This story draft by @escholar has not been reviewed by an editor, YET.

Description of two analyzed image encryption algorithms

EScholar: Electronic Academic Papers for Scholars HackerNoon profile picture
0-item

Authors:

(1) Sheng Liu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China;

(2) Chengqing Li (Corresponding author), School of Computer Science, Xiangtan University, Xiangtan 411105, Hunan, China;

(3) Qiao Hu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China.

Table of Links

Abstract and 1. Introduction

2. Description of two analyzed image encryption algorithms

3. Cryptanalysis of IEATD

4. Cryptanalysis of IEACD

5. Conclusion, Acknowledgements, and References

2. Description of two analyzed image encryption algorithms


2.1. The framework of IEATD



2.2. The enhanced elements of IEACD compared with IEATD


To enhance the security level of IEATD, some extra operations were appended to withstand the chosen-plaintext attack reported in [13].


• The added secret sub-keys: a positive integer C, the initial condition q(0) ∈ (0, 1) and the control parameter β ∈ (3.5699456, 4] of Logistic map



• The modified encryption procedures:



This paper is available on arxiv under CC by 4.0 Deed (Attribution 4.0 International) license.


L O A D I N G
. . . comments & more!

About Author

EScholar: Electronic Academic Papers for Scholars HackerNoon profile picture
EScholar: Electronic Academic Papers for Scholars@escholar
We publish the best academic work (that's too often lost to peer reviews & the TA's desk) to the global tech community

Topics

Around The Web...

Trending Topics

blockchaincryptocurrencyhackernoon-top-storyprogrammingsoftware-developmenttechnologystartuphackernoon-booksBitcoinbooks