2018
DOI: 10.1016/j.sigpro.2017.11.005
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
79
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 175 publications
(79 citation statements)
references
References 38 publications
0
79
0
Order By: Relevance
“…[62] and Ref. [49]. This proved that the 3C3R has better security in comparison to those algorithms.…”
Section: Histogram Analysismentioning
confidence: 71%
“…[62] and Ref. [49]. This proved that the 3C3R has better security in comparison to those algorithms.…”
Section: Histogram Analysismentioning
confidence: 71%
“…Ignoring the fact that permutation and modulo addition are not commutative, Wang et al simplifies Pak's scheme by cascading two non-neighbouring permutations together and break it with a chosen-plaintext attack in [16]. The enhanced version of Pak's scheme suggested in [16] is found still vulnerable against chosenplaintext attack [17]. Assuming a parameter seed is known, the parameter determining the shift permutation of Pak's scheme is disclosed in [18] by its internal properties.…”
Section: Cryptanalysis Of Single Round Ptdwosmentioning
confidence: 99%
“…Then, Pak's scheme is degenerated into the version analyzed in [16]. Based on the preliminary cryptanalysis works given in [16] and [18], both the equivalent secret-key of Pak's scheme and all its unknown parameters are recovered by a little more pairs of chosen plain-image and the corresponding cipher-image in [19]. In [119], Zhu et al propose a chosen-plaintext attack on another one-round PTDWOS, where diffusion is implemented by modulo addition and XOR.…”
Section: Cryptanalysis Of Single Round Ptdwosmentioning
confidence: 99%
See 1 more Smart Citation
“…In [32], the security analysis of a Latin square based image chaotic encryption algorithm proposed in [22] is given to find the security vulnerabilities both in the diffusion stage and in the scrambling stage through chosen text attack. In [33], the chosen plaintext attack is adopted for the safety performance assessment of a 1D combinatorial chaotic encryption algorithm proposed in [34]. In addition, in [35], the chosen plaintext attack is also utilized for analyzing the security of a bit cube-based image chaotic encryption algorithm proposed in [36].…”
Section: Introductionmentioning
confidence: 99%