{"id":"https://openalex.org/W2783198421","doi":"https://doi.org/10.1109/mmul.2018.112142439","title":"Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System","display_name":"Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System","publication_year":2018,"publication_date":"2018-01-16","ids":{"openalex":"https://openalex.org/W2783198421","doi":"https://doi.org/10.1109/mmul.2018.112142439","mag":"2783198421"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mmul.2018.112142439","pdf_url":null,"source":{"id":"https://openalex.org/S72873717","display_name":"IEEE Multimedia","issn_l":"1070-986X","issn":["1070-986X","1941-0166"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100351523","display_name":"Ming Li","orcid":"https://orcid.org/0000-0003-3385-8364"},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"funder","lineage":["https://openalex.org/I75955062"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["Henan Normal University"],"affiliations":[{"raw_affiliation_string":"Henan Normal University","institution_ids":["https://openalex.org/I75955062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101676180","display_name":"Haiju Fan","orcid":"https://orcid.org/0000-0002-2558-1767"},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"funder","lineage":["https://openalex.org/I75955062"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiju Fan","raw_affiliation_strings":["Henan Normal University"],"affiliations":[{"raw_affiliation_string":"Henan Normal University","institution_ids":["https://openalex.org/I75955062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["Deakin University"],"affiliations":[{"raw_affiliation_string":"Deakin University","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101863952","display_name":"Li Yang","orcid":"https://orcid.org/0000-0003-0314-503X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"funder","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Li","raw_affiliation_strings":["Beihang University"],"affiliations":[{"raw_affiliation_string":"Beihang University","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"funder","lineage":["https://openalex.org/I142108993"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["Southwest University"],"affiliations":[{"raw_affiliation_string":"Southwest University","institution_ids":["https://openalex.org/I142108993"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.949,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":49,"citation_normalized_percentile":{"value":0.901524,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"25","issue":"3","first_page":"92","last_page":"101"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9726,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9622,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plaintext","display_name":"Plain text","score":0.57058066},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.46642572},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.45022956}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.79569626},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7380251},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6999535},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.6033153},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.57210726},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.57058066},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5170663},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.51681954},{"id":"https://openalex.org/C42812","wikidata":"https://www.wikidata.org/wiki/Q1082910","display_name":"Partition (number theory)","level":2,"score":0.5033447},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.50077534},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.46642572},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.46295223},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4576785},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.45022956},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.434421},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.42936206},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4247976},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23510155},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.17705521},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1692437},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16835201},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/mmul.2018.112142439","pdf_url":null,"source":{"id":"https://openalex.org/S72873717","display_name":"IEEE Multimedia","issn_l":"1070-986X","issn":["1070-986X","1941-0166"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61602158"},{"funder":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council","award_id":"LP170100458"}],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1975144438","https://openalex.org/W1978868455","https://openalex.org/W1983093940","https://openalex.org/W1993966252","https://openalex.org/W2030693839","https://openalex.org/W2036904662","https://openalex.org/W2062086221","https://openalex.org/W2071379504","https://openalex.org/W2088148276","https://openalex.org/W2239443241","https://openalex.org/W2323254472","https://openalex.org/W2323473128","https://openalex.org/W2347906051","https://openalex.org/W2463113177","https://openalex.org/W2463352023","https://openalex.org/W298899479"],"related_works":["https://openalex.org/W4299870558","https://openalex.org/W4245054042","https://openalex.org/W3211136635","https://openalex.org/W2966184072","https://openalex.org/W2889213958","https://openalex.org/W2599014939","https://openalex.org/W2355986883","https://openalex.org/W2175086517","https://openalex.org/W2172102352","https://openalex.org/W2025178316"],"abstract_inverted_index":{"This":[0],"paper":[1],"found":[2],"that":[3],"a":[4],"novel":[5],"hyper-chaotic":[6],"based":[7],"image":[8],"encryption":[9],"scheme":[10,40],"is":[11],"vulnerable":[12],"to":[13],"chosen":[14],"plaintext":[15],"attack.":[16],"By":[17],"performing":[18],"permutation":[19],"before":[20],"the":[21,30,33,35,38],"vector":[22],"partition":[23],"and":[24],"adding":[25],"two-round":[26],"crossover":[27],"diffusion":[28],"at":[29],"end":[31],"of":[32,37],"encryption,":[34],"security":[36],"original":[39],"has":[41],"been":[42],"greatly":[43],"improved.":[44]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2783198421","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":18},{"year":2018,"cited_by_count":3}],"updated_date":"2025-03-16T07:43:55.945679","created_date":"2018-01-26"}