{"id":"https://openalex.org/W4405397049","doi":"https://doi.org/10.1145/3708546","title":"Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual Protection","display_name":"Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual Protection","publication_year":2024,"publication_date":"2024-12-14","ids":{"openalex":"https://openalex.org/W4405397049","doi":"https://doi.org/10.1145/3708546"},"language":"en","primary_location":{"id":"doi:10.1145/3708546","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3708546","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029446704","display_name":"Mohamed Zakariya Talhaoui","orcid":"https://orcid.org/0000-0001-9020-8590"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mohamed Zakariya Talhaoui","raw_affiliation_strings":["School of Control Science and Engineering, Dalian University of Technology, Dalian, China","School of Control Science and Engineering, Dalian University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004591926","display_name":"Zhelong Wang","orcid":"https://orcid.org/0000-0003-4959-3372"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhelong Wang","raw_affiliation_strings":["School of Control Science and Engineering, Dalian University of Technology, Dalian, China","School of Control Science and Engineering, Dalian University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090899630","display_name":"Mohamed Amine Midoun","orcid":"https://orcid.org/0000-0003-4570-4258"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mohamed Amine Midoun","raw_affiliation_strings":["School of Control Science and Engineering, Dalian University of Technology, Dalian, China","School of Control Science and Engineering, Dalian University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111054018","display_name":"Abdelkarim Smaili","orcid":"https://orcid.org/0009-0000-8280-283X"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Abdelkarim Smaili","raw_affiliation_strings":["School of Software, Dalian University of Technology, Dalian, China","School of Software, Dalian University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Software, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Software, Dalian University of Technology, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034441270","display_name":"Djamel Eddine Mekkaoui","orcid":"https://orcid.org/0000-0002-6323-9516"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Djamel Eddine Mekkaoui","raw_affiliation_strings":["School of Computer Science and Technology, Dalian University of Technology, Dalian, China","School of Computer Science and Technology, Dalian University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008312507","display_name":"Mourad Lablack","orcid":"https://orcid.org/0000-0001-5997-7199"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mourad Lablack","raw_affiliation_strings":["School of Computer Science and Technology, Dalian University of Technology, Dalian, China","School of Computer Science and Technology, Dalian University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Computer Science and Technology, Dalian University of Technology, China","institution_ids":["https://openalex.org/I27357992"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100365770","display_name":"Ke Zhang","orcid":"https://orcid.org/0000-0003-4370-7877"},"institutions":[{"id":"https://openalex.org/I27357992","display_name":"Dalian University of Technology","ror":"https://ror.org/023hj5876","country_code":"CN","type":"education","lineage":["https://openalex.org/I27357992"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ke Zhang","raw_affiliation_strings":["School of Control Science and Engineering, Dalian University of Technology, Dalian, China","School of Control Science and Engineering, Dalian University of Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China","institution_ids":["https://openalex.org/I27357992"]},{"raw_affiliation_string":"School of Control Science and Engineering, Dalian University of Technology, China","institution_ids":["https://openalex.org/I27357992"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5029446704"],"corresponding_institution_ids":["https://openalex.org/I27357992"],"apc_list":null,"apc_paid":null,"fwci":0.7479,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.73841675,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"21","issue":"3","first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.9541000127792358,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9398999810218811,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8206998109817505},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.698844313621521},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6905500888824463},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6096423864364624},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5891077518463135},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.585178017616272},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.501476526260376},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48658573627471924},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.48315542936325073},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4323924779891968},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.4287511706352234},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.41314345598220825},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.36887580156326294},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3543955385684967},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.18297407031059265}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8206998109817505},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.698844313621521},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6905500888824463},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6096423864364624},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5891077518463135},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.585178017616272},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.501476526260376},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48658573627471924},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.48315542936325073},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4323924779891968},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.4287511706352234},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.41314345598220825},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.36887580156326294},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3543955385684967},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.18297407031059265}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3708546","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3708546","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2002341465","https://openalex.org/W2738748671","https://openalex.org/W2909459674","https://openalex.org/W2963375122","https://openalex.org/W3005341457","https://openalex.org/W3010845618","https://openalex.org/W3013808668","https://openalex.org/W3102014202","https://openalex.org/W3111390859","https://openalex.org/W3203043063","https://openalex.org/W3211136635","https://openalex.org/W4214814702","https://openalex.org/W4214851787","https://openalex.org/W4252445457","https://openalex.org/W4288458148","https://openalex.org/W4289544556","https://openalex.org/W4289731404","https://openalex.org/W4293221284","https://openalex.org/W4296143064","https://openalex.org/W4308437198","https://openalex.org/W4310249091","https://openalex.org/W4313254857","https://openalex.org/W4380854368","https://openalex.org/W4385428517","https://openalex.org/W4385699316","https://openalex.org/W4386518202","https://openalex.org/W4386600428","https://openalex.org/W4388827065","https://openalex.org/W4389889497","https://openalex.org/W4391092599","https://openalex.org/W4392380075","https://openalex.org/W4394585204"],"related_works":["https://openalex.org/W4245054042","https://openalex.org/W4394009573","https://openalex.org/W2910779227","https://openalex.org/W4294892315","https://openalex.org/W2889213958","https://openalex.org/W2175086517","https://openalex.org/W2966184072","https://openalex.org/W2039893264","https://openalex.org/W2389724189","https://openalex.org/W2548206273"],"abstract_inverted_index":{"Chaos-based":[0],"cryptosystems":[1],"are":[2,51,105],"regarded":[3],"as":[4,39],"highly":[5],"secure":[6],"techniques":[7],"for":[8],"image":[9,72],"encryption.":[10],"However,":[11],"despite":[12],"the":[13,68,77,87,98,117,124,140,151,176,183],"considerable":[14],"enhancement":[15],"of":[16,70,175],"encryption":[17,73,118],"robustness":[18],"provided":[19],"by":[20],"chaotic":[21,80],"systems,":[22],"security":[23,55,69,129,189],"vulnerabilities":[24,46,85,185],"may":[25],"still":[26],"arise,":[27],"potentially":[28],"leading":[29],"to":[30,53,93,115,181],"drastic":[31],"damage":[32],"in":[33,107],"contexts":[34],"involving":[35],"sensitive":[36],"data":[37],"such":[38],"medical":[40],"or":[41,169],"military":[42],"images.":[43,171],"Identifying":[44],"these":[45,155],"and":[47,57,119,136,148,162,186,190],"developing":[48],"corresponding":[49],"countermeasures":[50],"essential":[52],"prevent":[54],"breaches":[56],"achieve":[58],"higher":[59],"protection.":[60],"From":[61],"this":[62,64,108],"perspective,":[63],"research":[65],"thoroughly":[66],"examines":[67],"an":[71],"scheme":[74,88,178],"based":[75],"on":[76],"1D":[78],"sine-powered":[79],"map.":[81],"This":[82],"analysis":[83],"identifies":[84],"within":[86,160],"that":[89,154],"can":[90,157],"reduce":[91],"it":[92],"a":[94,165],"permutation-only":[95],"scheme.":[96],"Exploiting":[97],"found":[99],"vulnerabilities,":[100],"three":[101],"distinct":[102],"cryptanalysis":[103],"attacks":[104,111,142,156],"proposed":[106,141],"work.":[109],"These":[110],"enable":[112],"unauthorized":[113],"individuals":[114],"replicate":[116],"decryption":[120],"processes":[121],"without":[122],"possessing":[123],"secret":[125],"key,":[126],"posing":[127],"significant":[128],"risks.":[130],"Under":[131],"ciphertext-only":[132],"attack,":[133,135],"chosen-plaintext":[134],"chosen-ciphertext":[137],"attack":[138],"conditions,":[139],"demonstrate":[143],"their":[144],"effectiveness":[145],"through":[146],"simulation":[147],"experimentation.":[149],"Notably,":[150],"results":[152],"indicate":[153],"be":[158],"executed":[159],"seconds":[161],"using":[163],"only":[164],"few":[166],"special":[167],"plaintext":[168],"ciphertext":[170],"An":[172],"improved":[173],"version":[174],"analyzed":[177],"is":[179],"introduced":[180],"address":[182],"identified":[184],"enhance":[187],"its":[188],"speed.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
