Cryptanalysis of an image encryption scheme based on a compound chaotic sequence

Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a numbe...

Full description

Saved in:
Bibliographic Details
Published inImage and vision computing Vol. 27; no. 8; pp. 1035 - 1039
Main Authors Li, Chengqing, Li, Shujun, Chen, Guanrong, Halang, Wolfgang A.
Format Journal Article
LanguageEnglish
Published Elsevier B.V 02.07.2009
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a number of weak keys and some equivalent keys for encryption; (3) the scheme is not sensitive to the changes of plain-images; and (4) the compound chaotic sequence does not work as a good random number source.
AbstractList Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following problems are found: (1) a differential chosen-plaintext attack can break the scheme with only three chosen plain-images; (2) there is a number of weak keys and some equivalent keys for encryption; (3) the scheme is not sensitive to the changes of plain-images; and (4) the compound chaotic sequence does not work as a good random number source.
Author Li, Shujun
Li, Chengqing
Halang, Wolfgang A.
Chen, Guanrong
Author_xml – sequence: 1
  givenname: Chengqing
  surname: Li
  fullname: Li, Chengqing
  email: zjulcq@gmail.com
  organization: Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong, China
– sequence: 2
  givenname: Shujun
  surname: Li
  fullname: Li, Shujun
  organization: Fachbereich Informatik und Informationswissenschaft, Universität Konstanz, Universitätsstraße 10, 78457 Konstanz, Germany
– sequence: 3
  givenname: Guanrong
  surname: Chen
  fullname: Chen, Guanrong
  organization: Department of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong SAR, China
– sequence: 4
  givenname: Wolfgang A.
  surname: Halang
  fullname: Halang, Wolfgang A.
  organization: FernUniversität in Hagen, Lehrstuhl für Informationstechnik, 58084 Hagen, Germany
BookMark eNp9kE9PwzAMxSM0JLbBN-CQG6cWp2mb9IKEJv5Jk-AA5yhNXZapbUbSTdq3J1U5c7It-z3r_VZkMbgBCbllkDJg5f0-tb0-2ZBmADKFKgXIL8iSSZElknG5IEvIytjLorwiqxD2ACBAVEvysfHnw6gH3Z2DDdS1VA80un0jxcFMO-sGGswOe6S1DtjQOGtqXH9wx6GhZqfdaA0N-HOMCrwml63uAt781TX5en763Lwm2_eXt83jNjFc5mPCsZXCVLot6jLLpUatkZtGZiJrG-C5YC3LudCNqHMuq7xsEbHmpsokL8oa-Jrczb4H7-LnMKreBoNdpwd0x6CqCEaCkEW8zOdL410IHlt18DGhPysGauKn9mrmpyZ-CioV-UXZwyzDmOJk0atg7JSwsR7NqBpn_zf4BeK_ff8
CitedBy_id crossref_primary_10_1088_1757_899X_495_1_012041
crossref_primary_10_1016_j_cageo_2024_105530
crossref_primary_10_1364_OE_23_003035
crossref_primary_10_1007_s11042_017_4885_5
crossref_primary_10_1016_j_ijleo_2018_12_103
crossref_primary_10_1016_j_physleta_2010_12_065
crossref_primary_10_32604_iasc_2023_030597
crossref_primary_10_4236_jsea_2015_812059
crossref_primary_10_1088_1674_1056_25_5_054201
crossref_primary_10_1109_ACCESS_2019_2893760
crossref_primary_10_1007_s11071_018_4251_9
crossref_primary_10_1016_j_cnsns_2010_05_008
crossref_primary_10_1142_S021812741750033X
crossref_primary_10_1007_s11045_020_00730_3
crossref_primary_10_1016_j_optcom_2011_02_039
crossref_primary_10_1016_j_jestch_2019_09_001
crossref_primary_10_1016_j_cnsns_2011_11_030
crossref_primary_10_1016_j_advengsoft_2012_03_001
crossref_primary_10_1007_s11042_022_13350_9
crossref_primary_10_1007_s11042_020_10014_4
crossref_primary_10_1002_ett_4034
crossref_primary_10_1016_j_aci_2017_07_002
crossref_primary_10_1007_s11042_021_10522_x
crossref_primary_10_1177_1077546317734712
crossref_primary_10_1007_s11042_017_4455_x
crossref_primary_10_1016_j_optcom_2011_07_070
crossref_primary_10_1016_j_ijleo_2012_06_020
crossref_primary_10_1016_j_sigpro_2015_05_013
crossref_primary_10_3390_e16020770
crossref_primary_10_1155_2018_4585083
crossref_primary_10_1007_s11042_020_09815_4
crossref_primary_10_1016_j_jss_2012_04_031
crossref_primary_10_1007_s00521_019_04668_x
crossref_primary_10_1142_S0218127411029641
crossref_primary_10_1007_s42835_020_00393_x
crossref_primary_10_3182_20090622_3_UK_3004_00034
crossref_primary_10_1016_j_sigpro_2014_10_033
crossref_primary_10_1109_TCSI_2019_2934714
crossref_primary_10_1016_j_ijleo_2016_05_127
crossref_primary_10_1016_j_sigpro_2013_10_034
crossref_primary_10_1016_j_ijleo_2016_07_017
crossref_primary_10_1142_S0218127418501146
crossref_primary_10_1142_S0218127416500917
crossref_primary_10_1007_s11071_012_0626_5
crossref_primary_10_1016_j_image_2015_06_005
crossref_primary_10_1016_j_image_2013_09_009
crossref_primary_10_1016_j_cnsns_2013_02_011
crossref_primary_10_1142_S0218127416501923
crossref_primary_10_1007_s11042_020_10289_7
crossref_primary_10_1007_s11071_015_2008_2
crossref_primary_10_3390_e21111075
crossref_primary_10_1016_j_ins_2020_12_065
crossref_primary_10_1016_j_optlaseng_2013_01_001
crossref_primary_10_1007_s11071_014_1533_8
crossref_primary_10_1016_j_cnsns_2010_04_010
crossref_primary_10_1016_j_dsp_2013_10_020
crossref_primary_10_1016_j_ijleo_2012_11_002
crossref_primary_10_1088_0253_6102_58_4_13
crossref_primary_10_1016_j_cnsns_2009_11_010
crossref_primary_10_1093_jigpal_jzac008
crossref_primary_10_1016_j_optcom_2011_08_079
crossref_primary_10_1007_s11042_021_10751_0
crossref_primary_10_1007_s11071_017_3698_4
crossref_primary_10_1016_j_eswa_2015_06_035
crossref_primary_10_3390_e22010112
crossref_primary_10_1088_1674_1056_27_3_030502
crossref_primary_10_1016_j_asoc_2015_08_008
crossref_primary_10_1016_j_dsp_2013_01_005
crossref_primary_10_1016_j_cnsns_2010_06_009
crossref_primary_10_1142_S0218348X2150064X
crossref_primary_10_1016_j_inffus_2020_04_009
crossref_primary_10_1016_j_image_2015_03_003
crossref_primary_10_1016_j_image_2014_06_012
crossref_primary_10_1109_ACCESS_2020_3043450
crossref_primary_10_1007_s11042_019_07893_7
crossref_primary_10_1109_ACCESS_2020_2991420
crossref_primary_10_1016_j_image_2012_12_009
crossref_primary_10_1016_j_sigpro_2018_02_028
crossref_primary_10_1007_s11042_020_09533_x
crossref_primary_10_1109_ACCESS_2024_3354170
crossref_primary_10_1155_2014_602921
Cites_doi 10.6028/NIST.SP.800-22
10.1016/j.jss.2007.07.037
10.1142/S0218127406015970
10.1016/S1383-7621(03)00087-0
10.1201/9781420038262-4
10.1016/j.imavis.2007.09.005
10.1016/j.imavis.2006.02.021
10.1016/j.chaos.2003.12.022
ContentType Journal Article
Copyright 2008 Elsevier B.V.
Copyright_xml – notice: 2008 Elsevier B.V.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.imavis.2008.09.004
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Applied Sciences
Engineering
EISSN 1872-8138
EndPage 1039
ExternalDocumentID 10_1016_j_imavis_2008_09_004
S026288560800190X
GroupedDBID --K
--M
.~1
0R~
1B1
1~.
1~5
29I
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFNM
ABFRF
ABJNI
ABMAC
ABOCM
ABTAH
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F0J
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
RNS
ROL
RPZ
SBC
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TN5
UHS
UNMZH
VOH
WUQ
XFK
XPP
ZMT
ZY4
~G-
AAXKI
AAYXX
AFJKZ
AKRWK
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c384t-3ef87c9af5b6248aeaae3cd8272fd03471f1437ad7b438946feeeb3c928356b03
IEDL.DBID AIKHN
ISSN 0262-8856
IngestDate Sat Aug 17 03:59:13 EDT 2024
Thu Sep 26 16:31:58 EDT 2024
Fri Feb 23 02:23:39 EST 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 8
Keywords Chaos
Cryptanalysis
Image encryption
Differential chosen-plaintext attack
Randomness test
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c384t-3ef87c9af5b6248aeaae3cd8272fd03471f1437ad7b438946feeeb3c928356b03
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
OpenAccessLink http://arxiv.org/pdf/0712.3964
PQID 901680785
PQPubID 23500
PageCount 5
ParticipantIDs proquest_miscellaneous_901680785
crossref_primary_10_1016_j_imavis_2008_09_004
elsevier_sciencedirect_doi_10_1016_j_imavis_2008_09_004
PublicationCentury 2000
PublicationDate 2009-07-02
PublicationDateYYYYMMDD 2009-07-02
PublicationDate_xml – month: 07
  year: 2009
  text: 2009-07-02
  day: 02
PublicationDecade 2000
PublicationTitle Image and vision computing
PublicationYear 2009
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Álvarez, Li (bib12) 2006; 16
Li, Li, Chen, Chen, Hu (bib7) 2005; 2005
S. Li, G. Chen, X. Zheng, Chaos-based encryption for digital images and videos, in: B. Furht, D. Kirovski (Eds.), Multimedia Security Handbook, CRC Press, LLC, 2004, pp. 133–167, the preprint is available at
(1994).
Li, Li, Chen, Lo (bib9) 2008; 81
C. Li, S. Li, M. Asim, J. Nuñez, G. Álvarez, G. Chen, On the security defects of an image encryption scheme, IACR’s Cryptology ePrint Archive: Report 2007/397, Available online at
A. Rukhin et al., A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800-22, available online at
Li, Li, Chen, Bourbakis, Lo (bib6) 2008; 23
J.-C. Yen, J.-I. Guo, A new chaotic key-based design for image encryption and decryption, in: Proc. IEEE Int. Conf. Circuits and Systems, vol. 4, 2000, pp. 49–52.
Pareek, Patidar, Sud (bib5) 2006; 24
(2001).
(2002).
Menezes, van Oorschot, Vanstone (bib15) 1996
S. Li, X. Zheng, Cryptanalysis of a chaotic image encryption method, in: Proc. IEEE Int. Symposium on Circuits and Systems, vol. II, 2002, pp. 708–711.
(2007).
Chen, Guo, Huang, Yen (bib3) 2003; 2003
Chen, Yen (bib2) 2003; 49
(Chapter 4).
Chen, Mao, Chui (bib4) 2004; 21
NIST, Security requirements for cryptographic modules, Federal Information Processing Standards Publication (FIPS PUB) 140-2, available online at
Tong, Cui (bib13) 2008; 26
NIST, Security requirements for cryptographic modules, Federal Information Processing Standards Publication (FIPS PUB) 140-1, available online at
10.1016/j.imavis.2008.09.004_bib14
10.1016/j.imavis.2008.09.004_bib11
Chen (10.1016/j.imavis.2008.09.004_bib3) 2003; 2003
10.1016/j.imavis.2008.09.004_bib17
Chen (10.1016/j.imavis.2008.09.004_bib2) 2003; 49
10.1016/j.imavis.2008.09.004_bib16
Tong (10.1016/j.imavis.2008.09.004_bib13) 2008; 26
10.1016/j.imavis.2008.09.004_bib10
10.1016/j.imavis.2008.09.004_bib8
Menezes (10.1016/j.imavis.2008.09.004_bib15) 1996
10.1016/j.imavis.2008.09.004_bib1
Álvarez (10.1016/j.imavis.2008.09.004_bib12) 2006; 16
Li (10.1016/j.imavis.2008.09.004_bib9) 2008; 81
Pareek (10.1016/j.imavis.2008.09.004_bib5) 2006; 24
Li (10.1016/j.imavis.2008.09.004_bib7) 2005; 2005
Chen (10.1016/j.imavis.2008.09.004_bib4) 2004; 21
Li (10.1016/j.imavis.2008.09.004_bib6) 2008; 23
References_xml – volume: 2005
  start-page: 1277
  year: 2005
  end-page: 1288
  ident: bib7
  article-title: Cryptanalysis of a new signal security system for multimedia data transmission
  publication-title: EURASIP Journal on Applied Signal Processing
  contributor:
    fullname: Hu
– volume: 49
  start-page: 355
  year: 2003
  end-page: 367
  ident: bib2
  article-title: A new cryptography system and its VLSI realization
  publication-title: Journal of Systems and Architecture
  contributor:
    fullname: Yen
– volume: 2003
  start-page: 1291
  year: 2003
  end-page: 1305
  ident: bib3
  article-title: Design and realization of a new signal security system for multimedia data transmission
  publication-title: EURASIP Journal on Applied Signal Processing
  contributor:
    fullname: Yen
– volume: 21
  start-page: 749
  year: 2004
  end-page: 761
  ident: bib4
  article-title: A symmetric image encryption scheme based on 3D chaotic cat maps
  publication-title: Chaos, Solitons & Fractals
  contributor:
    fullname: Chui
– year: 1996
  ident: bib15
  article-title: Handbook of Applied Cryptography
  contributor:
    fullname: Vanstone
– volume: 81
  start-page: 1130
  year: 2008
  end-page: 1143
  ident: bib9
  article-title: Cryptanalysis of RCES/RSES image encryption scheme
  publication-title: Journal of Systems and Software
  contributor:
    fullname: Lo
– volume: 23
  start-page: 212
  year: 2008
  end-page: 223
  ident: bib6
  article-title: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
  publication-title: Signal Processing: Image Communication
  contributor:
    fullname: Lo
– volume: 16
  start-page: 2129
  year: 2006
  end-page: 2151
  ident: bib12
  article-title: Some basic cryptographic requirements for chaos-based cryptosystems
  publication-title: International Journal of Bifurcation and Chaos
  contributor:
    fullname: Li
– volume: 26
  start-page: 843
  year: 2008
  end-page: 850
  ident: bib13
  article-title: Image encryption with compound chaotic sequence cipher shifting dynamically
  publication-title: Image and Vision Computing
  contributor:
    fullname: Cui
– volume: 24
  start-page: 926
  year: 2006
  end-page: 934
  ident: bib5
  article-title: Image encryption using chaotic logistic map
  publication-title: Image and Vision Computing
  contributor:
    fullname: Sud
– ident: 10.1016/j.imavis.2008.09.004_bib14
– ident: 10.1016/j.imavis.2008.09.004_bib17
  doi: 10.6028/NIST.SP.800-22
– volume: 81
  start-page: 1130
  issue: 7
  year: 2008
  ident: 10.1016/j.imavis.2008.09.004_bib9
  article-title: Cryptanalysis of RCES/RSES image encryption scheme
  publication-title: Journal of Systems and Software
  doi: 10.1016/j.jss.2007.07.037
  contributor:
    fullname: Li
– ident: 10.1016/j.imavis.2008.09.004_bib1
– ident: 10.1016/j.imavis.2008.09.004_bib16
– volume: 16
  start-page: 2129
  issue: 8
  year: 2006
  ident: 10.1016/j.imavis.2008.09.004_bib12
  article-title: Some basic cryptographic requirements for chaos-based cryptosystems
  publication-title: International Journal of Bifurcation and Chaos
  doi: 10.1142/S0218127406015970
  contributor:
    fullname: Álvarez
– volume: 49
  start-page: 355
  year: 2003
  ident: 10.1016/j.imavis.2008.09.004_bib2
  article-title: A new cryptography system and its VLSI realization
  publication-title: Journal of Systems and Architecture
  doi: 10.1016/S1383-7621(03)00087-0
  contributor:
    fullname: Chen
– ident: 10.1016/j.imavis.2008.09.004_bib10
– ident: 10.1016/j.imavis.2008.09.004_bib11
  doi: 10.1201/9781420038262-4
– volume: 26
  start-page: 843
  issue: 6
  year: 2008
  ident: 10.1016/j.imavis.2008.09.004_bib13
  article-title: Image encryption with compound chaotic sequence cipher shifting dynamically
  publication-title: Image and Vision Computing
  doi: 10.1016/j.imavis.2007.09.005
  contributor:
    fullname: Tong
– volume: 2003
  start-page: 1291
  issue: 13
  year: 2003
  ident: 10.1016/j.imavis.2008.09.004_bib3
  article-title: Design and realization of a new signal security system for multimedia data transmission
  publication-title: EURASIP Journal on Applied Signal Processing
  contributor:
    fullname: Chen
– volume: 24
  start-page: 926
  issue: 9
  year: 2006
  ident: 10.1016/j.imavis.2008.09.004_bib5
  article-title: Image encryption using chaotic logistic map
  publication-title: Image and Vision Computing
  doi: 10.1016/j.imavis.2006.02.021
  contributor:
    fullname: Pareek
– ident: 10.1016/j.imavis.2008.09.004_bib8
– year: 1996
  ident: 10.1016/j.imavis.2008.09.004_bib15
  contributor:
    fullname: Menezes
– volume: 21
  start-page: 749
  issue: 3
  year: 2004
  ident: 10.1016/j.imavis.2008.09.004_bib4
  article-title: A symmetric image encryption scheme based on 3D chaotic cat maps
  publication-title: Chaos, Solitons & Fractals
  doi: 10.1016/j.chaos.2003.12.022
  contributor:
    fullname: Chen
– volume: 23
  start-page: 212
  issue: 3
  year: 2008
  ident: 10.1016/j.imavis.2008.09.004_bib6
  article-title: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
  publication-title: Signal Processing: Image Communication
  contributor:
    fullname: Li
– volume: 2005
  start-page: 1277
  issue: 8
  year: 2005
  ident: 10.1016/j.imavis.2008.09.004_bib7
  article-title: Cryptanalysis of a new signal security system for multimedia data transmission
  publication-title: EURASIP Journal on Applied Signal Processing
  contributor:
    fullname: Li
SSID ssj0007079
Score 2.3384705
Snippet Recently, an image encryption scheme based on a compound chaotic sequence was proposed. In this paper, the security of the scheme is studied and the following...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Publisher
StartPage 1035
SubjectTerms Chaos
Chaos theory
Cryptanalysis
Differential chosen-plaintext attack
Encryption
Equivalence
Image encryption
Keys
Random numbers
Randomness test
Security
Vision
Title Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
URI https://dx.doi.org/10.1016/j.imavis.2008.09.004
https://search.proquest.com/docview/901680785
Volume 27
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFH_M7aIHP6bi_Bg5eK3bmrRJjmM4puIQdLBbSdNEJ6wb-zh48W_3ZU1FBRE8tmna8F7ze78k7wPgkoWZ4KlmQZohBCIDF4ESjAYhN0KmuqMj6aKR74fxYMRux9G4Ar0yFsa5VXrsLzB9g9b-TstLszWfTFqPuHoIhUCLLRxPaY-3oIbmiLEq1Lo3d4PhJyC7JHDFVgtOfuxQRtBt3LwmUxfN750qXe5K9puF-oHVGwPU34ddzxxJtxjcAVRMXoc9zyKJn6PLOux8STF4CA-9xdscCWCReoTMLFE5wdE8G4LPuzZUDMElrpka4kxaRvBaEedq7iouEf2iZvhFUvpcH8Gof_3UGwS-ikKgqWCrgBoruJbKRmkcMqGMUobqTIQ8tFmbonGyyJm4ynjqKqGz2BqDK2wtXSa2OG3TY6jms9ycAJGoRSFonNLIMqGltEJajpyFcmzJOg0ISskl8yJZRlJ6kb0mhaR93UuZoKQbwEvxJt-UniCe_9GTlNpIcD64Qw6Vm9l6mSC_iV0O_ej03y8_g-3izIgH7fAcqqvF2lwg9VilTdi6eu80_Q_2AQGV2K4
link.rule.ids 315,786,790,4521,24144,27957,27958,45620,45714
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB1BewAO7Iiy-sA1ahs7sX1EFagsrZAAqTfLcWwoUtOqy4G_Z9w4CJAQEsfEcWLNxG-e7VkALlicC54ZFmU5QiAycBFpwWgUcytkZtomkT4auddPu8_sdpAMVqBTxcJ4t8qA_SWmL9E63GkGaTYnw2HzEVcPsRBosYXnKa3BKtRZwtusBvXLm7tu_xOQfRK4cqsFJz92qCLolm5ew5GP5g9OlT53JfvNQv3A6qUBut6GzcAcyWU5uB1YscUubAUWScIcne3CxpcUg3vw0Jm-T5AAlqlHyNgRXRAczYsl-LxvQ8UQXOLakSXepOUErzXxrua-4hIxr3qMXySVz_U-PF9fPXW6UaiiEBkq2Dyi1glupHZJlsZMaKu1pSYXMY9d3qJonBxyJq5znvlK6Cx11uIK20ifiS3NWvQAasW4sIdAJGpRCJpmNHFMGCmdkI4jZ6EcW_J2A6JKcmpSJstQlRfZmyolHepeSoWSbgCvxKu-KV0hnv_Rk1TaUDgf_CGHLux4MVPIb1KfQz85-vfLz2Gt-9S7V_c3_btjWC_Pj3jUik-gNp8u7CnSkHl2Fn6zDz1L2qA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+an+image+encryption+scheme+based+on+a+compound+chaotic+sequence&rft.jtitle=Image+and+vision+computing&rft.au=Li%2C+Chengqing&rft.au=Li%2C+Shujun&rft.au=Chen%2C+Guanrong&rft.au=Halang%2C+Wolfgang+A&rft.date=2009-07-02&rft.issn=0262-8856&rft.volume=27&rft.issue=8&rft.spage=1035&rft.epage=1039&rft_id=info:doi/10.1016%2Fj.imavis.2008.09.004&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0262-8856&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0262-8856&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0262-8856&client=summon