On the security defects of an image encryption scheme.
Chengqing LiShujun LiMuhammad AsimJuana NunezGonzalo ÁlvarezGuanrong ChenPublished in: CoRR (2016)
Keyphrases
- image encryption scheme
- encryption scheme
- image encryption
- security analysis
- information security
- intrusion detection
- network security
- chaotic maps
- standard model
- security requirements
- chaotic sequence
- security issues
- authentication scheme
- data model
- security mechanisms
- security policies
- data sharing
- access control
- lossless compression
- public key
- private key
- distributed databases
- smart card
- information systems