{"id":"https://openalex.org/W4319659941","doi":"https://doi.org/10.32604/csse.2023.036152","title":"Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm","display_name":"Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4319659941","doi":"https://doi.org/10.32604/csse.2023.036152"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.32604/csse.2023.036152","pdf_url":"https://file.techscience.com/files/csse/2023/TSP_CSSE-46-2/TSP_CSSE_36152/TSP_CSSE_36152.pdf","source":{"id":"https://openalex.org/S4210214087","display_name":"Computer Systems Science and Engineering","issn_l":"0267-6192","issn":["0267-6192"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://file.techscience.com/files/csse/2023/TSP_CSSE-46-2/TSP_CSSE_36152/TSP_CSSE_36152.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026392286","display_name":"Mohammed S. Alshehri","orcid":"https://orcid.org/0000-0001-9471-7720"},"institutions":[{"id":"https://openalex.org/I47164929","display_name":"Najran University","ror":"https://ror.org/05edw4a90","country_code":"SA","type":"funder","lineage":["https://openalex.org/I47164929"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed S. Alshehri","raw_affiliation_strings":["Department of Computer Science, Najran University, Najran, 55461, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Najran University, Najran, 55461, Saudi Arabia","institution_ids":["https://openalex.org/I47164929"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045573738","display_name":"Sultan Almakdi","orcid":"https://orcid.org/0000-0003-2415-7304"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sultan Almakdi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048562394","display_name":"Mimonah Al Qathrady","orcid":null},"institutions":[{"id":"https://openalex.org/I47164929","display_name":"Najran University","ror":"https://ror.org/05edw4a90","country_code":"SA","type":"funder","lineage":["https://openalex.org/I47164929"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mimonah Al Qathrady","raw_affiliation_strings":["Department of Computer Science, Najran University, Najran, 55461, Saudi Arabia","Department of Information Systems, Najran University, Najran, 55461, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Najran University, Najran, 55461, Saudi Arabia","institution_ids":["https://openalex.org/I47164929"]},{"raw_affiliation_string":"Department of Computer Science, Najran University, Najran, 55461, Saudi Arabia","institution_ids":["https://openalex.org/I47164929"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100754273","display_name":"Jawad Ahmad","orcid":"https://orcid.org/0000-0001-6289-8248"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"funder","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jawad Ahmad","raw_affiliation_strings":["School of Computing, Edinburgh Napier University, Edinburgh, EH10 5DT, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Edinburgh Napier University, Edinburgh, EH10 5DT, UK","institution_ids":["https://openalex.org/I251738"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.63,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":7,"citation_normalized_percentile":{"value":0.999961,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":92,"max":93},"biblio":{"volume":"46","issue":"2","first_page":"2401","last_page":"2414"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9854,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9843,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plaintext","display_name":"Plain text","score":0.5522348}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.81098044},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6404},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6181177},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6138263},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.61093324},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5522348},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4793428},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44911608},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.43673092},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.41399786},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13675252},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.32604/csse.2023.036152","pdf_url":"https://file.techscience.com/files/csse/2023/TSP_CSSE-46-2/TSP_CSSE_36152/TSP_CSSE_36152.pdf","source":{"id":"https://openalex.org/S4210214087","display_name":"Computer Systems Science and Engineering","issn_l":"0267-6192","issn":["0267-6192"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.32604/csse.2023.036152","pdf_url":"https://file.techscience.com/files/csse/2023/TSP_CSSE-46-2/TSP_CSSE_36152/TSP_CSSE_36152.pdf","source":{"id":"https://openalex.org/S4210214087","display_name":"Computer Systems Science and Engineering","issn_l":"0267-6192","issn":["0267-6192"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":26,"referenced_works":["https://openalex.org/W2010620862","https://openalex.org/W2030411764","https://openalex.org/W2051554132","https://openalex.org/W2088378984","https://openalex.org/W2097254069","https://openalex.org/W2359175208","https://openalex.org/W2970150948","https://openalex.org/W2976828254","https://openalex.org/W3009527247","https://openalex.org/W3039501094","https://openalex.org/W3105459532","https://openalex.org/W3122039345","https://openalex.org/W3122499862","https://openalex.org/W3146220037","https://openalex.org/W3161577134","https://openalex.org/W3167828613","https://openalex.org/W3179703973","https://openalex.org/W3194780722","https://openalex.org/W3197903522","https://openalex.org/W3198582384","https://openalex.org/W3206774568","https://openalex.org/W4206070207","https://openalex.org/W4210355663","https://openalex.org/W4212991603","https://openalex.org/W4293386063","https://openalex.org/W4306667010"],"related_works":["https://openalex.org/W4214523514","https://openalex.org/W2980642877","https://openalex.org/W2949316140","https://openalex.org/W2910586303","https://openalex.org/W2391199417","https://openalex.org/W2099770555","https://openalex.org/W2095023645","https://openalex.org/W2022545730","https://openalex.org/W2011670317","https://openalex.org/W1528334372"],"abstract_inverted_index":{"Chaos-based":[0],"cryptosystems":[1],"are":[2,15,216],"considered":[3],"a":[4,46,116,211],"secure":[5,208],"mode":[6],"of":[7,55,90,103,112,122,150,180,188,196],"communication":[8],"due":[9],"to":[10,21,41,71,144,176],"their":[11],"reliability.":[12],"Chaotic":[13],"maps":[14],"associated":[16],"with":[17,131],"the":[18,32,56,73,82,91,101,104,110,123,128,166,178,181,189,193,197,202],"other":[19],"domains":[20],"construct":[22],"robust":[23],"encryption":[24,29],"algorithms.":[25],"There":[26],"exist":[27],"numerous":[28],"schemes":[30],"in":[31,81,137,142,162],"literature":[33],"based":[34,60],"on":[35,45,61],"chaotic":[36],"maps.":[37],"This":[38,106],"work":[39],"aims":[40],"propose":[42],"an":[43],"attack":[44,130],"recently":[47],"proposed":[48,129],"hyper-chaotic":[49],"map-based":[50],"cryptosystem.":[51,105],"The":[52,77,87,119,135,186],"core":[53],"notion":[54],"original":[57,182,198],"algorithm":[58],"was":[59,69,79],"permutation":[62,67,74],"and":[63,84,183],"diffusion.":[64],"A":[65],"bit-level":[66],"approach":[68],"used":[70,161],"do":[72],"row-and":[75],"column-wise.":[76],"diffusion":[78],"executed":[80],"forward":[83],"backward":[85],"directions.":[86],"statistical":[88,146,174],"strength":[89],"cryptosystem":[92,114,124,154,203],"has":[93],"been":[94],"demonstrated":[95],"by":[96,100,127],"extensive":[97],"testing":[98],"conducted":[99],"author":[102],"cryptanalysis":[107,149],"article":[108],"investigates":[109],"robustness":[111],"this":[113,138],"against":[115],"chosen-plaintext":[117],"attack.":[118],"secret":[120],"keys":[121],"were":[125],"retrieved":[126,168,184],"258":[132],"chosen-plain":[133],"images.":[134],"results":[136,187],"manuscript":[139],"suggest":[140],"that,":[141],"addition":[143],"standard":[145],"evaluations,":[147],"thorough":[148],"each":[151],"newly":[152],"suggested":[153],"is":[155,169],"necessary":[156],"before":[157],"it":[158],"can":[159],"be":[160],"practical":[163],"application.":[164],"Moreover,":[165],"data":[167,209],"also":[170,217],"passed":[171],"through":[172],"some":[173],"analysis":[175,191],"compare":[177],"quality":[179],"data.":[185,199],"performance":[190],"indicate":[192],"exact":[194],"recovery":[195],"To":[200],"make":[201],"useful":[204],"for":[205],"applications":[206],"requiring":[207],"exchange,":[210],"few":[212],"further":[213],"improvement":[214],"recommendations":[215],"suggested.":[218]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4319659941","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3}],"updated_date":"2025-03-18T08:43:03.930214","created_date":"2023-02-10"}