
handle: 11729/625
Recently, an image encryption algorithm based on compound chaotic sequence was proposed [Tong et al., Image and Vision Computing 26 (2008) 843]. In this paper, we analyze the security weaknesses of the proposal. We give chosen-plaintext and known-plaintext attacks that yield the secret parameters of the algoritm. Our simulation results show that the computational complexity of the attacks is quite low.
Image encryptions, Image sequence analysis, Image encryption, Cryptosystems, Cryptanalysis, Image encryption algorithm, Image sequences, Proposals, Chosen-plaintext attacks, Secret parameters, Security weaknesses, Ciphers, Computational modeling, Plaintext, Chaotic communication, Computational complexity, Vision computing, Compound chaotic sequence, Simulation result, Cryptography, Security, Chaos, Computer vision, Pixel, Chaotic sequence
Image encryptions, Image sequence analysis, Image encryption, Cryptosystems, Cryptanalysis, Image encryption algorithm, Image sequences, Proposals, Chosen-plaintext attacks, Secret parameters, Security weaknesses, Ciphers, Computational modeling, Plaintext, Chaotic communication, Computational complexity, Vision computing, Compound chaotic sequence, Simulation result, Cryptography, Security, Chaos, Computer vision, Pixel, Chaotic sequence
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 3 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
