Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/4363
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Electronic and Information Engineering | - |
dc.creator | Li, S | - |
dc.creator | Li, C | - |
dc.creator | Lo, KT | - |
dc.creator | Chen, G | - |
dc.date.accessioned | 2014-12-11T08:27:32Z | - |
dc.date.available | 2014-12-11T08:27:32Z | - |
dc.identifier.issn | 1017-9909 | - |
dc.identifier.uri | http://hdl.handle.net/10397/4363 | - |
dc.language.iso | en | en_US |
dc.publisher | SPIE-International Society for Optical Engineering | en_US |
dc.rights | Copyright 2006 Society of Photo-Optical Instrumentation Engineers and IS&T. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. | en_US |
dc.subject | Image coding | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Data compression | en_US |
dc.title | Cryptanalysis of an image encryption scheme | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 13 | - |
dc.identifier.volume | 15 | - |
dc.identifier.issue | 4 | - |
dc.identifier.doi | 10.1117/1.2360697 | - |
dcterms.abstract | We present cryptanalysis of an image encryption scheme, which is based on the base-switching (BS) lossless compression algorithm. The following conclusions are reached: 1. the size of the key space, i.e., the security against brute-force attacks, was greatly overestimated by the designers; and 2. the scheme is not secure against known/chosen-plaintext/ciphertext attacks. A real example is given to show the feasibility of a proposed chosen-plaintext attack. In addition, some other minor problems of the joint compression-encryption scheme are also pointed out. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | Journal of electronic imaging, Oct.-Dec. 2006, v. 15, no. 4, 043012, p. 1-13 | - |
dcterms.isPartOf | Journal of electronic imaging | - |
dcterms.issued | 2006-10 | - |
dc.identifier.isi | WOS:000244002500024 | - |
dc.identifier.scopus | 2-s2.0-33847647116 | - |
dc.identifier.eissn | 1560-229X | - |
dc.identifier.rosgroupid | r34344 | - |
dc.description.ros | 2006-2007 > Academic research: refereed > Publication in refereed journal | - |
dc.description.oa | Version of Record | en_US |
dc.identifier.FolderNumber | OA_IR/PIRA | en_US |
dc.description.pubStatus | Published | en_US |
dc.description.oaCategory | VoR allowed | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Li_Cryptanalysis_image_encryption.pdf | 239.72 kB | Adobe PDF | View/Open |
Page views
222
Last Week
1
1
Last month
Citations as of Sep 22, 2024
Downloads
181
Citations as of Sep 22, 2024
SCOPUSTM
Citations
20
Last Week
0
0
Last month
0
0
Citations as of Sep 19, 2024
WEB OF SCIENCETM
Citations
12
Last Week
0
0
Last month
0
0
Citations as of Sep 26, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.