{"id":"https://openalex.org/W4360616175","doi":"https://doi.org/10.1142/s0218127423500281","title":"Cryptanalysis of a Multiround Image Encryption Algorithm Based on 6D Self-Synchronizing Chaotic Stream Cipher","display_name":"Cryptanalysis of a Multiround Image Encryption Algorithm Based on 6D Self-Synchronizing Chaotic Stream Cipher","publication_year":2023,"publication_date":"2023-03-15","ids":{"openalex":"https://openalex.org/W4360616175","doi":"https://doi.org/10.1142/s0218127423500281"},"language":"en","primary_location":{"id":"doi:10.1142/s0218127423500281","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218127423500281","pdf_url":null,"source":{"id":"https://openalex.org/S81011612","display_name":"International Journal of Bifurcation and Chaos","issn_l":"0218-1274","issn":["0218-1274","1793-6551"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Bifurcation and Chaos","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026043071","display_name":"Zhuosheng Lin","orcid":"https://orcid.org/0000-0001-5963-8525"},"institutions":[{"id":"https://openalex.org/I4210151615","display_name":"Wuyi University","ror":"https://ror.org/0488wz367","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210151615"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhuosheng Lin","raw_affiliation_strings":["Faculty of Intelligent Manufacturing, Wuyi University, Jiangmen 529020, P. R. China"],"raw_orcid":"https://orcid.org/0000-0001-5963-8525","affiliations":[{"raw_affiliation_string":"Faculty of Intelligent Manufacturing, Wuyi University, Jiangmen 529020, P. R. China","institution_ids":["https://openalex.org/I4210151615"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100381173","display_name":"Yue Feng","orcid":"https://orcid.org/0000-0003-3407-8992"},"institutions":[{"id":"https://openalex.org/I4210151615","display_name":"Wuyi University","ror":"https://ror.org/0488wz367","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210151615"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Feng","raw_affiliation_strings":["Faculty of Intelligent Manufacturing, Wuyi University, Jiangmen 529020, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Intelligent Manufacturing, Wuyi University, Jiangmen 529020, P. R. China","institution_ids":["https://openalex.org/I4210151615"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113866977","display_name":"Shufen Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210151615","display_name":"Wuyi University","ror":"https://ror.org/0488wz367","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210151615"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shufen Liang","raw_affiliation_strings":["Faculty of Intelligent Manufacturing, Wuyi University, Jiangmen 529020, P. R. China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Intelligent Manufacturing, Wuyi University, Jiangmen 529020, P. R. China","institution_ids":["https://openalex.org/I4210151615"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026043071"],"corresponding_institution_ids":["https://openalex.org/I4210151615"],"apc_list":null,"apc_paid":null,"fwci":0.5791,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.66987785,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"33","issue":"03","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7271482348442078},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6663354635238647},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6258088946342468},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5148264765739441},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.5146787762641907},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.513097882270813},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5020391941070557},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4801342189311981},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.4770083427429199},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.47061994671821594},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.46899914741516113},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4675425887107849},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.36230286955833435},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.28548964858055115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12148749828338623},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.10583764314651489}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7271482348442078},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6663354635238647},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6258088946342468},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5148264765739441},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.5146787762641907},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.513097882270813},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5020391941070557},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4801342189311981},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.4770083427429199},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.47061994671821594},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.46899914741516113},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4675425887107849},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36230286955833435},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.28548964858055115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12148749828338623},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.10583764314651489}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0218127423500281","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218127423500281","pdf_url":null,"source":{"id":"https://openalex.org/S81011612","display_name":"International Journal of Bifurcation and Chaos","issn_l":"0218-1274","issn":["0218-1274","1793-6551"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Bifurcation and Chaos","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6804826955","display_name":null,"funder_award_id":"61901304","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1830572398","https://openalex.org/W1981938824","https://openalex.org/W2010620862","https://openalex.org/W2239443241","https://openalex.org/W2614101859","https://openalex.org/W2618287627","https://openalex.org/W2760967785","https://openalex.org/W2788952862","https://openalex.org/W2790225553","https://openalex.org/W2794632346","https://openalex.org/W2884276405","https://openalex.org/W2905551358","https://openalex.org/W2918149988","https://openalex.org/W2998204968","https://openalex.org/W3083333321","https://openalex.org/W3092259722"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W3154315844","https://openalex.org/W4250096293","https://openalex.org/W2949851597","https://openalex.org/W2571528214","https://openalex.org/W4249223604","https://openalex.org/W1998454771","https://openalex.org/W2995687140","https://openalex.org/W3190850519","https://openalex.org/W4239795009"],"abstract_inverted_index":{"Recently,":[0],"a":[1,98],"chaotic":[2,33,88],"secure":[3,278],"video":[4,24],"communication":[5],"system":[6],"based":[7,49],"on":[8,50],"FPGA":[9],"is":[10,47,95,193,222,249,276,285],"proposed,":[11],"which":[12],"essentially":[13],"encrypts":[14],"the":[15,23,30,39,43,54,60,87,92,111,114,118,131,144,153,157,161,166,185,188,196,215,224,243,246,253,259,271,280],"original":[16],"image":[17,172,192,221,273],"data":[18],"of":[19,42,56,91,156,163,168,187,217,282],"each":[20],"frame":[21],"in":[22,25,146,149,160,170,190,219,242,263],"multiple":[26],"rounds":[27,284],"by":[28,71,124,142,207,235,258],"using":[29],"6D":[31],"self-synchronizing":[32],"stream":[34],"cipher.":[35],"In":[36,53],"this":[37,109,264],"paper,":[38],"security":[40],"performance":[41],"multiround":[44,272],"encryption":[45,247,274,283],"algorithm":[46,275],"analyzed":[48],"divide-and-conquer":[51],"attack.":[52,80],"case":[55,162,244],"one":[57,100,286],"round":[58,248],"encryption,":[59,165],"keys":[61,116,132,159,197,225,254],"[Formula:":[62,65,133,136,198,201,226,229],"see":[63,66,134,137,199,202,227,230],"text]":[64,67,135,138,200,203,228,231],"can":[68,121,139,173,204,232],"be":[69,122,140,174,205,233,256],"deciphered":[70,141,206,234,257],"setting":[72,125,208,236],"30":[73,209],"appropriate":[74,127,210,238],"initial":[75,128,211,239],"conditions":[76],"according":[77,83],"to":[78,84,106,151,181],"known-plaintext":[79],"After":[81],"that,":[82],"chosen-ciphertext":[85,182],"attack,":[86,183],"iterative":[89],"equation":[90],"decryption":[93],"end":[94],"degenerated":[96],"into":[97],"linear":[99],"if":[101],"ciphertexts":[102],"are":[103],"all":[104],"set":[105],"zero.":[107],"Under":[108],"condition,":[110],"equations":[112,145],"between":[113],"unknown":[115,158],"and":[117,130],"plaintext-ciphertext":[119],"pairs":[120],"obtained":[123],"24":[126,237],"conditions,":[129],"solving":[143],"Mathematica.":[147],"Secondly,":[148],"order":[150],"reduce":[152],"multiplication":[154],"times":[155],"two-round":[164],"number":[167,186,216,281],"pixels":[169,189,218],"an":[171,191,220],"selected":[175],"as":[176,178],"little":[177],"possible.":[179],"According":[180],"when":[184,214,279],"only":[194],"one,":[195],"conditions.":[212,240],"Then,":[213],"two,":[223],"However,":[241],"that":[245,270],"three":[250],"or":[251,287],"more,":[252],"cannot":[255],"attack":[260],"method":[261],"proposed":[262],"paper.":[265],"The":[266],"analysis":[267],"results":[268],"show":[269],"not":[277],"two.":[288]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
