Cryptanalysis of image encryption with compound chaotic sequence
dc.authorid | 0000-0002-8448-9987 | |
dc.contributor.author | Solak, Ercan | en_US |
dc.date.accessioned | 2015-07-14T23:48:10Z | |
dc.date.available | 2015-07-14T23:48:10Z | |
dc.date.issued | 2009 | |
dc.department | Işık Üniversitesi, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
dc.department | Işık University, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.description.abstract | Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give chosen-plaintext and known-plaintext attacks that yield the secret parameters of the algoritm. Our simulation results show that the computational complexity of the attacks is quite low. | en_US |
dc.description.version | Publisher's Version | en_US |
dc.description.version | Author's Post-print | en_US |
dc.identifier.citation | Solak, E. (2009). Cryptanalysis of image encryption with compound chaotic sequence. Paper presented at the 2009 6th International Multi-Conference on Systems, Signals and Devices 317-321. doi:10.1109/SSD.2009.4956819 | en_US |
dc.identifier.doi | 10.1109/SSD.2009.4956819 | |
dc.identifier.endpage | 321 | |
dc.identifier.isbn | 9781424443451 | |
dc.identifier.isbn | 9781424443468 | |
dc.identifier.scopus | 2-s2.0-67650541589 | |
dc.identifier.scopusquality | N/A | |
dc.identifier.startpage | 317 | |
dc.identifier.uri | https://hdl.handle.net/11729/625 | |
dc.identifier.uri | http://dx.doi.org/10.1016/j.imavis.2008.09.004 | |
dc.identifier.wos | WOS:000271241900051 | |
dc.identifier.wosquality | N/A | |
dc.indekslendigikaynak | Web of Science | en_US |
dc.indekslendigikaynak | Scopus | en_US |
dc.indekslendigikaynak | Conference Proceedings Citation Index – Science (CPCI-S) | en_US |
dc.institutionauthor | Solak, Ercan | en_US |
dc.institutionauthorid | 0000-0002-8448-9987 | |
dc.language.iso | en | en_US |
dc.peerreviewed | Yes | en_US |
dc.publicationstatus | Published | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartof | 2009 6th International Multi-Conference on Systems, Signals and Devices | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Cryptosystems | en_US |
dc.subject | Ciphers | en_US |
dc.subject | Chaos | en_US |
dc.subject | Chaotic communication | en_US |
dc.subject | Computational complexity | en_US |
dc.subject | Computational modeling | en_US |
dc.subject | Computer vision | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Image sequence analysis | en_US |
dc.subject | Pixel | en_US |
dc.subject | Proposals | en_US |
dc.subject | Security | en_US |
dc.subject | Chosen-plaintext attacks | en_US |
dc.subject | Compound chaotic sequence | en_US |
dc.subject | Cryptanalysis | en_US |
dc.subject | Image encryption | en_US |
dc.subject | Security weaknesses | en_US |
dc.subject | Image sequences | en_US |
dc.subject | Chaotic sequence | en_US |
dc.subject | Image encryption algorithm | en_US |
dc.subject | Image encryptions | en_US |
dc.subject | Plaintext | en_US |
dc.subject | Secret parameters | en_US |
dc.subject | Simulation result | en_US |
dc.subject | Vision computing | en_US |
dc.title | Cryptanalysis of image encryption with compound chaotic sequence | en_US |
dc.type | Conference Object | en_US |
dspace.entity.type | Publication |