Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map
This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encry...
Saved in:
| Published in | Entropy (Basel, Switzerland) Vol. 25; no. 3; p. 395 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Switzerland
MDPI AG
21.02.2023
MDPI |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1099-4300 1099-4300 |
| DOI | 10.3390/e25030395 |
Cover
| Abstract | This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data. |
|---|---|
| AbstractList | This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row–column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data. This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row-column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data.This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic sequences through a combination of two one-dimensional chaotic maps and used them as the permutation and diffusion key. Then, the image was encrypted by using the structure of row-column permutation, forward-diffusion, and backward-diffusion. The proposer claimed that the above algorithm was secure. However, it was found through cryptanalysis that the algorithm cannot withstand the chosen plaintext attack. Although the forward-diffusion and backward-diffusion of the original algorithm use two different diffusion keys and there is a ciphertext feedback mechanism, the analysis of the diffusion by iterative optimization showed that it can be equivalent to global diffusion. In addition, the generation of chaotic sequences in the encryption process is independent of the plaintext image, so the equivalent diffusion and permutation key stream can be obtained by adjusting the individual pixel values of the chosen plaintexts. Aiming at the security loopholes in the encryption algorithm, the theoretical and experimental results are presented to support the efficiency of the proposed attack and suggestions for improvement are given. Finally, compared with the performance analysis of the existing cracking algorithm, our cryptanalysis greatly improved the cracking efficiency without increasing the complexity of the data. |
| Audience | Academic |
| Author | Yu, Simin Wang, Qianxue Jiang, Qinmao |
| AuthorAffiliation | College of Automation, Guangdong University of Technology, Guangzhou 510006, China |
| AuthorAffiliation_xml | – name: College of Automation, Guangdong University of Technology, Guangzhou 510006, China |
| Author_xml | – sequence: 1 givenname: Qinmao orcidid: 0000-0003-1503-3254 surname: Jiang fullname: Jiang, Qinmao – sequence: 2 givenname: Simin orcidid: 0000-0002-1192-6955 surname: Yu fullname: Yu, Simin – sequence: 3 givenname: Qianxue orcidid: 0000-0002-4063-5401 surname: Wang fullname: Wang, Qianxue |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/36981284$$D View this record in MEDLINE/PubMed |
| BookMark | eNp1ksFuEzEQhi1URNvAgRdAK3EBpLRe27sbn1BIC41UxKVI3KyJPZs48tqLvaHK29dpStRWIB9szXz-Z-bXnJIjHzwS8rakZ5xLeo6sopxyWb0gJyWVciw4pUeP3sfkNKU1pYyzsn5FjnktJyWbiBPyaxa3_QAe3DbZVIS2AF_MO1hicen1LmeDL6ZuGaIdVl3xBRKaIodubsP4wnboUwbAFVfbHqNeQRisLr5D_5q8bMElfPNwj8jPr5c3s6vx9Y9v89n0eqwrKoexrKCZtIJLhmZSmwpEKxE0CFpVGhnDRtMFYoWlkEZy2uCiwqamlRCGtq3hIzLf65oAa9VH20HcqgBW3QdCXCqIuSeHqq4WMjtgGMeFKAWTRtdNaXjdat6ybOCIfNprbXwP21tw7iBYUrWzWh2szvDnPdxvFh0ajX6I4J508DTj7Uotw58sRUXT0DorfHhQiOH3BtOgOps0OgcewyYp1shcTVLKM_r-GboOm5h9v6fKmstJLTN1tqeWkMe1vg25sM7HYGd13pnW5vi0EbypRcl2H949nuHQ_N_9yMD5HtAxpBSxVdoOsNuJrGzdP235-OzH_y28A6aG2AE |
| CitedBy_id | crossref_primary_10_3390_jcp5010008 crossref_primary_10_1007_s40747_024_01568_z crossref_primary_10_1038_s41598_024_71338_x crossref_primary_10_1002_eng2_13099 crossref_primary_10_1109_ACCESS_2024_3378731 crossref_primary_10_1016_j_eswa_2024_123748 crossref_primary_10_1016_j_isci_2024_110717 crossref_primary_10_1007_s11042_024_19336_z crossref_primary_10_1109_TCSI_2024_3439869 crossref_primary_10_1007_s11071_024_09816_0 crossref_primary_10_1016_j_aej_2024_11_040 crossref_primary_10_1038_s41598_024_73050_2 |
| Cites_doi | 10.1109/ACCESS.2018.2883690 10.1109/TII.2022.3155599 10.1088/1674-1056/abdea3 10.1007/s11042-019-08273-x 10.1007/s11071-022-07630-0 10.4018/IJISP.2018070104 10.1007/s11042-021-11218-y 10.1109/TCAD.2022.3186516 10.1007/s00521-018-3541-y 10.1016/j.optlastec.2019.01.039 10.1007/s11071-016-3046-0 10.3390/e23091159 10.1007/s11071-016-3030-8 10.3390/e24010040 10.1016/j.image.2016.12.007 10.1016/j.optlastec.2016.02.018 10.1016/j.optcom.2014.12.084 10.1016/j.sigpro.2017.06.014 10.1007/s00521-017-2993-9 10.1007/s11071-019-05413-8 10.1016/j.optlastec.2021.107252 10.3390/e22070772 10.1155/2020/9721675 10.1007/s11042-020-09542-w 10.1007/s11071-016-3311-2 10.1016/j.optlaseng.2019.105995 10.3390/e24111551 10.1016/j.optlaseng.2020.106393 10.1016/j.optlaseng.2020.106202 10.1016/j.jvcir.2021.103424 10.1142/S021812749800098X 10.3390/e21030246 10.3390/e21080790 10.1140/epjp/i2019-12797-4 10.1155/2020/5747082 10.1109/TCSI.2021.3091404 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the authors. 2023 |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the authors. 2023 |
| DBID | AAYXX CITATION NPM 7TB 8FD 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO FR3 HCIFZ KR7 L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS 7X8 5PM ADTOC UNPAY DOA |
| DOI | 10.3390/e25030395 |
| DatabaseName | CrossRef PubMed Mechanical & Transportation Engineering Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea Engineering Research Database SciTech Premium Collection Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection MEDLINE - Academic PubMed Central (Full Participant titles) Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Central Essentials ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) MEDLINE - Academic |
| DatabaseTitleList | MEDLINE - Academic CrossRef PubMed Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 4 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 1099-4300 |
| ExternalDocumentID | oai_doaj_org_article_65b9232d23eb41429dc671d36fc3f230 10.3390/e25030395 PMC10047706 A743764129 36981284 10_3390_e25030395 |
| Genre | Journal Article |
| GeographicLocations | China |
| GeographicLocations_xml | – name: China |
| GrantInformation_xml | – fundername: Natural Science Foundation of Guangdong Province grantid: 2022A1515010005 – fundername: National Natural Science Foundation of China grantid: 62271157 |
| GroupedDBID | 29G 2WC 5GY 5VS 8FE 8FG AADQD AAFWJ AAYXX ABDBF ABJCF ACIWK ACUHS ADBBV AEGXH AENEX AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BGLVJ CCPQU CITATION CS3 DU5 E3Z ESX F5P GROUPED_DOAJ GX1 HCIFZ HH5 IAO ITC J9A KQ8 L6V M7S MODMG M~E OK1 OVT PGMZT PHGZM PHGZT PIMPY PQGLB PROAC PTHSS RNS RPM TR2 TUS XSB ~8M NPM 7TB 8FD ABUWG AZQEC DWQXO FR3 KR7 PKEHL PQEST PQQKQ PQUKI PRINS 7X8 PUEGO 5PM ADTOC C1A CH8 IPNFZ RIG UNPAY |
| ID | FETCH-LOGICAL-c509t-95a78f4392ed86d5a4f9eaca4055ce22e7c0bee5e149d9307eb5e760544d0ffd3 |
| IEDL.DBID | BENPR |
| ISSN | 1099-4300 |
| IngestDate | Tue Oct 14 19:03:31 EDT 2025 Sun Oct 26 04:16:55 EDT 2025 Tue Sep 30 17:15:29 EDT 2025 Fri Sep 05 08:52:32 EDT 2025 Fri Jul 25 11:55:32 EDT 2025 Mon Oct 20 17:00:10 EDT 2025 Thu Jan 02 22:52:19 EST 2025 Thu Oct 16 04:39:53 EDT 2025 Thu Apr 24 22:56:02 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Keywords | chosen plaintext attack cryptanalysis hyperchaotic map image encryption |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c509t-95a78f4392ed86d5a4f9eaca4055ce22e7c0bee5e149d9307eb5e760544d0ffd3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0002-1192-6955 0000-0002-4063-5401 0000-0003-1503-3254 |
| OpenAccessLink | https://www.proquest.com/docview/2791639869?pq-origsite=%requestingapplication%&accountid=15518 |
| PMID | 36981284 |
| PQID | 2791639869 |
| PQPubID | 2032401 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_65b9232d23eb41429dc671d36fc3f230 unpaywall_primary_10_3390_e25030395 pubmedcentral_primary_oai_pubmedcentral_nih_gov_10047706 proquest_miscellaneous_2792509003 proquest_journals_2791639869 gale_infotracacademiconefile_A743764129 pubmed_primary_36981284 crossref_citationtrail_10_3390_e25030395 crossref_primary_10_3390_e25030395 |
| PublicationCentury | 2000 |
| PublicationDate | 20230221 |
| PublicationDateYYYYMMDD | 2023-02-21 |
| PublicationDate_xml | – month: 2 year: 2023 text: 20230221 day: 21 |
| PublicationDecade | 2020 |
| PublicationPlace | Switzerland |
| PublicationPlace_xml | – name: Switzerland – name: Basel |
| PublicationTitle | Entropy (Basel, Switzerland) |
| PublicationTitleAlternate | Entropy (Basel) |
| PublicationYear | 2023 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Lin (ref_28) 2022; 18 Wang (ref_21) 2020; 128 Wang (ref_4) 2021; 68 Gong (ref_17) 2019; 115 Fridrich (ref_5) 1998; 8 Zhou (ref_15) 2015; 343 ref_35 ref_12 ref_34 Xian (ref_22) 2020; 134 ref_31 Yu (ref_1) 2016; 38 Chen (ref_38) 2022; 83 Chai (ref_8) 2017; 52 Cheng (ref_18) 2020; 79 Lin (ref_29) 2022; 110 Wen (ref_30) 2019; 134 Ma (ref_37) 2020; 54 Jiao (ref_25) 2020; 2020 Lin (ref_27) 2022; 70 Shah (ref_3) 2021; 61 Gan (ref_20) 2019; 31 Wang (ref_14) 2021; 30 Zhou (ref_16) 2016; 82 Tian (ref_24) 2021; 80 Chai (ref_7) 2019; 31 Li (ref_2) 2017; 87 Wang (ref_10) 2021; 137 Farah (ref_13) 2020; 99 ref_23 Gao (ref_39) 2021; 142 Geetha (ref_6) 2018; 12 ref_40 Hu (ref_32) 2017; 88 Xu (ref_19) 2020; 79 Wu (ref_33) 2018; 142 ref_26 ref_9 Belazi (ref_11) 2017; 87 Li (ref_36) 2018; 6 |
| References_xml | – volume: 6 start-page: 75834 year: 2018 ident: ref_36 article-title: Cryptanalysis of a chaotic image encryption algorithm based on information entropy publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2883690 – volume: 18 start-page: 8839 year: 2022 ident: ref_28 article-title: Brain-like initial-boosted hyperchaos and application in biomedical image encryption publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2022.3155599 – volume: 30 start-page: 060507 year: 2021 ident: ref_14 article-title: An image encryption algorithm based on improved baker transformation and chaotic S-box publication-title: Chin. Phys. B doi: 10.1088/1674-1056/abdea3 – volume: 79 start-page: 5573 year: 2020 ident: ref_19 article-title: A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-019-08273-x – volume: 110 start-page: 841 year: 2022 ident: ref_29 article-title: Hyperchaotic memristive ring neural network and application in medical image encryption publication-title: Nonlinear Dyn. doi: 10.1007/s11071-022-07630-0 – volume: 12 start-page: 42 year: 2018 ident: ref_6 article-title: A literature review on image encryption techniques publication-title: Int. J. Inf. Secur. Priv. (IJISP) doi: 10.4018/IJISP.2018070104 – volume: 80 start-page: 32841 year: 2021 ident: ref_24 article-title: A novel image encryption algorithm using PWLCM map-based CML chaotic system and dynamic DNA encryption publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-021-11218-y – ident: ref_26 doi: 10.1109/TCAD.2022.3186516 – volume: 31 start-page: 7111 year: 2019 ident: ref_20 article-title: A chaotic image encryption algorithm based on 3-D bit-plane permutation publication-title: Neural Comput. Appl. doi: 10.1007/s00521-018-3541-y – volume: 70 start-page: 311 year: 2022 ident: ref_27 article-title: Generating n-Scroll Chaotic Attractors From A Memristor-based Magnetized Hopfield Neural Network publication-title: IEEE Trans. Circuits Syst. II Express Briefs – volume: 115 start-page: 257 year: 2019 ident: ref_17 article-title: An image compression and encryption algorithm based on chaotic system and compressive sensing publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2019.01.039 – volume: 38 start-page: 735 year: 2016 ident: ref_1 article-title: Some progresses of chaotic cipher and its applications in multimedia secure communications publication-title: J. Electron. Inf. Technol. – volume: 87 start-page: 337 year: 2017 ident: ref_11 article-title: Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption publication-title: Nonlinear Dyn. doi: 10.1007/s11071-016-3046-0 – ident: ref_23 doi: 10.3390/e23091159 – volume: 87 start-page: 127 year: 2017 ident: ref_2 article-title: An image encryption scheme based on chaotic tent map publication-title: Nonlinear Dyn. doi: 10.1007/s11071-016-3030-8 – ident: ref_34 doi: 10.3390/e24010040 – volume: 52 start-page: 6 year: 2017 ident: ref_8 article-title: An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2016.12.007 – volume: 82 start-page: 121 year: 2016 ident: ref_16 article-title: Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2016.02.018 – volume: 54 start-page: 102566 year: 2020 ident: ref_37 article-title: Cryptanalysis of an image block encryption algorithm based on chaotic maps publication-title: J. Inf. Secur. Appl. – volume: 343 start-page: 10 year: 2015 ident: ref_15 article-title: Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform publication-title: Opt. Commun. doi: 10.1016/j.optcom.2014.12.084 – volume: 142 start-page: 292 year: 2018 ident: ref_33 article-title: Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation publication-title: Signal Process. doi: 10.1016/j.sigpro.2017.06.014 – volume: 31 start-page: 219 year: 2019 ident: ref_7 article-title: A novel image encryption scheme based on DNA sequence operations and chaotic systems publication-title: Neural Comput. Appl. doi: 10.1007/s00521-017-2993-9 – volume: 99 start-page: 3041 year: 2020 ident: ref_13 article-title: An image encryption scheme based on a new hybrid chaotic map and optimized substitution box publication-title: Nonlinear Dyn. doi: 10.1007/s11071-019-05413-8 – volume: 142 start-page: 107252 year: 2021 ident: ref_39 article-title: Image encryption algorithm based on 2D hyperchaotic map publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2021.107252 – ident: ref_9 doi: 10.3390/e22070772 – volume: 2020 start-page: 9721675 year: 2020 ident: ref_25 article-title: Image encryption scheme based on a generalized arnold map and RSA algorithm publication-title: Secur. Commun. Netw. doi: 10.1155/2020/9721675 – volume: 61 start-page: 102931 year: 2021 ident: ref_3 article-title: 4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion publication-title: J. Inf. Secur. Appl. – volume: 79 start-page: 29243 year: 2020 ident: ref_18 article-title: A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing publication-title: Multimed. Tools Appl. doi: 10.1007/s11042-020-09542-w – volume: 88 start-page: 1305 year: 2017 ident: ref_32 article-title: Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion publication-title: Nonlinear Dyn. doi: 10.1007/s11071-016-3311-2 – volume: 128 start-page: 105995 year: 2020 ident: ref_21 article-title: An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2019.105995 – ident: ref_40 doi: 10.3390/e24111551 – volume: 137 start-page: 106393 year: 2021 ident: ref_10 article-title: Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2020.106393 – volume: 134 start-page: 106202 year: 2020 ident: ref_22 article-title: Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2020.106202 – volume: 83 start-page: 103424 year: 2022 ident: ref_38 article-title: Security measurement of a medical communication scheme based on chaos and DNA coding publication-title: J. Vis. Commun. Image Represent. doi: 10.1016/j.jvcir.2021.103424 – volume: 8 start-page: 1259 year: 1998 ident: ref_5 article-title: Symmetric ciphers based on two-dimensional chaotic maps publication-title: Int. J. Bifurc. Chaos doi: 10.1142/S021812749800098X – ident: ref_35 doi: 10.3390/e21030246 – ident: ref_12 doi: 10.3390/e21080790 – volume: 134 start-page: 337 year: 2019 ident: ref_30 article-title: Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps publication-title: Eur. Phys. J. Plus doi: 10.1140/epjp/i2019-12797-4 – ident: ref_31 doi: 10.1155/2020/5747082 – volume: 68 start-page: 3794 year: 2021 ident: ref_4 article-title: Constructing Higher-Dimensional Digital Chaotic Systems via Loop-State Contraction Algorithm publication-title: IEEE Trans. Circuits Syst. Regul. Pap. doi: 10.1109/TCSI.2021.3091404 |
| SSID | ssj0023216 |
| Score | 2.3979597 |
| Snippet | This paper analyzes the security of an image encryption algorithm based on a two-dimensional hyperchaotic map. This encryption algorithm generated chaotic... |
| SourceID | doaj unpaywall pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | 395 |
| SubjectTerms | Algorithms Analysis Chaos theory chosen plaintext attack Columnar structure cryptanalysis Cryptography Data encryption Diffusion Encryption Equivalence hyperchaotic map image encryption Image processing Mappings (Mathematics) Methods Multimedia Neural networks Optimization Permutations Security Two dimensional analysis |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwELYqLu0FFbWUtLRyoVK5RCSOH_FxeWlbiZ5A2pvl-FGQlmS13RXi3zOTZKPdFtQL13gUjcfz-CaxPxPyTfPK51z4FGp9lXLbbgLgMeURuVKU1YzhAefLX3J8zX9OxGTtqi_cE9bRA3eGO5aiAgzCPCtCxXPInt5JlftCRldEwM-YfbNSr5qpvtUqWC47HqECmvrjAIUecjVeIrFWfVqS_n9T8Vot-nuf5OtlPbMP93Y6XStCF2_Jdo8e6ajTeoe8CvU7MjmdP8wA43XsIrSJ1Nb0xx0kCnpeOxwD29PR9Hczv13c3NETKFyewqOr-yY9Q3b_jpmDjqEnReqkBt5OL-3sPbm-OL86Haf9hQmpg7q_SLWwqowAMVjwpfTC8qghsVoAZcIFxoJyWRWCCNAWeQ3RHSoRFDQ0nPssRl_skq26qcMeodpFp4LXmXAtC5jmWRDSysrzrLRBJORoZUjjejZxvNRiaqCrQJubweYJORhEZx2FxlNCJ7gagwCyXrcPwBdM7wvmf76QkO-4lgZjE5Rxtj9iAFNCliszArikJAeIk5D91XKbPmj_GKYAKxe6lDD8dRiGcMN_KLYOzbKVAZXx829CPnTeMehcSF1iuU9IueE3G5PaHKlvb1pKb-TtUyqTCTkcXOx5Y318CWN9Im8YBEp7PD_fJ1uL-TJ8BoC1qL60sfQI7dQh6A priority: 102 providerName: Directory of Open Access Journals – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbQ9gAXHuIVKMg8JLikefkRn9C2tFqQWnHoSsspcvxoV90m0TZLVX4948Qb7RaQEFd7YtnxeOYbe_wZofeClDohVIfg68uQyC4JgNiQWMeVwqVIU3fB-fiETabk64zO_IbblU-rhFB83hlpd2oTkiyOo5RGWZQJGjXafvrhd5ISl57JqSBggncYBSw-QjvTk2_j790Rp_-2pxPKILaPDPh7MNnuLYkNJ9Rx9f9ukTdc0u10yburqpE313Kx2PBFRw9QsR5Fn4Jysbdqyz318xbB4_8P8yG672EqHvd69QjdMdVjNDtY3jQAJnsaE1xbLCv85RIsEj6slKuDhvB4cVYv5-35Jd4HD6kxFJ1e1-Fn94xATwGCJxD8Oo6mGlrHx7J5gqZHh6cHk9C_zBAqABhtKKjkuQUskxqdM00lsQIsuAT0R5VJU8NVXBpDDcRfWoAZMSU1HCInQnRsrc6eolFVV-Y5wkJZxY0WMVUd3ZggsaFMslKTOJeGBujjeqoK5WnL3esZiwLCFzerxTCrAXo7iDY9V8efhPbdfA8Cjl67K6iXZ4VfrQWjJQDfVKeZKUkCLlsrxhOdMasyC0FbgD44bSmcEYDOKOnvMsCQHJ1WMQZcxhkBLBWg3bVCFd46XBUpB1CeiZxB9ZuhGta1O6yRlalXnQx02e0zB-hZr39DnzMmcocrApRvaebWoLZrqvl5xx3uCAI5j1mA3g1K_Pef9eKfpF6ieylAv-6if7KLRu1yZV4BVGvL1349_gI74zeK priority: 102 providerName: Unpaywall |
| Title | Cryptanalysis of an Image Encryption Algorithm Based on Two-Dimensional Hyperchaotic Map |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/36981284 https://www.proquest.com/docview/2791639869 https://www.proquest.com/docview/2792509003 https://pubmed.ncbi.nlm.nih.gov/PMC10047706 https://www.mdpi.com/1099-4300/25/3/395/pdf?version=1676975942 https://doaj.org/article/65b9232d23eb41429dc671d36fc3f230 |
| UnpaywallVersion | publishedVersion |
| Volume | 25 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVFSB databaseName: Free Full-Text Journals in Chemistry customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: HH5 dateStart: 19990101 isFulltext: true titleUrlDefault: http://abc-chemistry.org/ providerName: ABC ChemistRy – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: KQ8 dateStart: 19990101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: DOA dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: Academic Search Ultimate - eBooks customDbUrl: https://search.ebscohost.com/login.aspx?authtype=ip,shib&custid=s3936755&profile=ehost&defaultdb=asn eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: ABDBF dateStart: 20081201 isFulltext: true titleUrlDefault: https://search.ebscohost.com/direct.asp?db=asn providerName: EBSCOhost – providerCode: PRVFQY databaseName: Geneva Foundation for Medical Education and Research Open Access Journals customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: GX1 dateStart: 19990101 isFulltext: true titleUrlDefault: http://www.gfmer.ch/Medical_journals/Free_medical.php providerName: Geneva Foundation for Medical Education and Research – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: M~E dateStart: 19990101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: RPM dateStart: 20180101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: BENPR dateStart: 19990301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: 8FG dateStart: 19990301 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bb9MwFD7augd4QSBugVGZiwQv0RLHceIHhNrRriCtmtAmlafIsZ0NqUtKaTXt33NOkoaW20sebCvy5Vy-48t3AN4okdtQxNZHX5_7QteXAEThi4K4UhKtOKcHzqdTObkQn2fxbA-mm7cwdK1yYxNrQ20rQ3vkRzxBIBOpVKoPi-8-ZY2i09VNCg3dplaw72uKsX044MSM1YOD4Wh69qULwSIeyoZfKMJg_8ghAEAbTskltrxSTd7_p4ne8lG_35-8sy4X-vZGz-dbzml8H-61qJINGjF4AHuufAiz4-XtArFfwzrCqoLpkn26RgPCRqWhOlwTNphf4jBXV9dsiA7NMiw6v6n8j8T63zB2sAnGqkSpVOHf2alePIKL8ej8eOK3iRR8g3hg5atYJ2mB0IM7m0oba1EoNLgawVpsHOcuMUHuXOwwXLIKtd7lsUsw0BHCBkVho8fQK6vSPQWmTGESZ1UQm5odTInAxVLL3Iog1S724N1mIjPTsoxTsot5htEGzXnWzbkHr7qmi4Za42-NhrQaXQNiw64LquVl1ipXJuMccSq3PHK5CNHDWiOT0EayMFGBMZYHb2ktM9JZ7IzR7dMDHBKxX2UDhFGJFAh9PDjcLHfWKvOP7JfoefCyq0Y1pLMVXbpqXbfBLtO2sAdPGuno-hxJlRIM8CDdkZudQe3WlN-uaqpv4vNLkkB68LoTsX9P1rP_9_453OWoAvWD_PAQeqvl2r1ASLXK-7Cfjk_6rbb0640J_J7MQiy7mJ4Nvv4E8ewlQQ |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFD4a28N4QSBugQHmJniJljq2Ez9MqN06tWytEOqkvWWO7WxIXVK6VlX_HL-N4yQNLbe3vSZW5Byfc77vJPZ3AN5JlpoW48ZHrE99pspNACzzWea0UiIlKXUHnAdD0Ttjn8_5-Rb8WJ2FcdsqVzmxTNSm0O4b-T6NkMiEMhby0-S777pGub-rqxYaqm6tYA5KibH6YMeJXS6whLs56B_her-n9Lg7Ouz5dZcBXyNYznzJVRRniMvUmlgYrlgmMRspZDJcW0ptpIPUWm6xljASQ8Km3EZYBTBmgiwzIT73DuywkEks_nY63eGXr03JF9KWqPSMwlAG-xYJB2KGa2axhoJls4A_IWENE3_fr7k7zydquVDj8RoYHt-HezWLJe3K7R7Als0fwvnhdDlBrlmpnJAiIyon_WtMWKSba3cPfYC0x5do1tnVNekggBqCl0aLwj9yXQYqhRDSw9rYSTgV-HQyUJNHcHYrJn0M23mR26dApM50ZI0MuC7VyCQLLBdKpIYFsbLcg48rQya6VjV3zTXGCVY3zuZJY3MP3jRDJ5WUx98GddxqNAOc-nZ5oZheJnUwJ4KnyIupoaFNWQsR3WgRtUwoMh1mWNN58MGtZeJyBE5Gq_qoA76SU9tK2kjbIsGQanmwt1rupE4eN8kvV_fgdXMbw979y1G5LeblGJyy-wztwZPKO5o5h0LGjnZ4EG_4zcZLbd7Jv12V0uJOPzCKAuHB28bF_m2sZ_-f_SvY7Y0Gp8lpf3jyHO5SDIdSDKC1B9uz6dy-QDo3S1_WMUPg4rbD9CdBbl7L |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1bb9MwFLbGkIAXBOIWGGBugpeoqePY8QNC3brSMjbxsEl7C44vG1KXlK5V1b_Gr-OcJA0tt7e9xlbknOt3Yvs7hLxWPLddntgQcn0ecl0dAuA-5B65UqRWjOEF58MjMTzhn06T0y3yY3UXBo9VrmJiFahtafAfeYdJADKxSoXq-OZYxJf-4MPke4gdpHCnddVOozaRA7dcQPl2-X7UB12_YWywf7w3DJsOA6GBRDkLVaJl6iEnM2dTYRPNvYJIpAHFJMYx5qSJcucSB3WEVeAOLk-chAqAcxt5b2N47zVyXSKLO95SH3xsi72YdUXNZBTHKuo4gBqQLbCNxVr-q9oE_JkM1rLh7yc1b86LiV4u9Hi8lgYHd8jtBr_SXm1wd8mWK-6R073pcgIos-Y3oaWnuqCjCwhVdL8wOAbap73xGQhxdn5BdyF1WgqPjhdl2Mf-AjU3CB1CVYzkTSW8nR7qyX1yciUCfUC2i7JwjwhVxhvprIoSU_GQKR65RGiRWx6l2iUBebcSZGYaPnNsqzHOoK5BmWetzAPysp06qUk8_jZpF7XRTkDe7epBOT3LGjfORJIDImaWxS7nXcjl1gjZtbHwJvZQzQXkLeoyw-gAizG6ueQAn4Q8W1kPAJsUHEBWQHZW6s6asHGZ_TLygLxoh8HhcRdHF66cV3NgyfgDOiAPa-to1xwLlSLgCEi6YTcbH7U5Unw7r0jFkTlQykgE5FVrYv8W1uP_r_45uQHOmX0eHR08IbcYeEPFAtDdIduz6dw9BRw3y59VDkPJ16v20J-0n1xl |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbQ9gAXHuIVKMg8JLikefkRn9C2tFqQWnHoSsspcvxoV90m0TZLVX4948Qb7RaQEFd7YtnxeOYbe_wZofeClDohVIfg68uQyC4JgNiQWMeVwqVIU3fB-fiETabk64zO_IbblU-rhFB83hlpd2oTkiyOo5RGWZQJGjXafvrhd5ISl57JqSBggncYBSw-QjvTk2_j790Rp_-2pxPKILaPDPh7MNnuLYkNJ9Rx9f9ukTdc0u10yburqpE313Kx2PBFRw9QsR5Fn4Jysbdqyz318xbB4_8P8yG672EqHvd69QjdMdVjNDtY3jQAJnsaE1xbLCv85RIsEj6slKuDhvB4cVYv5-35Jd4HD6kxFJ1e1-Fn94xATwGCJxD8Oo6mGlrHx7J5gqZHh6cHk9C_zBAqABhtKKjkuQUskxqdM00lsQIsuAT0R5VJU8NVXBpDDcRfWoAZMSU1HCInQnRsrc6eolFVV-Y5wkJZxY0WMVUd3ZggsaFMslKTOJeGBujjeqoK5WnL3esZiwLCFzerxTCrAXo7iDY9V8efhPbdfA8Cjl67K6iXZ4VfrQWjJQDfVKeZKUkCLlsrxhOdMasyC0FbgD44bSmcEYDOKOnvMsCQHJ1WMQZcxhkBLBWg3bVCFd46XBUpB1CeiZxB9ZuhGta1O6yRlalXnQx02e0zB-hZr39DnzMmcocrApRvaebWoLZrqvl5xx3uCAI5j1mA3g1K_Pef9eKfpF6ieylAv-6if7KLRu1yZV4BVGvL1349_gI74zeK |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+an+Image+Encryption+Algorithm+Based+on+Two-Dimensional+Hyperchaotic+Map&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Jiang%2C+Qinmao&rft.au=Yu%2C+Simin&rft.au=Wang%2C+Qianxue&rft.date=2023-02-21&rft.pub=MDPI+AG&rft.eissn=1099-4300&rft.volume=25&rft.issue=3&rft.spage=395&rft_id=info:doi/10.3390%2Fe25030395&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon |