33,145 research outputs found
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Recently, an image scrambling encryption algorithm of pixel bit based on
chaos map was proposed. Considering the algorithm as a typical binary image
scrambling/permutation algorithm exerting on plaintext of size ,
this paper proposes a novel optimal method to break it with some
known/chosen-plaintexts. The spatial complexity and computational complexity of
the attack are only and respectively,
where is the number of known/chosen-plaintexts used. The method can be
easily extended to break any permutation-only encryption scheme exerting on
plaintext of size and with different levels of values. The
corresponding spatial complexity and computational complexity are only
and respectively. In addition, some
specific remarks on the performance of the image scrambling encryption
algorithm are presented.Comment: 11 pages, 6 figure
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for
multimedia transmission named "Multimedia Cryptography System" (MCS). No
cryptanalytic results have been reported so far. This paper presents a
differential attack to break MCS, which requires only seven chosen plaintexts.
The complexity of the attack is O(N), where is the size of plaintext.
Experimental results are also given to show the real performance of the
proposed attack.Comment: 22 pages, 5 figure
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
Recently Lin et al. proposed a method of using the underdetermined BSS (blind
source separation) problem to realize image and speech encryption. In this
paper, we give a cryptanalysis of this BSS-based encryption and point out that
it is not secure against known/chosen-plaintext attack and chosen-ciphertext
attack. In addition, there exist some other security defects: low sensitivity
to part of the key and the plaintext, a ciphertext-only differential attack,
divide-and-conquer (DAC) attack on part of the key. We also discuss the role of
BSS in Lin et al.'s efforts towards cryptographically secure ciphers.Comment: 8 pages, 10 figures, IEEE forma
Feature extraction from ear-worn sensor data for gait analysis
Gait analysis has a significant role in assessing human's walking pattern. It is generally used in sports science for understanding body mechanics, and it is also used to monitor patients' neuro-disorder related gait abnormalities. Traditional marker-based systems are well known for tracking gait parameters for gait analysis, however, it requires long set up time therefore very difficult to be applied in everyday realtime monitoring. Nowadays, there is ever growing of interest in developing portable devices and their supporting software with novel algorithms for gait pattern analysis. The aim of this research is to investigate the possibilities of novel gait pattern detection algorithms for accelerometer-based sensors. In particular, we have used e-AR sensor, an ear-worn sensor which registers body motion via its embedded 3-D accelerom-eter. Gait data was given semantic annotation using pressure mat as well as real-time video recording. Important time stamps within a gait cycle, which are essential for extracting meaningful gait parameters, were identified. Furthermore, advanced signal processing algorithm was applied to perform automatic feature extraction by signal decomposition and reconstruction. Analysis on real-word data has demonstrated the potential for an accelerometer-based sensor system and its ability to extract of meaningful gait parameters
- …