Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a numbe...
Saved in:
Published in | Image and vision computing Vol. 27; no. 8; pp. 1035 - 1039 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
02.07.2009
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a number of weak keys and some equivalent keys for encryption; (3) the scheme is not sensitive to the changes of plain-images; and (4) the compound chaotic sequence does not work as a good random number source. |
---|---|
AbstractList | Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a number of weak keys and some equivalent keys for encryption; (3) the scheme is not sensitive to the changes of plain-images; and (4) the compound chaotic sequence does not work as a good random number source. |
Author | Li, Shujun Li, Chengqing Halang, Wolfgang A. Chen, Guanrong |
Author_xml | – sequence: 1 givenname: Chengqing surname: Li fullname: Li, Chengqing email: zjulcq@gmail.com organization: Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong, China – sequence: 2 givenname: Shujun surname: Li fullname: Li, Shujun organization: Fachbereich Informatik und Informationswissenschaft, Universität Konstanz, Universitätsstraße 10, 78457 Konstanz, Germany – sequence: 3 givenname: Guanrong surname: Chen fullname: Chen, Guanrong organization: Department of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong SAR, China – sequence: 4 givenname: Wolfgang A. surname: Halang fullname: Halang, Wolfgang A. organization: FernUniversität in Hagen, Lehrstuhl für Informationstechnik, 58084 Hagen, Germany |
BookMark | eNp9kE9PwzAMxSM0JLbBN-CQG6cWp2mb9IKEJv5Jk-AA5yhNXZapbUbSTdq3J1U5c7It-z3r_VZkMbgBCbllkDJg5f0-tb0-2ZBmADKFKgXIL8iSSZElknG5IEvIytjLorwiqxD2ACBAVEvysfHnw6gH3Z2DDdS1VA80un0jxcFMO-sGGswOe6S1DtjQOGtqXH9wx6GhZqfdaA0N-HOMCrwml63uAt781TX5en763Lwm2_eXt83jNjFc5mPCsZXCVLot6jLLpUatkZtGZiJrG-C5YC3LudCNqHMuq7xsEbHmpsokL8oa-Jrczb4H7-LnMKreBoNdpwd0x6CqCEaCkEW8zOdL410IHlt18DGhPysGauKn9mrmpyZ-CioV-UXZwyzDmOJk0atg7JSwsR7NqBpn_zf4BeK_ff8 |
CitedBy_id | crossref_primary_10_1088_1757_899X_495_1_012041 crossref_primary_10_1016_j_cageo_2024_105530 crossref_primary_10_1364_OE_23_003035 crossref_primary_10_1007_s11042_017_4885_5 crossref_primary_10_1016_j_ijleo_2018_12_103 crossref_primary_10_1016_j_physleta_2010_12_065 crossref_primary_10_32604_iasc_2023_030597 crossref_primary_10_4236_jsea_2015_812059 crossref_primary_10_1088_1674_1056_25_5_054201 crossref_primary_10_1109_ACCESS_2019_2893760 crossref_primary_10_1007_s11071_018_4251_9 crossref_primary_10_1016_j_cnsns_2010_05_008 crossref_primary_10_1142_S021812741750033X crossref_primary_10_1007_s11045_020_00730_3 crossref_primary_10_1016_j_optcom_2011_02_039 crossref_primary_10_1016_j_jestch_2019_09_001 crossref_primary_10_1016_j_cnsns_2011_11_030 crossref_primary_10_1016_j_advengsoft_2012_03_001 crossref_primary_10_1007_s11042_022_13350_9 crossref_primary_10_1007_s11042_020_10014_4 crossref_primary_10_1002_ett_4034 crossref_primary_10_1016_j_aci_2017_07_002 crossref_primary_10_1007_s11042_021_10522_x crossref_primary_10_1177_1077546317734712 crossref_primary_10_1007_s11042_017_4455_x crossref_primary_10_1016_j_optcom_2011_07_070 crossref_primary_10_1016_j_ijleo_2012_06_020 crossref_primary_10_1016_j_sigpro_2015_05_013 crossref_primary_10_3390_e16020770 crossref_primary_10_1155_2018_4585083 crossref_primary_10_1007_s11042_020_09815_4 crossref_primary_10_1016_j_jss_2012_04_031 crossref_primary_10_1007_s00521_019_04668_x crossref_primary_10_1142_S0218127411029641 crossref_primary_10_1007_s42835_020_00393_x crossref_primary_10_3182_20090622_3_UK_3004_00034 crossref_primary_10_1016_j_sigpro_2014_10_033 crossref_primary_10_1109_TCSI_2019_2934714 crossref_primary_10_1016_j_ijleo_2016_05_127 crossref_primary_10_1016_j_sigpro_2013_10_034 crossref_primary_10_1016_j_ijleo_2016_07_017 crossref_primary_10_1142_S0218127418501146 crossref_primary_10_1142_S0218127416500917 crossref_primary_10_1007_s11071_012_0626_5 crossref_primary_10_1016_j_image_2015_06_005 crossref_primary_10_1016_j_image_2013_09_009 crossref_primary_10_1016_j_cnsns_2013_02_011 crossref_primary_10_1142_S0218127416501923 crossref_primary_10_1007_s11042_020_10289_7 crossref_primary_10_1007_s11071_015_2008_2 crossref_primary_10_3390_e21111075 crossref_primary_10_1016_j_ins_2020_12_065 crossref_primary_10_1016_j_optlaseng_2013_01_001 crossref_primary_10_1007_s11071_014_1533_8 crossref_primary_10_1016_j_cnsns_2010_04_010 crossref_primary_10_1016_j_dsp_2013_10_020 crossref_primary_10_1016_j_ijleo_2012_11_002 crossref_primary_10_1088_0253_6102_58_4_13 crossref_primary_10_1016_j_cnsns_2009_11_010 crossref_primary_10_1093_jigpal_jzac008 crossref_primary_10_1016_j_optcom_2011_08_079 crossref_primary_10_1007_s11042_021_10751_0 crossref_primary_10_1007_s11071_017_3698_4 crossref_primary_10_1016_j_eswa_2015_06_035 crossref_primary_10_3390_e22010112 crossref_primary_10_1088_1674_1056_27_3_030502 crossref_primary_10_1016_j_asoc_2015_08_008 crossref_primary_10_1016_j_dsp_2013_01_005 crossref_primary_10_1016_j_cnsns_2010_06_009 crossref_primary_10_1142_S0218348X2150064X crossref_primary_10_1016_j_inffus_2020_04_009 crossref_primary_10_1016_j_image_2015_03_003 crossref_primary_10_1016_j_image_2014_06_012 crossref_primary_10_1109_ACCESS_2020_3043450 crossref_primary_10_1007_s11042_019_07893_7 crossref_primary_10_1109_ACCESS_2020_2991420 crossref_primary_10_1016_j_image_2012_12_009 crossref_primary_10_1016_j_sigpro_2018_02_028 crossref_primary_10_1007_s11042_020_09533_x crossref_primary_10_1109_ACCESS_2024_3354170 crossref_primary_10_1155_2014_602921 |
Cites_doi | 10.6028/NIST.SP.800-22 10.1016/j.jss.2007.07.037 10.1142/S0218127406015970 10.1016/S1383-7621(03)00087-0 10.1201/9781420038262-4 10.1016/j.imavis.2007.09.005 10.1016/j.imavis.2006.02.021 10.1016/j.chaos.2003.12.022 |
ContentType | Journal Article |
Copyright | 2008 Elsevier B.V. |
Copyright_xml | – notice: 2008 Elsevier B.V. |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.imavis.2008.09.004 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences Engineering |
EISSN | 1872-8138 |
EndPage | 1039 |
ExternalDocumentID | 10_1016_j_imavis_2008_09_004 S026288560800190X |
GroupedDBID | --K --M .~1 0R~ 1B1 1~. 1~5 29I 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFNM ABFRF ABJNI ABMAC ABOCM ABTAH ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F0J F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG RNS ROL RPZ SBC SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TN5 UHS UNMZH VOH WUQ XFK XPP ZMT ZY4 ~G- AAXKI AAYXX AFJKZ AKRWK CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c384t-3ef87c9af5b6248aeaae3cd8272fd03471f1437ad7b438946feeeb3c928356b03 |
IEDL.DBID | AIKHN |
ISSN | 0262-8856 |
IngestDate | Sat Aug 17 03:59:13 EDT 2024 Thu Sep 26 16:31:58 EDT 2024 Fri Feb 23 02:23:39 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 8 |
Keywords | Chaos Cryptanalysis Image encryption Differential chosen-plaintext attack Randomness test |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c384t-3ef87c9af5b6248aeaae3cd8272fd03471f1437ad7b438946feeeb3c928356b03 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
OpenAccessLink | http://arxiv.org/pdf/0712.3964 |
PQID | 901680785 |
PQPubID | 23500 |
PageCount | 5 |
ParticipantIDs | proquest_miscellaneous_901680785 crossref_primary_10_1016_j_imavis_2008_09_004 elsevier_sciencedirect_doi_10_1016_j_imavis_2008_09_004 |
PublicationCentury | 2000 |
PublicationDate | 2009-07-02 |
PublicationDateYYYYMMDD | 2009-07-02 |
PublicationDate_xml | – month: 07 year: 2009 text: 2009-07-02 day: 02 |
PublicationDecade | 2000 |
PublicationTitle | Image and vision computing |
PublicationYear | 2009 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Álvarez, Li (bib12) 2006; 16 Li, Li, Chen, Chen, Hu (bib7) 2005; 2005 S. Li, G. Chen, X. Zheng, Chaos-based encryption for digital images and videos, in: B. Furht, D. Kirovski (Eds.), Multimedia Security Handbook, CRC Press, LLC, 2004, pp. 133–167, the preprint is available at (1994). Li, Li, Chen, Lo (bib9) 2008; 81 C. Li, S. Li, M. Asim, J. Nuñez, G. Álvarez, G. Chen, On the security defects of an image encryption scheme, IACR’s Cryptology ePrint Archive: Report 2007/397, Available online at A. Rukhin et al., A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, available online at Li, Li, Chen, Bourbakis, Lo (bib6) 2008; 23 J.-C. Yen, J.-I. Guo, A new chaotic key-based design for image encryption and decryption, in: Proc. IEEE Int. Conf. Circuits and Systems, vol. 4, 2000, pp. 49–52. Pareek, Patidar, Sud (bib5) 2006; 24 (2001). (2002). Menezes, van Oorschot, Vanstone (bib15) 1996 S. Li, X. Zheng, Cryptanalysis of a chaotic image encryption method, in: Proc. IEEE Int. Symposium on Circuits and Systems, vol. II, 2002, pp. 708–711. (2007). Chen, Guo, Huang, Yen (bib3) 2003; 2003 Chen, Yen (bib2) 2003; 49 (Chapter 4). Chen, Mao, Chui (bib4) 2004; 21 NIST, Security requirements for cryptographic modules, Federal Information Processing Standards Publication (FIPS PUB) 140-2, available online at Tong, Cui (bib13) 2008; 26 NIST, Security requirements for cryptographic modules, Federal Information Processing Standards Publication (FIPS PUB) 140-1, available online at 10.1016/j.imavis.2008.09.004_bib14 10.1016/j.imavis.2008.09.004_bib11 Chen (10.1016/j.imavis.2008.09.004_bib3) 2003; 2003 10.1016/j.imavis.2008.09.004_bib17 Chen (10.1016/j.imavis.2008.09.004_bib2) 2003; 49 10.1016/j.imavis.2008.09.004_bib16 Tong (10.1016/j.imavis.2008.09.004_bib13) 2008; 26 10.1016/j.imavis.2008.09.004_bib10 10.1016/j.imavis.2008.09.004_bib8 Menezes (10.1016/j.imavis.2008.09.004_bib15) 1996 10.1016/j.imavis.2008.09.004_bib1 Álvarez (10.1016/j.imavis.2008.09.004_bib12) 2006; 16 Li (10.1016/j.imavis.2008.09.004_bib9) 2008; 81 Pareek (10.1016/j.imavis.2008.09.004_bib5) 2006; 24 Li (10.1016/j.imavis.2008.09.004_bib7) 2005; 2005 Chen (10.1016/j.imavis.2008.09.004_bib4) 2004; 21 Li (10.1016/j.imavis.2008.09.004_bib6) 2008; 23 |
References_xml | – volume: 2005 start-page: 1277 year: 2005 end-page: 1288 ident: bib7 article-title: Cryptanalysis of a new signal security system for multimedia data transmission publication-title: EURASIP Journal on Applied Signal Processing contributor: fullname: Hu – volume: 49 start-page: 355 year: 2003 end-page: 367 ident: bib2 article-title: A new cryptography system and its VLSI realization publication-title: Journal of Systems and Architecture contributor: fullname: Yen – volume: 2003 start-page: 1291 year: 2003 end-page: 1305 ident: bib3 article-title: Design and realization of a new signal security system for multimedia data transmission publication-title: EURASIP Journal on Applied Signal Processing contributor: fullname: Yen – volume: 21 start-page: 749 year: 2004 end-page: 761 ident: bib4 article-title: A symmetric image encryption scheme based on 3D chaotic cat maps publication-title: Chaos, Solitons & Fractals contributor: fullname: Chui – year: 1996 ident: bib15 article-title: Handbook of Applied Cryptography contributor: fullname: Vanstone – volume: 81 start-page: 1130 year: 2008 end-page: 1143 ident: bib9 article-title: Cryptanalysis of RCES/RSES image encryption scheme publication-title: Journal of Systems and Software contributor: fullname: Lo – volume: 23 start-page: 212 year: 2008 end-page: 223 ident: bib6 article-title: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks publication-title: Signal Processing: Image Communication contributor: fullname: Lo – volume: 16 start-page: 2129 year: 2006 end-page: 2151 ident: bib12 article-title: Some basic cryptographic requirements for chaos-based cryptosystems publication-title: International Journal of Bifurcation and Chaos contributor: fullname: Li – volume: 26 start-page: 843 year: 2008 end-page: 850 ident: bib13 article-title: Image encryption with compound chaotic sequence cipher shifting dynamically publication-title: Image and Vision Computing contributor: fullname: Cui – volume: 24 start-page: 926 year: 2006 end-page: 934 ident: bib5 article-title: Image encryption using chaotic logistic map publication-title: Image and Vision Computing contributor: fullname: Sud – ident: 10.1016/j.imavis.2008.09.004_bib14 – ident: 10.1016/j.imavis.2008.09.004_bib17 doi: 10.6028/NIST.SP.800-22 – volume: 81 start-page: 1130 issue: 7 year: 2008 ident: 10.1016/j.imavis.2008.09.004_bib9 article-title: Cryptanalysis of RCES/RSES image encryption scheme publication-title: Journal of Systems and Software doi: 10.1016/j.jss.2007.07.037 contributor: fullname: Li – ident: 10.1016/j.imavis.2008.09.004_bib1 – ident: 10.1016/j.imavis.2008.09.004_bib16 – volume: 16 start-page: 2129 issue: 8 year: 2006 ident: 10.1016/j.imavis.2008.09.004_bib12 article-title: Some basic cryptographic requirements for chaos-based cryptosystems publication-title: International Journal of Bifurcation and Chaos doi: 10.1142/S0218127406015970 contributor: fullname: Álvarez – volume: 49 start-page: 355 year: 2003 ident: 10.1016/j.imavis.2008.09.004_bib2 article-title: A new cryptography system and its VLSI realization publication-title: Journal of Systems and Architecture doi: 10.1016/S1383-7621(03)00087-0 contributor: fullname: Chen – ident: 10.1016/j.imavis.2008.09.004_bib10 – ident: 10.1016/j.imavis.2008.09.004_bib11 doi: 10.1201/9781420038262-4 – volume: 26 start-page: 843 issue: 6 year: 2008 ident: 10.1016/j.imavis.2008.09.004_bib13 article-title: Image encryption with compound chaotic sequence cipher shifting dynamically publication-title: Image and Vision Computing doi: 10.1016/j.imavis.2007.09.005 contributor: fullname: Tong – volume: 2003 start-page: 1291 issue: 13 year: 2003 ident: 10.1016/j.imavis.2008.09.004_bib3 article-title: Design and realization of a new signal security system for multimedia data transmission publication-title: EURASIP Journal on Applied Signal Processing contributor: fullname: Chen – volume: 24 start-page: 926 issue: 9 year: 2006 ident: 10.1016/j.imavis.2008.09.004_bib5 article-title: Image encryption using chaotic logistic map publication-title: Image and Vision Computing doi: 10.1016/j.imavis.2006.02.021 contributor: fullname: Pareek – ident: 10.1016/j.imavis.2008.09.004_bib8 – year: 1996 ident: 10.1016/j.imavis.2008.09.004_bib15 contributor: fullname: Menezes – volume: 21 start-page: 749 issue: 3 year: 2004 ident: 10.1016/j.imavis.2008.09.004_bib4 article-title: A symmetric image encryption scheme based on 3D chaotic cat maps publication-title: Chaos, Solitons & Fractals doi: 10.1016/j.chaos.2003.12.022 contributor: fullname: Chen – volume: 23 start-page: 212 issue: 3 year: 2008 ident: 10.1016/j.imavis.2008.09.004_bib6 article-title: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks publication-title: Signal Processing: Image Communication contributor: fullname: Li – volume: 2005 start-page: 1277 issue: 8 year: 2005 ident: 10.1016/j.imavis.2008.09.004_bib7 article-title: Cryptanalysis of a new signal security system for multimedia data transmission publication-title: EURASIP Journal on Applied Signal Processing contributor: fullname: Li |
SSID | ssj0007079 |
Score | 2.3384705 |
Snippet | Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 1035 |
SubjectTerms | Chaos Chaos theory Cryptanalysis Differential chosen-plaintext attack Encryption Equivalence Image encryption Keys Random numbers Randomness test Security Vision |
Title | Cryptanalysis of an image encryption scheme based on a compound chaotic sequence |
URI | https://dx.doi.org/10.1016/j.imavis.2008.09.004 https://search.proquest.com/docview/901680785 |
Volume | 27 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFH_M7aIHP6bi_Bg5eK3bmrRJjmM4puIQdLBbSdNEJ6wb-zh48W_3ZU1FBRE8tmna8F7ze78k7wPgkoWZ4KlmQZohBCIDF4ESjAYhN0KmuqMj6aKR74fxYMRux9G4Ar0yFsa5VXrsLzB9g9b-TstLszWfTFqPuHoIhUCLLRxPaY-3oIbmiLEq1Lo3d4PhJyC7JHDFVgtOfuxQRtBt3LwmUxfN750qXe5K9puF-oHVGwPU34ddzxxJtxjcAVRMXoc9zyKJn6PLOux8STF4CA-9xdscCWCReoTMLFE5wdE8G4LPuzZUDMElrpka4kxaRvBaEedq7iouEf2iZvhFUvpcH8Gof_3UGwS-ikKgqWCrgBoruJbKRmkcMqGMUobqTIQ8tFmbonGyyJm4ynjqKqGz2BqDK2wtXSa2OG3TY6jms9ycAJGoRSFonNLIMqGltEJajpyFcmzJOg0ISskl8yJZRlJ6kb0mhaR93UuZoKQbwEvxJt-UniCe_9GTlNpIcD64Qw6Vm9l6mSC_iV0O_ej03y8_g-3izIgH7fAcqqvF2lwg9VilTdi6eu80_Q_2AQGV2K4 |
link.rule.ids | 315,786,790,4521,24144,27957,27958,45620,45714 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB1BewAO7Iiy-sA1ahs7sX1EFagsrZAAqTfLcWwoUtOqy4G_Z9w4CJAQEsfEcWLNxG-e7VkALlicC54ZFmU5QiAycBFpwWgUcytkZtomkT4auddPu8_sdpAMVqBTxcJ4t8qA_SWmL9E63GkGaTYnw2HzEVcPsRBosYXnKa3BKtRZwtusBvXLm7tu_xOQfRK4cqsFJz92qCLolm5ew5GP5g9OlT53JfvNQv3A6qUBut6GzcAcyWU5uB1YscUubAUWScIcne3CxpcUg3vw0Jm-T5AAlqlHyNgRXRAczYsl-LxvQ8UQXOLakSXepOUErzXxrua-4hIxr3qMXySVz_U-PF9fPXW6UaiiEBkq2Dyi1glupHZJlsZMaKu1pSYXMY9d3qJonBxyJq5znvlK6Cx11uIK20ifiS3NWvQAasW4sIdAJGpRCJpmNHFMGCmdkI4jZ6EcW_J2A6JKcmpSJstQlRfZmyolHepeSoWSbgCvxKu-KV0hnv_Rk1TaUDgf_CGHLux4MVPIb1KfQz85-vfLz2Gt-9S7V_c3_btjWC_Pj3jUik-gNp8u7CnSkHl2Fn6zDz1L2qA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+an+image+encryption+scheme+based+on+a+compound+chaotic+sequence&rft.jtitle=Image+and+vision+computing&rft.au=Li%2C+Chengqing&rft.au=Li%2C+Shujun&rft.au=Chen%2C+Guanrong&rft.au=Halang%2C+Wolfgang+A&rft.date=2009-07-02&rft.issn=0262-8856&rft.volume=27&rft.issue=8&rft.spage=1035&rft.epage=1039&rft_id=info:doi/10.1016%2Fj.imavis.2008.09.004&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0262-8856&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0262-8856&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0262-8856&client=summon |