al. Perceptual cryptography on SPIHT compressed images or videos , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[62] Andreas Uhl,et al. Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.
[63] Sadasivan Puthusserypady,et al. Self-synchronizing chaotic stream ciphers , 2008, Signal Process..
[64] Josef Scharinger. Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.
[65] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[66] Philip Ogunbona,et al. Securing wavelet compression with random permutations , 2000 .
[67] Abir Awad,et al. A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods , 2010, IACR Cryptol. ePrint Arch..
[68] Shiguo Lian,et al. Perceptual cryptography on JPEG2000 compressed images or videos , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[69] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[70] Nikolaos G. Bourbakis,et al. Image and video encryption using SCAN patterns , 2004, Pattern Recognit..
[71] Dongxu Qi,et al. A new class of scrambling transformation and its application in the image information covering , 2000 .
[72] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .