{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:08:34Z","timestamp":1725520114586},"reference-count":35,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"Recently, a new chaotic image encryption technique was proposed based on multiple discrete dynamic maps. The authors claim that the scheme can provide excellent privacy for traditional digital images. However, in order to minimize the computational cost, the encryption scheme adopts one-round encryption and a traditional permutation\u2013diffusion structure. Through cryptanalysis, there is no strong correlation between the key and the plain image, which leads to the collapse of cryptosystem. Based on this, two methods of chosen-plaintext attacks are proposed in this paper. The two methods require 3 pairs and 258 pairs of plain and cipher images, respectively, to break the original encryption system. The simulation results show the effectiveness of the two schemes.<\/jats:p>","DOI":"10.3390\/e23121581","type":"journal-article","created":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T10:23:02Z","timestamp":1638181382000},"page":"1581","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis of a New Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps"],"prefix":"10.3390","volume":"23","author":[{"given":"Haiju","family":"Fan","sequence":"first","affiliation":[{"name":"College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China"},{"name":"Engineering Lab of Intelligence Business & Internet of Things, Xinxiang 453007, China"},{"name":"Big Data Engineering Lab of Teaching Resources & Assessment of Education Quality, Xinxiang 453007, China"},{"name":"Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang 453007, China"}]},{"given":"Chenjiu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China"},{"name":"Engineering Lab of Intelligence Business & Internet of Things, Xinxiang 453007, China"},{"name":"Big Data Engineering Lab of Teaching Resources & Assessment of Education Quality, Xinxiang 453007, China"},{"name":"Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang 453007, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7587-3231","authenticated-orcid":false,"given":"Heng","family":"Lu","sequence":"additional","affiliation":[{"name":"College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China"},{"name":"Engineering Lab of Intelligence Business & Internet of Things, Xinxiang 453007, China"},{"name":"Big Data Engineering Lab of Teaching Resources & Assessment of Education Quality, Xinxiang 453007, China"},{"name":"Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang 453007, China"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China"},{"name":"Engineering Lab of Intelligence Business & Internet of Things, Xinxiang 453007, China"},{"name":"Big Data Engineering Lab of Teaching Resources & Assessment of Education Quality, Xinxiang 453007, China"},{"name":"Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang 453007, China"}]},{"given":"Yanfang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China"},{"name":"Engineering Lab of Intelligence Business & Internet of Things, Xinxiang 453007, China"},{"name":"Big Data Engineering Lab of Teaching Resources & Assessment of Education Quality, Xinxiang 453007, China"},{"name":"Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang 453007, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1016\/j.ins.2020.07.032","article-title":"Fair hierarchical secret sharing scheme based on smart contract","volume":"546","author":"Zhang","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/j.neucom.2021.09.050","article-title":"Practical multi-party private collaborative k-means clustering","volume":"467","author":"Zhang","year":"2022","journal-title":"Neurocomputing"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/11496137_27","article-title":"SCARE of the DES\u2014(Side channel analysis for reverse engineering of the data encryption standard)","volume":"3531","author":"Daudigny","year":"2005","journal-title":"Appl. Cryptogr. Netw. Secur. Proc."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s11277-016-3192-1","article-title":"Cryptanalysis of a highdefnition image encryption based on AES modifcation","volume":"88","author":"Ap","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","article-title":"2D Sine Logistic modulation map for image encryption","volume":"297","author":"Hua","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","article-title":"Image encryption using 2D logisticadjusted-sine map","volume":"339","author":"Ua","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","article-title":"Image encryption using a synchronous permutation-difusion technique","volume":"90","author":"Enayatifar","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"913","DOI":"10.3390\/e20120913","article-title":"A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System","volume":"20","author":"Irfan","year":"2018","journal-title":"Entropy"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.sigpro.2017.06.028","article-title":"Secure image cryptosystem with unique key streams via hyper-chaotic system","volume":"142","author":"Diab","year":"2018","journal-title":"Signal Process."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","article-title":"Exploiting self-adaptive permutation-difusion and DNA random encoding for secure and efcient image encryption","volume":"142","author":"Chen","year":"2018","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1007\/s11071-021-06542-9","article-title":"Image encryption algorithm with matrix semi-tensor product","volume":"105","author":"Zou","year":"2021","journal-title":"Nonlinear Dyn."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"107316","DOI":"10.1016\/j.optlastec.2021.107316","article-title":"An image encryption algorithm based on hyperchaotic system and DNA coding","volume":"143","author":"Xingyuan","year":"2021","journal-title":"Opt. Laser Technol."},{"key":"ref_13","first-page":"1105","article-title":"Image encryption based on chaotic maps","volume":"2","author":"Fridrich","year":"1997","journal-title":"IEEE Int. Conf. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","article-title":"A new 1D chaotic system for image encryption","volume":"97","author":"Zhou","year":"2014","journal-title":"Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","article-title":"A new color image encryption using combination of the 1D chaotic map","volume":"138","author":"Pak","year":"2017","journal-title":"Signal Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.ins.2017.02.036","article-title":"Design of image cipher using block-based scrambling and image filtering","volume":"396","author":"Hua","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.optlaseng.2016.10.019","article-title":"Color image encryption based on hybrid hyper-chaotic system and cellular automata","volume":"90","author":"Moattar","year":"2017","journal-title":"Opt. Lasers Eng."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","article-title":"Image encryption using 2D H\u00e9non-Sine map and DNA approach","volume":"153","author":"Wu","year":"2018","journal-title":"Signal Process."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"145798","DOI":"10.1109\/ACCESS.2019.2945578","article-title":"Cryptanalysis of a novel bit-level color image encryption using improved 1D chaotic map","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.sigpro.2017.11.005","article-title":"Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map","volume":"144","author":"Wang","year":"2018","journal-title":"Signal Process."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.ins.2020.12.037","article-title":"Differential cryptanalysis of image cipher using block-based scrambling and image filtering","volume":"554","author":"Feng","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"47102","DOI":"10.1109\/ACCESS.2018.2867111","article-title":"Cryptanalyzing a color image encryption scheme based on hybrid hyper-chaotic system and cellular automata","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.ins.2020.02.024","article-title":"Cryptanalysis of a DNA-based image encryption scheme","volume":"520","author":"Chen","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1007\/s11071-016-3311-2","article-title":"Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion","volume":"88","author":"Hu","year":"2017","journal-title":"Nonlinear Dyn."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s11071-019-04771-7","article-title":"Cryptanalysis and improvement of a chaotic image cipher using two-round permutation and diffusion","volume":"96","author":"Li","year":"2019","journal-title":"Nonlinear Dyn."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.sigpro.2015.06.007","article-title":"Color image encryption using chaotic nonlinear adaptive filter","volume":"117","author":"Hsiao","year":"2015","journal-title":"Signal Process."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.sigpro.2017.08.018","article-title":"Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter","volume":"143","author":"Fan","year":"2018","journal-title":"Signal Process."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","article-title":"Image encryption based on modified Henon map using hybrid chaotic shift transform","volume":"77","author":"Sheela","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.dsp.2019.07.013","article-title":"Cryptanalyzing an image encryption based on a modified Henon map using hybrid chaotic shift transform","volume":"93","author":"Zhou","year":"2019","journal-title":"Digit. Signal Process."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11554-019-00940-4","article-title":"A secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic (SC3) map","volume":"18","author":"Mondal","year":"2020","journal-title":"J. Real-Time Image Process."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Li, M., Wang, P., Yue, Y., and Liu, Y. (2021). Cryptanalysis of a secure image encryption scheme based on a novel 2D sine\u2013cosine cross-chaotic map. J. Real-Time Image Process., (prepublish).","DOI":"10.1007\/s11554-021-01091-1"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"26203","DOI":"10.1007\/s11042-019-07818-4","article-title":"A novel chaotic image encryption technique based on multiple discrete dynamical maps","volume":"78","author":"Khan","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1016\/j.sigpro.2012.11.019","article-title":"Cryptanalysis of a one round chaos-based substitution permutation network","volume":"93","author":"Arroyo","year":"2012","journal-title":"Signal Process."},{"key":"ref_34","first-page":"1163","article-title":"On the security of a class of diffusion mechanisms for image encryption","volume":"99","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Cybern."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TIFS.2015.2489178","article-title":"On the security of permutation-only image encryption schemes","volume":"11","author":"Jolfaei","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/12\/1581\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T01:44:59Z","timestamp":1721612699000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/23\/12\/1581"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":35,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["e23121581"],"URL":"https:\/\/doi.org\/10.3390\/e23121581","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,26]]}}}