{"id":"https://openalex.org/W4402493811","doi":"https://doi.org/10.3390/cryptography8030041","title":"Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack","display_name":"Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack","publication_year":2024,"publication_date":"2024-09-11","ids":{"openalex":"https://openalex.org/W4402493811","doi":"https://doi.org/10.3390/cryptography8030041"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030041","pdf_url":"https://www.mdpi.com/2410-387X/8/3/41/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/8/3/41/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014271344","display_name":"Ching\u2010Chun Chang","orcid":"https://orcid.org/0000-0001-7723-4591"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Ching-Chun Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan","Information and Communication Security Research Center, Feng Chia University, Taichung 407102, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"Information and Communication Security Research Center, Feng Chia University, Taichung 407102, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029504001","display_name":"Shuying Xu","orcid":"https://orcid.org/0000-0002-6192-2223"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Shuying Xu","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091387403","display_name":"Kai Gao","orcid":"https://orcid.org/0000-0002-7505-9037"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kai Gao","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038550838","display_name":"Chin\u2010Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan","Information and Communication Security Research Center, Feng Chia University, Taichung 407102, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 407102, Taiwan","institution_ids":["https://openalex.org/I4880106"]},{"raw_affiliation_string":"Information and Communication Security Research Center, Feng Chia University, Taichung 407102, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5014271344"],"corresponding_institution_ids":["https://openalex.org/I4880106"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.2597,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53367496,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"8","issue":"3","first_page":"41","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7166765928268433},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6976270079612732},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6289265751838684},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5392230153083801},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.4833247661590576},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4516819715499878},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34807252883911133},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28378158807754517}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7166765928268433},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6976270079612732},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6289265751838684},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5392230153083801},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.4833247661590576},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4516819715499878},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34807252883911133},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28378158807754517},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography8030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030041","pdf_url":"https://www.mdpi.com/2410-387X/8/3/41/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:538b4923a2894f158a9f600e1cbdf339","is_oa":true,"landing_page_url":"https://doaj.org/article/538b4923a2894f158a9f600e1cbdf339","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 3, p 41 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8030041","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8030041","pdf_url":"https://www.mdpi.com/2410-387X/8/3/41/pdf","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402493811.pdf","grobid_xml":"https://content.openalex.org/works/W4402493811.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W1998279455","https://openalex.org/W2010380519","https://openalex.org/W2012711090","https://openalex.org/W2017305217","https://openalex.org/W2074253957","https://openalex.org/W2075965608","https://openalex.org/W2121393355","https://openalex.org/W2170269447","https://openalex.org/W2322525404","https://openalex.org/W2342152533","https://openalex.org/W2508016950","https://openalex.org/W2535009048","https://openalex.org/W2612345176","https://openalex.org/W2792490487","https://openalex.org/W2884179402","https://openalex.org/W2950377098","https://openalex.org/W2972338626","https://openalex.org/W3157396754","https://openalex.org/W3172923446","https://openalex.org/W3175406864","https://openalex.org/W4292622351","https://openalex.org/W4318466209","https://openalex.org/W4382726749","https://openalex.org/W4382998716","https://openalex.org/W4389342220","https://openalex.org/W4391956681","https://openalex.org/W4398161925","https://openalex.org/W4399913628","https://openalex.org/W4399993904"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W2098392677","https://openalex.org/W2362689357","https://openalex.org/W2365982350","https://openalex.org/W2508016950","https://openalex.org/W2083781982","https://openalex.org/W4391958520","https://openalex.org/W1986773466"],"abstract_inverted_index":{"Reversible":[0],"data-hiding":[1],"in":[2,10,83,99,117],"encrypted":[3],"images":[4,14],"(RDHEI)":[5],"plays":[6],"a":[7,24,59,66],"pivotal":[8],"role":[9],"preserving":[11],"privacy":[12,115],"within":[13],"stored":[15],"on":[16,91],"cloud":[17,118],"platforms.":[18],"Recently,":[19],"Wang":[20],"et":[21],"al.":[22],"introduced":[23],"dual-stage":[25,50,86,101],"permutation":[26,51,87,102],"encryption":[27,88,103],"scheme,":[28,71,104],"which":[29],"is":[30],"highly":[31],"compatible":[32],"with":[33],"RDHEI":[34],"techniques.":[35],"In":[36],"this":[37],"study,":[38],"we":[39,94],"undertake":[40],"an":[41],"exhaustive":[42],"examination":[43],"of":[44,79],"the":[45,49,77,85,100],"characteristics":[46],"inherent":[47],"to":[48],"scheme":[52],"and":[53,65,114],"propose":[54],"two":[55],"cryptanalysis":[56,81],"schemes":[57,82],"leveraging":[58],"large-kernel":[60],"convolutional":[61],"neural":[62],"network":[63],"(LKCNN)":[64],"known":[67],"plaintext":[68],"attack":[69],"(KPA)":[70],"respectively.":[72],"Our":[73],"experimental":[74],"findings":[75],"demonstrate":[76],"effectiveness":[78],"our":[80,92],"breaking":[84],"scheme.":[89],"Based":[90],"investigation,":[93],"highlight":[95],"significant":[96],"security":[97],"vulnerabilities":[98],"raising":[105],"concerns":[106],"about":[107],"its":[108],"suitability":[109],"for":[110],"secure":[111],"image":[112],"storage":[113],"protection":[116],"environments.":[119]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
