2010
DOI: 10.1016/j.cnsns.2009.07.007
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a new substitution–diffusion based image cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
56
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 162 publications
(56 citation statements)
references
References 11 publications
0
56
0
Order By: Relevance
“…However, some of chaotic based encryption schemes have been successfully cryptanalyzed [8,11]. Liang Zhao et.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, some of chaotic based encryption schemes have been successfully cryptanalyzed [8,11]. Liang Zhao et.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [12], an encryption scheme based on large pseudorandom permutation is proposed, which is combinatorially generated from small permutation matrices based on chaotic maps. The authors of [13] combined the chaos-based image encryption with pixel bit. This uses a single chaotic system applied directly to the position scrambling operation.…”
Section: Literature Surveymentioning
confidence: 99%
“…Therefore, such a kind of image encryption schemes can be broken by the following steps: (1) a homogeneous image with identical pixel gray value is applied eliminate the confusion effect; (2) the key streams of the diffusion process is obtained using known-plaintext, chosen-plaintext or chosen-ciphertext attacks; (3) the remaining cipher-image can be regarded as the output of a kind of permutationonly cipher, which has been shown insecure and can be broken by known-plaintext or chosen plaintext attacks [9,10]. As a matter of fact, image encryption schemes with conventional permutation-diffusion architecture have been analyzed or shown to suffer from security drawbacks [11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%