Sciweavers

9 search results - page 1 / 2
» Cryptanalysis of an image encryption scheme based on a new t...
Sort
View
CORR
2007
Springer
106views Education» more  CORR 2007»
13 years 4 months ago
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
David Arroyo, Chengqing Li, Shujun Li, Gonzalo &Aa...
IVC
2006
156views more  IVC 2006»
13 years 4 months ago
Image encryption using chaotic logistic map
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques.Inthis communication,weproposea ...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
13 years 10 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
13 years 11 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
IWDW
2004
Springer
13 years 10 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...