Weaknesses in Security Considerations Related to Chaos-Based Image Encryption.
Thomas HütterMario PreishuberJutta Hämmerle-UhlAndreas UhlPublished in: ICICS (2016)
Keyphrases
- image encryption
- high security
- encryption algorithms
- security analysis
- chosen plaintext attack
- authentication scheme
- image scrambling
- chaotic maps
- chaotic map
- image encryption scheme
- image encryption algorithm
- private key
- public key
- cosine transform
- secret sharing scheme
- user authentication
- wireless communication
- elliptic curve cryptography
- key management
- security requirements
- distributed databases
- encryption algorithm
- authentication protocol
- encryption scheme
- information security