ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1903.11764
  4. Cited By
When an attacker meets a cipher-image in 2018: A Year in Review

When an attacker meets a cipher-image in 2018: A Year in Review

28 March 2019
Chengqing Li
Yun Zhang
Eric Yong Xie
ArXivPDFHTML

Papers citing "When an attacker meets a cipher-image in 2018: A Year in Review"

8 / 8 papers shown
Title
Security analysis of an audio data encryption scheme based on key
  chaining and DNA encoding
Security analysis of an audio data encryption scheme based on key chaining and DNA encoding
Imad El Hanouti
Hakim El Fadili
31
16
0
19 Oct 2019
Security Evaluation for Block Scrambling-Based Image Encryption
  Including JPEG Distortion against Jigsaw Puzzle Solver Attacks
Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks
Tatsuya Chuman
Hitoshi Kiya
45
10
0
07 Aug 2018
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on
  Information Entropy
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
Chengqing Li
Dongdong Lin
Bingbing Feng
Jinhu Lu
Feng Hao
37
182
0
27 Mar 2018
Cryptanalyzing an image encryption algorithm based on autoblocking and
  electrocardiography
Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography
Chengqing Li
Dongdong Lin
Jinhu Lu
Feng Hao
44
205
0
06 Nov 2017
On the cryptanalysis of Fridrich's chaotic image encryption scheme
On the cryptanalysis of Fridrich's chaotic image encryption scheme
Eric Yong Xie
Chengqing Li
Simin Yu
Jinhu Lu
33
252
0
17 Sep 2016
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits
Chengqing Li
Dongdong Lin
Jinhu Lu
44
194
0
06 Jul 2016
On the security of a class of diffusion mechanisms for image encryption
On the security of a class of diffusion mechanisms for image encryption
L. Zhang
Yuansheng Liu
Kwok-wo Wong
F. Pareschi
Yushu Zhang
R. Rovatti
G. Setti
33
116
0
31 Dec 2015
Cracking a hierarchical chaotic image encryption algorithm based on
  permutation
Cracking a hierarchical chaotic image encryption algorithm based on permutation
Chengqing Li
37
168
0
02 May 2015
1