Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map

This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encry...

Full description

Saved in:
Bibliographic Details
Published inEntropy (Basel, Switzerland) Vol. 25; no. 3; p. 395
Main Authors Jiang, Qinmao, Yu, Simin, Wang, Qianxue
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 21.02.2023
MDPI
Subjects
Online AccessGet full text
ISSN1099-4300
1099-4300
DOI10.3390/e25030395

Cover

Abstract This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data.
AbstractList This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data.
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row-column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data.This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row-column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data.
Audience Academic
Author Yu, Simin
Wang, Qianxue
Jiang, Qinmao
AuthorAffiliation College of Automation, Guangdong University of Technology, Guangzhou 510006, China
AuthorAffiliation_xml – name: College of Automation, Guangdong University of Technology, Guangzhou 510006, China
Author_xml – sequence: 1
  givenname: Qinmao
  orcidid: 0000-0003-1503-3254
  surname: Jiang
  fullname: Jiang, Qinmao
– sequence: 2
  givenname: Simin
  orcidid: 0000-0002-1192-6955
  surname: Yu
  fullname: Yu, Simin
– sequence: 3
  givenname: Qianxue
  orcidid: 0000-0002-4063-5401
  surname: Wang
  fullname: Wang, Qianxue
BackLink https://www.ncbi.nlm.nih.gov/pubmed/36981284$$D View this record in MEDLINE/PubMed
BookMark eNp1ksFuEzEQhi1URNvAgRdAK3EBpLRe27sbn1BIC41UxKVI3KyJPZs48tqLvaHK29dpStRWIB9szXz-Z-bXnJIjHzwS8rakZ5xLeo6sopxyWb0gJyWVciw4pUeP3sfkNKU1pYyzsn5FjnktJyWbiBPyaxa3_QAe3DbZVIS2AF_MO1hicen1LmeDL6ZuGaIdVl3xBRKaIodubsP4wnboUwbAFVfbHqNeQRisLr5D_5q8bMElfPNwj8jPr5c3s6vx9Y9v89n0eqwrKoexrKCZtIJLhmZSmwpEKxE0CFpVGhnDRtMFYoWlkEZy2uCiwqamlRCGtq3hIzLf65oAa9VH20HcqgBW3QdCXCqIuSeHqq4WMjtgGMeFKAWTRtdNaXjdat6ybOCIfNprbXwP21tw7iBYUrWzWh2szvDnPdxvFh0ajX6I4J508DTj7Uotw58sRUXT0DorfHhQiOH3BtOgOps0OgcewyYp1shcTVLKM_r-GboOm5h9v6fKmstJLTN1tqeWkMe1vg25sM7HYGd13pnW5vi0EbypRcl2H949nuHQ_N_9yMD5HtAxpBSxVdoOsNuJrGzdP235-OzH_y28A6aG2AE
CitedBy_id crossref_primary_10_3390_jcp5010008
crossref_primary_10_1007_s40747_024_01568_z
crossref_primary_10_1038_s41598_024_71338_x
crossref_primary_10_1002_eng2_13099
crossref_primary_10_1109_ACCESS_2024_3378731
crossref_primary_10_1016_j_eswa_2024_123748
crossref_primary_10_1016_j_isci_2024_110717
crossref_primary_10_1007_s11042_024_19336_z
crossref_primary_10_1109_TCSI_2024_3439869
crossref_primary_10_1007_s11071_024_09816_0
crossref_primary_10_1016_j_aej_2024_11_040
crossref_primary_10_1038_s41598_024_73050_2
Cites_doi 10.1109/ACCESS.2018.2883690
10.1109/TII.2022.3155599
10.1088/1674-1056/abdea3
10.1007/s11042-019-08273-x
10.1007/s11071-022-07630-0
10.4018/IJISP.2018070104
10.1007/s11042-021-11218-y
10.1109/TCAD.2022.3186516
10.1007/s00521-018-3541-y
10.1016/j.optlastec.2019.01.039
10.1007/s11071-016-3046-0
10.3390/e23091159
10.1007/s11071-016-3030-8
10.3390/e24010040
10.1016/j.image.2016.12.007
10.1016/j.optlastec.2016.02.018
10.1016/j.optcom.2014.12.084
10.1016/j.sigpro.2017.06.014
10.1007/s00521-017-2993-9
10.1007/s11071-019-05413-8
10.1016/j.optlastec.2021.107252
10.3390/e22070772
10.1155/2020/9721675
10.1007/s11042-020-09542-w
10.1007/s11071-016-3311-2
10.1016/j.optlaseng.2019.105995
10.3390/e24111551
10.1016/j.optlaseng.2020.106393
10.1016/j.optlaseng.2020.106202
10.1016/j.jvcir.2021.103424
10.1142/S021812749800098X
10.3390/e21030246
10.3390/e21080790
10.1140/epjp/i2019-12797-4
10.1155/2020/5747082
10.1109/TCSI.2021.3091404
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the authors. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the authors. 2023
DBID AAYXX
CITATION
NPM
7TB
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FR3
HCIFZ
KR7
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
7X8
5PM
ADTOC
UNPAY
DOA
DOI 10.3390/e25030395
DatabaseName CrossRef
PubMed
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
Engineering Research Database
SciTech Premium Collection
Civil Engineering Abstracts
ProQuest Engineering Collection
Engineering Database
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
MEDLINE - Academic
PubMed Central (Full Participant titles)
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Central Essentials
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Civil Engineering Abstracts
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
CrossRef
PubMed

Publicly Available Content Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 4
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
EISSN 1099-4300
ExternalDocumentID oai_doaj_org_article_65b9232d23eb41429dc671d36fc3f230
10.3390/e25030395
PMC10047706
A743764129
36981284
10_3390_e25030395
Genre Journal Article
GeographicLocations China
GeographicLocations_xml – name: China
GrantInformation_xml – fundername: Natural Science Foundation of Guangdong Province
  grantid: 2022A1515010005
– fundername: National Natural Science Foundation of China
  grantid: 62271157
GroupedDBID 29G
2WC
5GY
5VS
8FE
8FG
AADQD
AAFWJ
AAYXX
ABDBF
ABJCF
ACIWK
ACUHS
ADBBV
AEGXH
AENEX
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
CS3
DU5
E3Z
ESX
F5P
GROUPED_DOAJ
GX1
HCIFZ
HH5
IAO
ITC
J9A
KQ8
L6V
M7S
MODMG
M~E
OK1
OVT
PGMZT
PHGZM
PHGZT
PIMPY
PQGLB
PROAC
PTHSS
RNS
RPM
TR2
TUS
XSB
~8M
NPM
7TB
8FD
ABUWG
AZQEC
DWQXO
FR3
KR7
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
7X8
PUEGO
5PM
ADTOC
C1A
CH8
IPNFZ
RIG
UNPAY
ID FETCH-LOGICAL-c509t-95a78f4392ed86d5a4f9eaca4055ce22e7c0bee5e149d9307eb5e760544d0ffd3
IEDL.DBID BENPR
ISSN 1099-4300
IngestDate Tue Oct 14 19:03:31 EDT 2025
Sun Oct 26 04:16:55 EDT 2025
Tue Sep 30 17:15:29 EDT 2025
Fri Sep 05 08:52:32 EDT 2025
Fri Jul 25 11:55:32 EDT 2025
Mon Oct 20 17:00:10 EDT 2025
Thu Jan 02 22:52:19 EST 2025
Thu Oct 16 04:39:53 EDT 2025
Thu Apr 24 22:56:02 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords chosen plaintext attack
cryptanalysis
hyperchaotic map
image encryption
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c509t-95a78f4392ed86d5a4f9eaca4055ce22e7c0bee5e149d9307eb5e760544d0ffd3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0002-1192-6955
0000-0002-4063-5401
0000-0003-1503-3254
OpenAccessLink https://www.proquest.com/docview/2791639869?pq-origsite=%requestingapplication%&accountid=15518
PMID 36981284
PQID 2791639869
PQPubID 2032401
ParticipantIDs doaj_primary_oai_doaj_org_article_65b9232d23eb41429dc671d36fc3f230
unpaywall_primary_10_3390_e25030395
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10047706
proquest_miscellaneous_2792509003
proquest_journals_2791639869
gale_infotracacademiconefile_A743764129
pubmed_primary_36981284
crossref_citationtrail_10_3390_e25030395
crossref_primary_10_3390_e25030395
PublicationCentury 2000
PublicationDate 20230221
PublicationDateYYYYMMDD 2023-02-21
PublicationDate_xml – month: 2
  year: 2023
  text: 20230221
  day: 21
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Entropy (Basel, Switzerland)
PublicationTitleAlternate Entropy (Basel)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Lin (ref_28) 2022; 18
Wang (ref_21) 2020; 128
Wang (ref_4) 2021; 68
Gong (ref_17) 2019; 115
Fridrich (ref_5) 1998; 8
Zhou (ref_15) 2015; 343
ref_35
ref_12
ref_34
Xian (ref_22) 2020; 134
ref_31
Yu (ref_1) 2016; 38
Chen (ref_38) 2022; 83
Chai (ref_8) 2017; 52
Cheng (ref_18) 2020; 79
Lin (ref_29) 2022; 110
Wen (ref_30) 2019; 134
Ma (ref_37) 2020; 54
Jiao (ref_25) 2020; 2020
Lin (ref_27) 2022; 70
Shah (ref_3) 2021; 61
Gan (ref_20) 2019; 31
Wang (ref_14) 2021; 30
Zhou (ref_16) 2016; 82
Tian (ref_24) 2021; 80
Chai (ref_7) 2019; 31
Li (ref_2) 2017; 87
Wang (ref_10) 2021; 137
Farah (ref_13) 2020; 99
ref_23
Gao (ref_39) 2021; 142
Geetha (ref_6) 2018; 12
ref_40
Hu (ref_32) 2017; 88
Xu (ref_19) 2020; 79
Wu (ref_33) 2018; 142
ref_26
ref_9
Belazi (ref_11) 2017; 87
Li (ref_36) 2018; 6
References_xml – volume: 6
  start-page: 75834
  year: 2018
  ident: ref_36
  article-title: Cryptanalysis of a chaotic image encryption algorithm based on information entropy
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2883690
– volume: 18
  start-page: 8839
  year: 2022
  ident: ref_28
  article-title: Brain-like initial-boosted hyperchaos and application in biomedical image encryption
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2022.3155599
– volume: 30
  start-page: 060507
  year: 2021
  ident: ref_14
  article-title: An image encryption algorithm based on improved baker transformation and chaotic S-box
  publication-title: Chin. Phys. B
  doi: 10.1088/1674-1056/abdea3
– volume: 79
  start-page: 5573
  year: 2020
  ident: ref_19
  article-title: A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-019-08273-x
– volume: 110
  start-page: 841
  year: 2022
  ident: ref_29
  article-title: Hyperchaotic memristive ring neural network and application in medical image encryption
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-022-07630-0
– volume: 12
  start-page: 42
  year: 2018
  ident: ref_6
  article-title: A literature review on image encryption techniques
  publication-title: Int. J. Inf. Secur. Priv. (IJISP)
  doi: 10.4018/IJISP.2018070104
– volume: 80
  start-page: 32841
  year: 2021
  ident: ref_24
  article-title: A novel image encryption algorithm using PWLCM map-based CML chaotic system and dynamic DNA encryption
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-021-11218-y
– ident: ref_26
  doi: 10.1109/TCAD.2022.3186516
– volume: 31
  start-page: 7111
  year: 2019
  ident: ref_20
  article-title: A chaotic image encryption algorithm based on 3-D bit-plane permutation
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-018-3541-y
– volume: 70
  start-page: 311
  year: 2022
  ident: ref_27
  article-title: Generating n-Scroll Chaotic Attractors From A Memristor-based Magnetized Hopfield Neural Network
  publication-title: IEEE Trans. Circuits Syst. II Express Briefs
– volume: 115
  start-page: 257
  year: 2019
  ident: ref_17
  article-title: An image compression and encryption algorithm based on chaotic system and compressive sensing
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2019.01.039
– volume: 38
  start-page: 735
  year: 2016
  ident: ref_1
  article-title: Some progresses of chaotic cipher and its applications in multimedia secure communications
  publication-title: J. Electron. Inf. Technol.
– volume: 87
  start-page: 337
  year: 2017
  ident: ref_11
  article-title: Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-016-3046-0
– ident: ref_23
  doi: 10.3390/e23091159
– volume: 87
  start-page: 127
  year: 2017
  ident: ref_2
  article-title: An image encryption scheme based on chaotic tent map
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-016-3030-8
– ident: ref_34
  doi: 10.3390/e24010040
– volume: 52
  start-page: 6
  year: 2017
  ident: ref_8
  article-title: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations
  publication-title: Signal Process. Image Commun.
  doi: 10.1016/j.image.2016.12.007
– volume: 82
  start-page: 121
  year: 2016
  ident: ref_16
  article-title: Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2016.02.018
– volume: 54
  start-page: 102566
  year: 2020
  ident: ref_37
  article-title: Cryptanalysis of an image block encryption algorithm based on chaotic maps
  publication-title: J. Inf. Secur. Appl.
– volume: 343
  start-page: 10
  year: 2015
  ident: ref_15
  article-title: Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform
  publication-title: Opt. Commun.
  doi: 10.1016/j.optcom.2014.12.084
– volume: 142
  start-page: 292
  year: 2018
  ident: ref_33
  article-title: Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2017.06.014
– volume: 31
  start-page: 219
  year: 2019
  ident: ref_7
  article-title: A novel image encryption scheme based on DNA sequence operations and chaotic systems
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-017-2993-9
– volume: 99
  start-page: 3041
  year: 2020
  ident: ref_13
  article-title: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-019-05413-8
– volume: 142
  start-page: 107252
  year: 2021
  ident: ref_39
  article-title: Image encryption algorithm based on 2D hyperchaotic map
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2021.107252
– ident: ref_9
  doi: 10.3390/e22070772
– volume: 2020
  start-page: 9721675
  year: 2020
  ident: ref_25
  article-title: Image encryption scheme based on a generalized arnold map and RSA algorithm
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2020/9721675
– volume: 61
  start-page: 102931
  year: 2021
  ident: ref_3
  article-title: 4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion
  publication-title: J. Inf. Secur. Appl.
– volume: 79
  start-page: 29243
  year: 2020
  ident: ref_18
  article-title: A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing
  publication-title: Multimed. Tools Appl.
  doi: 10.1007/s11042-020-09542-w
– volume: 88
  start-page: 1305
  year: 2017
  ident: ref_32
  article-title: Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion
  publication-title: Nonlinear Dyn.
  doi: 10.1007/s11071-016-3311-2
– volume: 128
  start-page: 105995
  year: 2020
  ident: ref_21
  article-title: An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2019.105995
– ident: ref_40
  doi: 10.3390/e24111551
– volume: 137
  start-page: 106393
  year: 2021
  ident: ref_10
  article-title: Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2020.106393
– volume: 134
  start-page: 106202
  year: 2020
  ident: ref_22
  article-title: Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2020.106202
– volume: 83
  start-page: 103424
  year: 2022
  ident: ref_38
  article-title: Security measurement of a medical communication scheme based on chaos and DNA coding
  publication-title: J. Vis. Commun. Image Represent.
  doi: 10.1016/j.jvcir.2021.103424
– volume: 8
  start-page: 1259
  year: 1998
  ident: ref_5
  article-title: Symmetric ciphers based on two-dimensional chaotic maps
  publication-title: Int. J. Bifurc. Chaos
  doi: 10.1142/S021812749800098X
– ident: ref_35
  doi: 10.3390/e21030246
– ident: ref_12
  doi: 10.3390/e21080790
– volume: 134
  start-page: 337
  year: 2019
  ident: ref_30
  article-title: Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps
  publication-title: Eur. Phys. J. Plus
  doi: 10.1140/epjp/i2019-12797-4
– ident: ref_31
  doi: 10.1155/2020/5747082
– volume: 68
  start-page: 3794
  year: 2021
  ident: ref_4
  article-title: Constructing Higher-Dimensional Digital Chaotic Systems via Loop-State Contraction Algorithm
  publication-title: IEEE Trans. Circuits Syst. Regul. Pap.
  doi: 10.1109/TCSI.2021.3091404
SSID ssj0023216
Score 2.3979597
Snippet This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic...
SourceID doaj
unpaywall
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 395
SubjectTerms Algorithms
Analysis
Chaos theory
chosen plaintext attack
Columnar structure
cryptanalysis
Cryptography
Data encryption
Diffusion
Encryption
Equivalence
hyperchaotic map
image encryption
Image processing
Mappings (Mathematics)
Methods
Multimedia
Neural networks
Optimization
Permutations
Security
Two dimensional analysis
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwELYqLu0FFbWUtLRyoVK5RCSOH_FxeWlbiZ5A2pvl-FGQlmS13RXi3zOTZKPdFtQL13gUjcfz-CaxPxPyTfPK51z4FGp9lXLbbgLgMeURuVKU1YzhAefLX3J8zX9OxGTtqi_cE9bRA3eGO5aiAgzCPCtCxXPInt5JlftCRldEwM-YfbNSr5qpvtUqWC47HqECmvrjAIUecjVeIrFWfVqS_n9T8Vot-nuf5OtlPbMP93Y6XStCF2_Jdo8e6ajTeoe8CvU7MjmdP8wA43XsIrSJ1Nb0xx0kCnpeOxwD29PR9Hczv13c3NETKFyewqOr-yY9Q3b_jpmDjqEnReqkBt5OL-3sPbm-OL86Haf9hQmpg7q_SLWwqowAMVjwpfTC8qghsVoAZcIFxoJyWRWCCNAWeQ3RHSoRFDQ0nPssRl_skq26qcMeodpFp4LXmXAtC5jmWRDSysrzrLRBJORoZUjjejZxvNRiaqCrQJubweYJORhEZx2FxlNCJ7gagwCyXrcPwBdM7wvmf76QkO-4lgZjE5Rxtj9iAFNCliszArikJAeIk5D91XKbPmj_GKYAKxe6lDD8dRiGcMN_KLYOzbKVAZXx829CPnTeMehcSF1iuU9IueE3G5PaHKlvb1pKb-TtUyqTCTkcXOx5Y318CWN9Im8YBEp7PD_fJ1uL-TJ8BoC1qL60sfQI7dQh6A
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbQ9gAXHuIVKMg8JLikefkRn9C2tFqQWnHoSsspcvxoV90m0TZLVX4948Qb7RaQEFd7YtnxeOYbe_wZofeClDohVIfg68uQyC4JgNiQWMeVwqVIU3fB-fiETabk64zO_IbblU-rhFB83hlpd2oTkiyOo5RGWZQJGjXafvrhd5ISl57JqSBggncYBSw-QjvTk2_j790Rp_-2pxPKILaPDPh7MNnuLYkNJ9Rx9f9ukTdc0u10yburqpE313Kx2PBFRw9QsR5Fn4Jysbdqyz318xbB4_8P8yG672EqHvd69QjdMdVjNDtY3jQAJnsaE1xbLCv85RIsEj6slKuDhvB4cVYv5-35Jd4HD6kxFJ1e1-Fn94xATwGCJxD8Oo6mGlrHx7J5gqZHh6cHk9C_zBAqABhtKKjkuQUskxqdM00lsQIsuAT0R5VJU8NVXBpDDcRfWoAZMSU1HCInQnRsrc6eolFVV-Y5wkJZxY0WMVUd3ZggsaFMslKTOJeGBujjeqoK5WnL3esZiwLCFzerxTCrAXo7iDY9V8efhPbdfA8Cjl67K6iXZ4VfrQWjJQDfVKeZKUkCLlsrxhOdMasyC0FbgD44bSmcEYDOKOnvMsCQHJ1WMQZcxhkBLBWg3bVCFd46XBUpB1CeiZxB9ZuhGta1O6yRlalXnQx02e0zB-hZr39DnzMmcocrApRvaebWoLZrqvl5xx3uCAI5j1mA3g1K_Pef9eKfpF6ieylAv-6if7KLRu1yZV4BVGvL1349_gI74zeK
  priority: 102
  providerName: Unpaywall
Title Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
URI https://www.ncbi.nlm.nih.gov/pubmed/36981284
https://www.proquest.com/docview/2791639869
https://www.proquest.com/docview/2792509003
https://pubmed.ncbi.nlm.nih.gov/PMC10047706
https://www.mdpi.com/1099-4300/25/3/395/pdf?version=1676975942
https://doaj.org/article/65b9232d23eb41429dc671d36fc3f230
UnpaywallVersion publishedVersion
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVFSB
  databaseName: Free Full-Text Journals in Chemistry
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: HH5
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://abc-chemistry.org/
  providerName: ABC ChemistRy
– providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: KQ8
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: DOA
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: Academic Search Ultimate - eBooks
  customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: ABDBF
  dateStart: 20081201
  isFulltext: true
  titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn
  providerName: EBSCOhost
– providerCode: PRVFQY
  databaseName: Geneva Foundation for Medical Education and Research Open Access Journals
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: GX1
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php
  providerName: Geneva Foundation for Medical Education and Research
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: M~E
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVAQN
  databaseName: PubMed Central
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: RPM
  dateStart: 20180101
  isFulltext: true
  titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/
  providerName: National Library of Medicine
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: BENPR
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: 8FG
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bb9MwFD7augd4QSBugVGZiwQv0RLHceIHhNrRriCtmtAmlafIsZ0NqUtKaTXt33NOkoaW20sebCvy5Vy-48t3AN4okdtQxNZHX5_7QteXAEThi4K4UhKtOKcHzqdTObkQn2fxbA-mm7cwdK1yYxNrQ20rQ3vkRzxBIBOpVKoPi-8-ZY2i09VNCg3dplaw72uKsX044MSM1YOD4Wh69qULwSIeyoZfKMJg_8ghAEAbTskltrxSTd7_p4ne8lG_35-8sy4X-vZGz-dbzml8H-61qJINGjF4AHuufAiz4-XtArFfwzrCqoLpkn26RgPCRqWhOlwTNphf4jBXV9dsiA7NMiw6v6n8j8T63zB2sAnGqkSpVOHf2alePIKL8ej8eOK3iRR8g3hg5atYJ2mB0IM7m0oba1EoNLgawVpsHOcuMUHuXOwwXLIKtd7lsUsw0BHCBkVho8fQK6vSPQWmTGESZ1UQm5odTInAxVLL3Iog1S724N1mIjPTsoxTsot5htEGzXnWzbkHr7qmi4Za42-NhrQaXQNiw64LquVl1ipXJuMccSq3PHK5CNHDWiOT0EayMFGBMZYHb2ktM9JZ7IzR7dMDHBKxX2UDhFGJFAh9PDjcLHfWKvOP7JfoefCyq0Y1pLMVXbpqXbfBLtO2sAdPGuno-hxJlRIM8CDdkZudQe3WlN-uaqpv4vNLkkB68LoTsX9P1rP_9_453OWoAvWD_PAQeqvl2r1ASLXK-7Cfjk_6rbb0640J_J7MQiy7mJ4Nvv4E8ewlQQ
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFD4a28N4QSBugQHmJniJljq2Ez9MqN06tWytEOqkvWWO7WxIXVK6VlX_HL-N4yQNLbe3vSZW5Byfc77vJPZ3AN5JlpoW48ZHrE99pspNACzzWea0UiIlKXUHnAdD0Ttjn8_5-Rb8WJ2FcdsqVzmxTNSm0O4b-T6NkMiEMhby0-S777pGub-rqxYaqm6tYA5KibH6YMeJXS6whLs56B_her-n9Lg7Ouz5dZcBXyNYznzJVRRniMvUmlgYrlgmMRspZDJcW0ptpIPUWm6xljASQ8Km3EZYBTBmgiwzIT73DuywkEks_nY63eGXr03JF9KWqPSMwlAG-xYJB2KGa2axhoJls4A_IWENE3_fr7k7zydquVDj8RoYHt-HezWLJe3K7R7Als0fwvnhdDlBrlmpnJAiIyon_WtMWKSba3cPfYC0x5do1tnVNekggBqCl0aLwj9yXQYqhRDSw9rYSTgV-HQyUJNHcHYrJn0M23mR26dApM50ZI0MuC7VyCQLLBdKpIYFsbLcg48rQya6VjV3zTXGCVY3zuZJY3MP3jRDJ5WUx98GddxqNAOc-nZ5oZheJnUwJ4KnyIupoaFNWQsR3WgRtUwoMh1mWNN58MGtZeJyBE5Gq_qoA76SU9tK2kjbIsGQanmwt1rupE4eN8kvV_fgdXMbw979y1G5LeblGJyy-wztwZPKO5o5h0LGjnZ4EG_4zcZLbd7Jv12V0uJOPzCKAuHB28bF_m2sZ_-f_SvY7Y0Gp8lpf3jyHO5SDIdSDKC1B9uz6dy-QDo3S1_WMUPg4rbD9CdBbl7L
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLbGkIAXBOIWGGBugpeoqePY8QNC3brSMjbxsEl7C44vG1KXlK5V1b_Gr-OcJA0tt7e9xlbknOt3Yvs7hLxWPLddntgQcn0ecl0dAuA-5B65UqRWjOEF58MjMTzhn06T0y3yY3UXBo9VrmJiFahtafAfeYdJADKxSoXq-OZYxJf-4MPke4gdpHCnddVOozaRA7dcQPl2-X7UB12_YWywf7w3DJsOA6GBRDkLVaJl6iEnM2dTYRPNvYJIpAHFJMYx5qSJcucSB3WEVeAOLk-chAqAcxt5b2N47zVyXSKLO95SH3xsi72YdUXNZBTHKuo4gBqQLbCNxVr-q9oE_JkM1rLh7yc1b86LiV4u9Hi8lgYHd8jtBr_SXm1wd8mWK-6R073pcgIos-Y3oaWnuqCjCwhVdL8wOAbap73xGQhxdn5BdyF1WgqPjhdl2Mf-AjU3CB1CVYzkTSW8nR7qyX1yciUCfUC2i7JwjwhVxhvprIoSU_GQKR65RGiRWx6l2iUBebcSZGYaPnNsqzHOoK5BmWetzAPysp06qUk8_jZpF7XRTkDe7epBOT3LGjfORJIDImaWxS7nXcjl1gjZtbHwJvZQzQXkLeoyw-gAizG6ueQAn4Q8W1kPAJsUHEBWQHZW6s6asHGZ_TLygLxoh8HhcRdHF66cV3NgyfgDOiAPa-to1xwLlSLgCEi6YTcbH7U5Unw7r0jFkTlQykgE5FVrYv8W1uP_r_45uQHOmX0eHR08IbcYeEPFAtDdIduz6dw9BRw3y59VDkPJ16v20J-0n1xl
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbQ9gAXHuIVKMg8JLikefkRn9C2tFqQWnHoSsspcvxoV90m0TZLVX4948Qb7RaQEFd7YtnxeOYbe_wZofeClDohVIfg68uQyC4JgNiQWMeVwqVIU3fB-fiETabk64zO_IbblU-rhFB83hlpd2oTkiyOo5RGWZQJGjXafvrhd5ISl57JqSBggncYBSw-QjvTk2_j790Rp_-2pxPKILaPDPh7MNnuLYkNJ9Rx9f9ukTdc0u10yburqpE313Kx2PBFRw9QsR5Fn4Jysbdqyz318xbB4_8P8yG672EqHvd69QjdMdVjNDtY3jQAJnsaE1xbLCv85RIsEj6slKuDhvB4cVYv5-35Jd4HD6kxFJ1e1-Fn94xATwGCJxD8Oo6mGlrHx7J5gqZHh6cHk9C_zBAqABhtKKjkuQUskxqdM00lsQIsuAT0R5VJU8NVXBpDDcRfWoAZMSU1HCInQnRsrc6eolFVV-Y5wkJZxY0WMVUd3ZggsaFMslKTOJeGBujjeqoK5WnL3esZiwLCFzerxTCrAXo7iDY9V8efhPbdfA8Cjl67K6iXZ4VfrQWjJQDfVKeZKUkCLlsrxhOdMasyC0FbgD44bSmcEYDOKOnvMsCQHJ1WMQZcxhkBLBWg3bVCFd46XBUpB1CeiZxB9ZuhGta1O6yRlalXnQx02e0zB-hZr39DnzMmcocrApRvaebWoLZrqvl5xx3uCAI5j1mA3g1K_Pef9eKfpF6ieylAv-6if7KLRu1yZV4BVGvL1349_gI74zeK
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+an+Image+Encryption+Algorithm+Based+on+Two-Dimensional+Hyperchaotic+Map&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Jiang%2C+Qinmao&rft.au=Yu%2C+Simin&rft.au=Wang%2C+Qianxue&rft.date=2023-02-21&rft.pub=MDPI+AG&rft.eissn=1099-4300&rft.volume=25&rft.issue=3&rft.spage=395&rft_id=info:doi/10.3390%2Fe25030395&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon