{"id":"https://openalex.org/W7119517438","doi":"https://doi.org/10.1016/j.array.2025.100642","title":"Chosen-plaintext attacks on image ciphers based on nonlinear dynamical systems","display_name":"Chosen-plaintext attacks on image ciphers based on nonlinear dynamical systems","publication_year":2026,"publication_date":"2026-01-09","ids":{"openalex":"https://openalex.org/W7119517438","doi":"https://doi.org/10.1016/j.array.2025.100642"},"language":"en","primary_location":{"id":"doi:10.1016/j.array.2025.100642","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2025.100642","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.array.2025.100642","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032327669","display_name":"Mohammad Mazyad Hazzazi","orcid":"https://orcid.org/0000-0002-7945-9994"},"institutions":[{"id":"https://openalex.org/I82952536","display_name":"King Khalid University","ror":"https://ror.org/052kwzs30","country_code":"SA","type":"education","lineage":["https://openalex.org/I82952536"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammad Mazyad Hazzazi","raw_affiliation_strings":["Department of Mathematics, College of Science, King Khalid University, Abha, 61413, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, College of Science, King Khalid University, Abha, 61413, Saudi Arabia","institution_ids":["https://openalex.org/I82952536"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047819360","display_name":"Dawood Shah","orcid":"https://orcid.org/0000-0001-9589-5991"},"institutions":[{"id":"https://openalex.org/I12469534","display_name":"Quaid-i-Azam University","ror":"https://ror.org/04s9hft57","country_code":"PK","type":"education","lineage":["https://openalex.org/I12469534"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Dawood Shah","raw_affiliation_strings":["Department of Mathematics, Quaid-i-Azam University Islamabad"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Quaid-i-Azam University Islamabad","institution_ids":["https://openalex.org/I12469534"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070324443","display_name":"Mansoor Alghamdi","orcid":"https://orcid.org/0000-0002-2891-6374"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mansoor Alghamdi","raw_affiliation_strings":["Department of Computer Science, University of Tabuk, Tabuk 71491, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Tabuk, Tabuk 71491, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003230594","display_name":"Ibrahim S. Alkhazi","orcid":"https://orcid.org/0000-0001-8447-3486"},"institutions":[{"id":"https://openalex.org/I72264486","display_name":"University of Tabuk","ror":"https://ror.org/04yej8x59","country_code":"SA","type":"education","lineage":["https://openalex.org/I72264486"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ibrahim S. Alkhazi","raw_affiliation_strings":["College of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia","institution_ids":["https://openalex.org/I72264486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029566251","display_name":"Naveed Riaz","orcid":"https://orcid.org/0000-0001-5770-2554"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]},{"id":"https://openalex.org/I110357561","display_name":"University of the Sciences","ror":"https://ror.org/048gmay44","country_code":"US","type":"education","lineage":["https://openalex.org/I110357561"]}],"countries":["PK","US"],"is_corresponding":true,"raw_author_name":"Naveed Riaz","raw_affiliation_strings":["SEECS, National University of Sciences and Technology, Islamabad"],"affiliations":[{"raw_affiliation_string":"SEECS, National University of Sciences and Technology, Islamabad","institution_ids":["https://openalex.org/I110357561","https://openalex.org/I929597975"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5029566251"],"corresponding_institution_ids":["https://openalex.org/I110357561","https://openalex.org/I929597975"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07027027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"29","issue":null,"first_page":"100642","last_page":"100642"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.007300000172108412,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.00279999990016222,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7645999789237976},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6499000191688538},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5763999819755554},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5284000039100647},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.5145000219345093},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.47279998660087585},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4722999930381775},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.42890000343322754},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.3797000050544739}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7645999789237976},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6499000191688538},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6182000041007996},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5763999819755554},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5284000039100647},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5268999934196472},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5145000219345093},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.47279998660087585},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4722999930381775},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.42890000343322754},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3831000030040741},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.3797000050544739},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.35749998688697815},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.3538999855518341},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3411000072956085},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.33379998803138733},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.32100000977516174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30820000171661377},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3059999942779541},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.296099990606308},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.29429998993873596},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.2759999930858612},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.27300000190734863},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26919999718666077},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.267300009727478},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.26649999618530273},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.2632000148296356},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2554999887943268},{"id":"https://openalex.org/C164614171","wikidata":"https://www.wikidata.org/wiki/Q5204775","display_name":"DECIPHER","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.array.2025.100642","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2025.100642","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:49d9a8794a154dfeb2eefdb91cc6da2f","is_oa":true,"landing_page_url":"https://doaj.org/article/49d9a8794a154dfeb2eefdb91cc6da2f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Array, Vol 29, Iss , Pp 100642- (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.array.2025.100642","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.array.2025.100642","pdf_url":null,"source":{"id":"https://openalex.org/S4210194039","display_name":"Array","issn_l":"2590-0056","issn":["2590-0056"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Array","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4956814646720886}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1974878531","https://openalex.org/W2007283093","https://openalex.org/W2060791695","https://openalex.org/W2144896094","https://openalex.org/W2323473128","https://openalex.org/W2338249990","https://openalex.org/W2507650878","https://openalex.org/W2896583425","https://openalex.org/W2990655023","https://openalex.org/W3016758421","https://openalex.org/W3048300528","https://openalex.org/W3083378171","https://openalex.org/W3128918968","https://openalex.org/W3197451289","https://openalex.org/W4206070207","https://openalex.org/W4213124826","https://openalex.org/W4214888704","https://openalex.org/W4240245920","https://openalex.org/W4280589721","https://openalex.org/W4282007345","https://openalex.org/W4282823659","https://openalex.org/W4304889886","https://openalex.org/W4307816509","https://openalex.org/W4379518973","https://openalex.org/W4390816738","https://openalex.org/W4404331989","https://openalex.org/W4407449725"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,14,18,83,88,151,187],"the":[3,46,163,177,188,192],"fields":[4],"of":[5,55,111,147,169,195],"wireless":[6],"communication":[7],"networks":[8],"and":[9,30,62,69,96,120,136],"digital":[10,23],"technologies":[11],"has":[12,37,49],"resulted":[13],"a":[15,39,130,144,152,170],"significant":[16],"increase":[17],"multimedia":[19],"data":[20],"sharing,":[21],"especially":[22],"images.":[24,73],"Digital":[25],"images":[26],"often":[27],"carry":[28],"sensitive":[29],"personal":[31],"information,":[32],"so":[33],"ensuring":[34],"their":[35,122],"security":[36,81,183],"become":[38],"critical":[40],"concern.":[41],"To":[42],"address":[43],"these":[44],"challenges,":[45],"cryptography":[47],"community":[48],"developed":[50],"various":[51,80],"encryption":[52,85,113,134,197],"techniques,":[53],"many":[54],"which":[56],"rely":[57],"on":[58,93,116],"nonlinear":[59,117],"dynamical":[60,118],"systems":[61,119],"employ":[63],"processes":[64],"such":[65],"as":[66],"pixel":[67,94],"permutation":[68,95],"diffusion":[70],"to":[71,124],"secure":[72],"In":[74],"this":[75],"article,":[76],"we":[77,107,128,156],"have":[78],"analyzed":[79],"vulnerabilities":[82],"image":[84,112,133,196],"schemes":[86,114],"available":[87],"literature":[89,189],"that":[90,138,158,176],"are":[91],"based":[92,115,132],"substitution.":[97],"The":[98],"study":[99],"is":[100],"divided":[101],"into":[102],"two":[103],"main":[104],"parts.":[105],"First,":[106],"identify":[108],"four":[109],"types":[110],"demonstrate":[121],"susceptibility":[123],"chosen-plaintext":[125],"attacks.":[126],"Secondly,":[127],"implement":[129],"substitution-permutation":[131],"scheme":[135,179],"show":[137],"it":[139],"can":[140,161],"be":[141],"distinguished":[142],"using":[143],"small":[145],"number":[146],"chosen":[148,172],"plaintext":[149,165],"pairs":[150],"distinguishability":[153],"game.":[154],"Furthermore,":[155],"prove":[157],"an":[159],"attacker":[160],"recover":[162],"original":[164],"by":[166],"leveraging":[167],"knowledge":[168],"few":[171],"plaintext-ciphertext":[173],"pairs,":[174],"despite":[175],"implemented":[178],"successfully":[180],"passes":[181],"all":[182],"evaluation":[184],"tests":[185],"proposed":[186],"for":[190],"assessing":[191],"cryptographic":[193],"strength":[194],"schemes.":[198]},"counts_by_year":[],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2026-01-09T00:00:00"}
