Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
| dc.contributor.author | Li, Chengqing | deu |
| dc.contributor.author | Li, Shujun | |
| dc.contributor.author | Chen, Guanrong | deu |
| dc.contributor.author | Halang, Wolfgang A. | deu |
| dc.date.accessioned | 2011-03-24T16:10:25Z | deu |
| dc.date.available | 2011-03-24T16:10:25Z | deu |
| dc.date.issued | 2009 | deu |
| dc.description.abstract | Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a number of weak keys and some equivalent keys for encryption; (3) the scheme is not sensitive to the changes of plain-images; and (4) the compound chaotic sequence does not work as a good random number source. | eng |
| dc.description.version | published | |
| dc.format.mimetype | application/pdf | deu |
| dc.identifier.citation | Publ. in: Image and Vision Computing 27 (2009), 8, pp. 1035-1039 | deu |
| dc.identifier.doi | 10.1016/j.imavis.2008.09.004 | |
| dc.identifier.ppn | 335645321 | deu |
| dc.identifier.uri | http://kops.uni-konstanz.de/handle/123456789/6233 | |
| dc.language.iso | eng | deu |
| dc.legacy.dateIssued | 2011 | deu |
| dc.rights | terms-of-use | deu |
| dc.rights.uri | https://rightsstatements.org/page/InC/1.0/ | deu |
| dc.subject | Cryptanalysis | deu |
| dc.subject | Image encryption | deu |
| dc.subject | Chaos | deu |
| dc.subject | Differential chosen-plaintext attack | deu |
| dc.subject | Randomness test | deu |
| dc.subject.ddc | 004 | deu |
| dc.title | Cryptanalysis of an image encryption scheme based on a compound chaotic sequence | eng |
| dc.type | JOURNAL_ARTICLE | deu |
| dspace.entity.type | Publication | |
| kops.citation.bibtex | @article{Li2009Crypt-6233,
year={2009},
doi={10.1016/j.imavis.2008.09.004},
title={Cryptanalysis of an image encryption scheme based on a compound chaotic sequence},
number={8},
volume={27},
journal={Image and Vision Computing},
pages={1035--1039},
author={Li, Chengqing and Li, Shujun and Chen, Guanrong and Halang, Wolfgang A.}
} | |
| kops.citation.iso690 | LI, Chengqing, Shujun LI, Guanrong CHEN, Wolfgang A. HALANG, 2009. Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. In: Image and Vision Computing. 2009, 27(8), pp. 1035-1039. Available under: doi: 10.1016/j.imavis.2008.09.004 | deu |
| kops.citation.iso690 | LI, Chengqing, Shujun LI, Guanrong CHEN, Wolfgang A. HALANG, 2009. Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. In: Image and Vision Computing. 2009, 27(8), pp. 1035-1039. Available under: doi: 10.1016/j.imavis.2008.09.004 | eng |
| kops.citation.rdf | <rdf:RDF
xmlns:dcterms="http://purl.org/dc/terms/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:bibo="http://purl.org/ontology/bibo/"
xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
xmlns:foaf="http://xmlns.com/foaf/0.1/"
xmlns:void="http://rdfs.org/ns/void#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#" >
<rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/6233">
<dc:contributor>Halang, Wolfgang A.</dc:contributor>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dc:creator>Li, Shujun</dc:creator>
<dc:contributor>Li, Shujun</dc:contributor>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/52"/>
<dcterms:title>Cryptanalysis of an image encryption scheme based on a compound chaotic sequence</dcterms:title>
<bibo:uri rdf:resource="http://kops.uni-konstanz.de/handle/123456789/6233"/>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dcterms:abstract xml:lang="eng">Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a number of weak keys and some equivalent keys for encryption; (3) the scheme is not sensitive to the changes of plain-images; and (4) the compound chaotic sequence does not work as a good random number source.</dcterms:abstract>
<dcterms:rights rdf:resource="https://rightsstatements.org/page/InC/1.0/"/>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/52"/>
<dc:contributor>Chen, Guanrong</dc:contributor>
<dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6233/1/Li0IVC2009a.pdf"/>
<dc:creator>Halang, Wolfgang A.</dc:creator>
<dc:creator>Li, Chengqing</dc:creator>
<dcterms:bibliographicCitation>Publ. in: Image and Vision Computing 27 (2009), 8, pp. 1035-1039</dcterms:bibliographicCitation>
<dcterms:issued>2009</dcterms:issued>
<dc:contributor>Li, Chengqing</dc:contributor>
<dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:25Z</dc:date>
<dc:rights>terms-of-use</dc:rights>
<dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2011-03-24T16:10:25Z</dcterms:available>
<dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/6233/1/Li0IVC2009a.pdf"/>
<dc:format>application/pdf</dc:format>
<void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
<dc:language>eng</dc:language>
<foaf:homepage rdf:resource="http://localhost:8080/"/>
<dc:creator>Chen, Guanrong</dc:creator>
</rdf:Description>
</rdf:RDF> | |
| kops.description.openAccess | openaccessgreen | |
| kops.flag.knbibliography | true | |
| kops.identifier.nbn | urn:nbn:de:bsz:352-opus-127111 | deu |
| kops.opus.id | 12711 | deu |
| kops.sourcefield | Image and Vision Computing. 2009, <b>27</b>(8), pp. 1035-1039. Available under: doi: 10.1016/j.imavis.2008.09.004 | deu |
| kops.sourcefield.plain | Image and Vision Computing. 2009, 27(8), pp. 1035-1039. Available under: doi: 10.1016/j.imavis.2008.09.004 | deu |
| kops.sourcefield.plain | Image and Vision Computing. 2009, 27(8), pp. 1035-1039. Available under: doi: 10.1016/j.imavis.2008.09.004 | eng |
| relation.isAuthorOfPublication | a28da8dd-b635-4125-ad86-10cedb27efba | |
| relation.isAuthorOfPublication.latestForDiscovery | a28da8dd-b635-4125-ad86-10cedb27efba | |
| source.bibliographicInfo.fromPage | 1035 | |
| source.bibliographicInfo.issue | 8 | |
| source.bibliographicInfo.toPage | 1039 | |
| source.bibliographicInfo.volume | 27 | |
| source.periodicalTitle | Image and Vision Computing |
Dateien
Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
- Name:
- Li0IVC2009a.pdf
- Größe:
- 410.69 KB
- Format:
- Adobe Portable Document Format
