Skip to main content
SpringerOpen journals have moved to Springer Nature Link. Learn more about website changes.
Springer Nature Link
Account
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. EURASIP Journal on Advances in Signal Processing
  3. Article

Cryptanalysis of a New Signal Security System for Multimedia Data Transmission

  • Research Article
  • Open access
  • Published: 31 May 2005
  • Volume 2005, article number 962703, (2005)
  • Cite this article

You have full access to this open access article

Download PDF
View saved research
EURASIP Journal on Advances in Signal Processing Aims and scope Submit manuscript
Cryptanalysis of a New Signal Security System for Multimedia Data Transmission
Download PDF
  • Chengqing Li1,
  • Shujun Li2,
  • Guanrong Chen2,
  • Gang Chen1 &
  • …
  • Lei Hu3 
  • 1647 Accesses

  • 36 Citations

  • Explore all metrics

Abstract

Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorithm) was proposed for real-time multimedia data transmission. This paper gives a comprehensive analysis on the security of TDCEA. The following security problems are found: (1) there exist some essential security defects in TDCEA; (2) two known-plaintext attacks can break TDCEA; (3) the chosen-plaintext and chosen-ciphertext versions of the aforementioned two known-plaintext attacks can break TDCEA even with a smaller complexity and a better performance. Some experiments are given to show the security defects of TDCEA and the feasibility of the proposed known-plaintext attacks. As a conclusion, TDCEA is not suitable for applications that require a high level of security.

Article PDF

Download to read the full article text

Similar content being viewed by others

Secure data transmission and classification for digital twin

Article 10 July 2025

Encryption of Messages and Additional Information in Digital Terrestrial Television’s Transport Stream Using PSI/SI Tables

Chapter © 2023

Application Developed on Data Hiding Using Cryptography and Steganography

Chapter © 2021

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Cryptology
  • DNA computing and cryptography
  • Principles and Models of Security
  • Quantum Communications and Cryptography
  • Security Services
  • Security Science and Technology

Author information

Authors and Affiliations

  1. Department of Mathematics, Zhejiang University, Hangzhou, 310027, China

    Chengqing Li & Gang Chen

  2. Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong

    Shujun Li & Guanrong Chen

  3. State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing, 100049, China

    Lei Hu

Authors
  1. Chengqing Li
    View author publications

    Search author on:PubMed Google Scholar

  2. Shujun Li
    View author publications

    Search author on:PubMed Google Scholar

  3. Guanrong Chen
    View author publications

    Search author on:PubMed Google Scholar

  4. Gang Chen
    View author publications

    Search author on:PubMed Google Scholar

  5. Lei Hu
    View author publications

    Search author on:PubMed Google Scholar

Corresponding author

Correspondence to Chengqing Li.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Li, C., Li, S., Chen, G. et al. Cryptanalysis of a New Signal Security System for Multimedia Data Transmission. EURASIP J. Adv. Signal Process. 2005, 962703 (2005). https://doi.org/10.1155/ASP.2005.1277

Download citation

  • Received: 23 August 2004

  • Revised: 04 January 2005

  • Published: 31 May 2005

  • DOI: https://doi.org/10.1155/ASP.2005.1277

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords and phrases

  • TDCEA
  • image encryption
  • chaos
  • cryptanalysis
  • known/chosen-plaintext attack
  • multimedia

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

Not affiliated

Springer Nature

© 2026 Springer Nature