{"id":"https://openalex.org/W7125818481","doi":"https://doi.org/10.3233/faia251660","title":"Cryptanalysis of Row-Column-Based Permutation Image Encryption Schemes with Known-Plaintext Attacks","display_name":"Cryptanalysis of Row-Column-Based Permutation Image Encryption Schemes with Known-Plaintext Attacks","publication_year":2026,"publication_date":"2026-01-27","ids":{"openalex":"https://openalex.org/W7125818481","doi":"https://doi.org/10.3233/faia251660"},"language":null,"primary_location":{"id":"doi:10.3233/faia251660","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251660","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia251660","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123914727","display_name":"Chengrui Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chengrui Zhang","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, Liaoning, P. R. China"],"raw_orcid":"https://orcid.org/0000-0001-9143-6130","affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, Liaoning, P. R. China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123976971","display_name":"Dongming Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongming Chen","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, Liaoning, P. R. China"],"raw_orcid":"https://orcid.org/0000-0001-7863-1230","affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, Liaoning, P. R. China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123997146","display_name":"Dongqi Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongqi Wang","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, Liaoning, P. R. China"],"raw_orcid":"https://orcid.org/0000-0002-2572-7658","affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, Liaoning, P. R. China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123913124","display_name":"Mingzhao Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingzhao Xie","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, Liaoning, P. R. China"],"raw_orcid":"https://orcid.org/0000-0003-3600-3062","affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, Liaoning, P. R. China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5123914727"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45748865,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9634000062942505,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9634000062942505,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.007699999958276749,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.007400000002235174,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7386999726295471},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.70660001039505},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6014000177383423},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5845000147819519},{"id":"https://openalex.org/keywords/correlation-attack","display_name":"Correlation attack","score":0.5108000040054321},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5044000148773193},{"id":"https://openalex.org/keywords/column","display_name":"Column (typography)","score":0.39070001244544983}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7386999726295471},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.70660001039505},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6014000177383423},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5845000147819519},{"id":"https://openalex.org/C120226833","wikidata":"https://www.wikidata.org/wiki/Q5172844","display_name":"Correlation attack","level":4,"score":0.5108000040054321},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5044000148773193},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5008999705314636},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.46299999952316284},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4383000135421753},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4318000078201294},{"id":"https://openalex.org/C2780551164","wikidata":"https://www.wikidata.org/wiki/Q2306599","display_name":"Column (typography)","level":3,"score":0.39070001244544983},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.35359999537467957},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.35010001063346863},{"id":"https://openalex.org/C200985842","wikidata":"https://www.wikidata.org/wiki/Q3375503","display_name":"Random permutation","level":3,"score":0.3481000065803528},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.3463999927043915},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.3073999881744385},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.3010999858379364},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.2809999883174896},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.2590000033378601}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia251660","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251660","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia251660","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia251660","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.43538400530815125,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Permutation":[0],"is":[1,49,64,84,100],"a":[2,13,78],"commonly":[3],"used":[4],"operation":[5],"in":[6],"image":[7,81,91,116],"encryption":[8,22,82],"schemes.":[9],"Many":[10],"schemes":[11],"adopt":[12],"separate":[14],"row":[15],"and":[16,107,123,129,142],"column":[17,54],"permutation":[18,69],"to":[19,51,66,102],"increase":[20],"the":[21,26,45,68,97,104,111,127,132],"efficiency":[23,130],"while":[24],"ignoring":[25],"security.":[27],"This":[28],"paper":[29],"proposes":[30],"an":[31],"efficient":[32],"known-plaintext":[33],"attack":[34,74,99],"(KPA)":[35],"for":[36,76],"row-column-based":[37],"permutation.":[38],"A":[39,93],"special":[40],"ID":[41],"method":[42,75],"based":[43],"on":[44],"Pearson":[46],"correlation":[47],"coefficient":[48],"proposed":[50,98,133],"label":[52],"each":[53],"or":[55],"row.":[56],"Only":[57],"one":[58],"pair":[59],"of":[60,96,113,131],"known":[61,89],"plaintext-ciphertext":[62,90],"images":[63],"enough":[65],"determine":[67],"rules":[70],"completely.":[71],"With":[72],"this":[73],"permutation,":[77],"classic":[79],"permutation-then-XOR":[80],"scheme":[83],"broken":[85],"with":[86],"only":[87],"two":[88,114],"pairs.":[92],"numerical":[94],"example":[95],"provided":[101],"show":[103],"process":[105],"intuitively":[106],"clearly.":[108],"In":[109],"addition,":[110],"cryptanalyses":[112],"related":[115,136],"ciphers":[117],"are":[118,139],"introduced.":[119],"Detailed":[120],"theoretical":[121],"derivations":[122],"extensive":[124],"experiments":[125],"confirmed":[126],"feasibility":[128],"attacks.":[134],"The":[135],"MATLAB":[137],"codes":[138],"publicly":[140],"available":[141],"can":[143],"be":[144],"found":[145],"online.":[146]},"counts_by_year":[],"updated_date":"2026-01-28T23:18:48.515280","created_date":"2026-01-28T00:00:00"}
