Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network

[1]  H. F. Gaines,et al.  Cryptanalysis: A Study of Ciphers and Their Solution , 1956 .

[2]  Safya Belghith,et al.  Breaking an image encryption scheme based on a spatiotemporal chaotic system , 2015, Signal Process. Image Commun..

[3]  K. P. Subbalakshmi,et al.  Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.

[4]  Unnikrishnan Gopinathan,et al.  Cryptanalysis of optical security systems with significant output images. , 2007, Applied optics.

[5]  Sattar Mirzakuchaki,et al.  Breaking an image encryption algorithm based on the new substitution stage with chaotic functions , 2016 .

[6]  Abdul Hanan Abdullah,et al.  Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .

[7]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[8]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[9]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[10]  G. VIDAL,et al.  Fundamentals of a Classical Chaos-Based Cryptosystem with some Quantum Cryptography Features , 2012, Int. J. Bifurc. Chaos.

[11]  W. Tang,et al.  A fast image encryption system based on chaotic maps with finite precision representation , 2007 .

[12]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[13]  Sattar Mirzakuchaki,et al.  Breaking an image encryption technique based on neural chaotic generator , 2017 .

[14]  Wei Zhang,et al.  Image encryption based on three-dimensional bit matrix permutation , 2016, Signal Process..

[15]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[16]  Wenying Wen,et al.  Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack , 2015, Multimedia Tools and Applications.

[17]  Jingjuan Zhang,et al.  Multiple-image encryption by wavelength multiplexing. , 2005, Optics letters.

[18]  Xiaohong Zhao,et al.  Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map , 2016, Nonlinear Dynamics.

[19]  Xiaofeng Liao,et al.  Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation , 2018, Signal Process..

[20]  José M. Amigó,et al.  Chaos-Based Cryptography , 2009, Intelligent Computing Based on Chaos.

[21]  Abdennaceur Kachouri,et al.  A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2 , 2015, Nonlinear Dynamics.

[22]  Rastislav Lukac,et al.  Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.

[23]  Li Zeng,et al.  Cryptanalyzing a novel couple images encryption algorithm based on DNA subsequence operation and chaotic system , 2015 .

[24]  Qiang Liu,et al.  A novel image encryption algorithm based on chaos and Line map , 2015, Neurocomputing.

[25]  W. Yap,et al.  Cryptanalysis of a new image alternate encryption algorithm based on chaotic map , 2015, Nonlinear Dynamics.

[26]  Imran Raza Khan,et al.  An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems , 2015 .

[27]  Xing-Yuan Wang,et al.  Cryptanalysis on a parallel keyed hash function based on chaotic neural network , 2010, Neurocomputing.

[28]  Xing He,et al.  Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral , 2015, Neural Computing and Applications.

[29]  Borko Furht,et al.  Multimedia encryption and watermarking , 2005, Multimedia systems and applications.

[30]  Nikolaos G. Bourbakis,et al.  Image and video encryption using SCAN patterns , 2004, Pattern Recognit..

[31]  Chee Peng Lim,et al.  Synchronization of an Inertial Neural Network With Time-Varying Delays and Its Application to Secure Communication , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[32]  Fernando Hernandez,et al.  Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features , 2017, Int. J. Bifurc. Chaos.

[33]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[34]  Rhouma Rhouma,et al.  Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .

[35]  Musheer Ahmad,et al.  Cryptanalysis of an Asymmetric Image Cryptosystem Based on Synchronized Unified Chaotic System and CNN , 2017 .

[36]  Xingyuan Wang,et al.  Cryptanalysis of an image encryption algorithm using Chebyshev generator , 2014, Digit. Signal Process..

[37]  Abdul Hanan Abdullah,et al.  Image encryption using a synchronous permutation-diffusion technique , 2017 .

[38]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[39]  Abdurahman Kadir,et al.  Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN , 2014 .

[40]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[41]  Chi-Bin Cheng,et al.  An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network , 2013, Commun. Nonlinear Sci. Numer. Simul..

[42]  Li-Hua Gong,et al.  Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing , 2014 .

[43]  E. Solak,et al.  Cryptanalysis of a chaos-based image encryption algorithm , 2009 .