Sciweavers

60 search results - page 8 / 12
» Cryptanalysis of an image encryption scheme
Sort
View
JOC
1998
135views more  JOC 1998»
13 years 9 months ago
Attacks on Fast Double Block Length Hash Functions
The security of hash functions based on a block cipher with a block length of m bits and a key length of k bits, where k ≤ m, is considered. New attacks are presented on a large ...
Lars R. Knudsen, Xuejia Lai, Bart Preneel
TIP
2010
357views more  TIP 2010»
13 years 8 months ago
Efficient Compression of Encrypted Grayscale Images
—Lossless compression of encrypted sources can be achieved through Slepian-Wolf coding. For encrypted real-world sources such as images, the key to improve the compression effici...
Wei Liu, Wenjun Zeng, Lina Dong, Qiuming Yao
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 4 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
MM
2004
ACM
97views Multimedia» more  MM 2004»
14 years 3 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
IVC
2008
93views more  IVC 2008»
13 years 9 months ago
A blind source separation-based method for multiple images encryption
Blind source separation (BSS) has been successfully applied to many fields such as communications and biomedical engineering. Its application for image encryption, however, remain...
Qiu-Hua Lin, Fuliang Yin, Tiemin Mei, Hualou Liang