Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem

As a fundamental of number theory, Chinese Re1 minder Theorem (CRT) is widely used to construct cryptographic 2 primitive. This paper studies security of a compression and 3 encryption scheme based on CRT, called CECRT. Based on 4 some properties of CRT, the equivalent secret key of CECRT 5 can be reconstructed efficiently: the pair number of required 6 of chosen plaintext and the corresponding...

متن کامل

Robust Threshold Schemes Based on the Chinese Remainder Theorem

Recently, Chinese Remainder Theorem (CRT) based function sharing schemes are proposed in the literature. In this paper, we investigate how a CRT-based threshold scheme can be enhanced with the robustness property. To the best of our knowledge, these are the first robust threshold cryptosystems based on a CRT-based secret sharing.

متن کامل

Information technology Image encryption algorithm based on chaotic mapping and Chinese remainder theorem

When the image data are regularly changed, existing image encryption algorithm is easy to be decrypted. In order to improve the security of encryption algorithm, this paper proposes an image encryption algorithm based on chaotic mapping and Chinese remainder theorem. The encryption algorithm is divided into pixel scrambling and image diffusion. Firstly, the Chebyshev mapping is used to generate...

متن کامل

A New Chinese Remainder Algorithm for Image-based Encryption

In this paper, a novel method for image encryption based on a Generalized Chinese Remainder Theorem (GCRT) is presented. The proposed method is based on the work developed by Jagannathan et al. Some modifications are proposed in order to increase the method's encryption quality and its robustness against attacks. Specifically, the inclusion of a vector to reduce the segment pixel space and a Ge...

متن کامل

IP traceback based on chinese remainder theorem

IP traceback is a defense method to help a victim to identifying the sources of attacking packets. In this paper, we propose an IP traceback method based on the Chinese Remainder Theorem to require routers to probabilistically mark packets with partial path information when packets traverse routers through the Internet. The routers with the proposed IP traceback method can interoperate seamless...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Signal Processing: Image Communication

سال: 2014

ISSN: 0923-5965

DOI: 10.1016/j.image.2014.06.011