2004
DOI: 10.1016/s0960-0779(03)00260-1
|View full text |Cite
|
Sign up to set email alerts
|

Improving the security of chaotic encryption by using a simple modulating method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0

Year Published

2004
2004
2018
2018

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(41 citation statements)
references
References 12 publications
0
41
0
Order By: Relevance
“…The lack of security of the encryption method proposed in [21] is made evident, since it can be broken without knowing its parameter values and even without knowing the transmitter's precise structure. A new method that can retrieve the plaintext and determine part of the key directly from the ciphertext has been devised.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The lack of security of the encryption method proposed in [21] is made evident, since it can be broken without knowing its parameter values and even without knowing the transmitter's precise structure. A new method that can retrieve the plaintext and determine part of the key directly from the ciphertext has been devised.…”
Section: Resultsmentioning
confidence: 99%
“…In the encryption method proposed in [21] the ciphertext signal s(x, t) = A cos(ωt + ϕ 0 ) x 1 (t) x 3 (t) shows a crowded frequency power spectrum as is illustrated in Fig. 5(a).…”
Section: Modulating Signal Cancellationmentioning
confidence: 99%
“…Matthews proposed a chaotic encryption algorithm in 1989 [9]. Since then, researches of image encryption technology which are based on chaotic systems are increased [10][11][12][13][14]. These methods have high-level efficiency but also weakness, such as small key space, weak security and complexity to overcome these drawbacks.…”
Section: Introductionmentioning
confidence: 99%
“…The insecurity was shown for other methods, in particular, for CSK [2,3], parametric modulation [2], and inclusion method [2]. Modification to these methods [4,5] have also been proposed but to no avail [6,7]. Other proposed methods based on the projective synchronization [8], phase synchronization [9], generalized synchronized were broken as well [10,11].…”
Section: Introductionmentioning
confidence: 99%