Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of ever...
Saved in:
| Published in: | IEEE access Vol. 6; pp. 75834 - 75842 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Piscataway
IEEE
2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects: | |
| ISSN: | 2169-3536, 2169-3536 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g., the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data. |
|---|---|
| AbstractList | Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g., the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data. |
| Author | Feng, Bingbing Li, Chengqing Lu, Jinhu Hao, Feng Lin, Dongdong |
| Author_xml | – sequence: 1 givenname: Chengqing orcidid: 0000-0002-5385-7644 surname: Li fullname: Li, Chengqing email: chengqingg@qq.com organization: School of Computer Science and Electronic Engineering, Hunan University, Changsha, China – sequence: 2 givenname: Dongdong surname: Lin fullname: Lin, Dongdong organization: School of Computer Science and Electronic Engineering, Hunan University, Changsha, China – sequence: 3 givenname: Bingbing surname: Feng fullname: Feng, Bingbing organization: College of Information Engineering, Xiangtan University, Xiangtan, China – sequence: 4 givenname: Jinhu surname: Lu fullname: Lu, Jinhu organization: School of Automation Science and Electrical Engineering, Beihang University, Beijing, China – sequence: 5 givenname: Feng surname: Hao fullname: Hao, Feng organization: Department of Computer Science, University of Warwick, Coventry, U.K |
| BookMark | eNqFUctOwzAQtBBIPL-ASyTOLX4m9rFEBSohIfE4Wxs_iqs0LnY49O9JG1QhLuzFq_HMrHbnHB13sXMIXRM8JQSr21ldz19fpxQTOaVSslLhI3RGSakmTLDy-Fd_iq5yXuGh5ACJ6gy91Gm76aGDdptDLqIvoKg_IPbBFIs1LF0x78yOEmJXzNplTKH_WBd3kJ0tBmjR-ZjWsP-ed32Km-0lOvHQZnf1816g9_v5W_04eXp-WNSzp4nhFe8nihIoK-uxZVgY5i2vaFNJKb0lvFHgeUMJ9aTyxgG4ShFuBafKMMOskJRdoMXoayOs9CaFNaStjhD0HohpqSENe7ROO4GVtKYkQDFXVjaltI3kDWAqRGN2Xjej1ybFzy-Xe72KX2m4StaUC6EYlhIPLDayTIo5J-cPUwnWuyz0mIXeZaF_shhU6o_KhH5_sT5BaP_RXo_a4Jw7TJOCSyE4-wbYjpjd |
| CODEN | IAECCG |
| CitedBy_id | crossref_primary_10_1007_s11042_024_18343_4 crossref_primary_10_1088_1402_4896_acbba6 crossref_primary_10_1016_j_aeue_2019_152861 crossref_primary_10_1016_j_engappai_2020_103535 crossref_primary_10_3390_e21030246 crossref_primary_10_1007_s00521_020_04724_x crossref_primary_10_1109_ACCESS_2019_2959137 crossref_primary_10_1007_s11071_019_05015_4 crossref_primary_10_1186_s13638_022_02111_9 crossref_primary_10_1007_s11042_020_10263_3 crossref_primary_10_1007_s11071_019_04802_3 crossref_primary_10_3390_math12040605 crossref_primary_10_1109_ACCESS_2019_2922376 crossref_primary_10_1007_s11042_020_09595_x crossref_primary_10_1109_ACCESS_2020_3038006 crossref_primary_10_1007_s11071_021_06761_0 crossref_primary_10_3390_math11112585 crossref_primary_10_1016_j_chaos_2020_110455 crossref_primary_10_1016_j_amc_2019_124998 crossref_primary_10_1016_j_cjph_2019_05_038 crossref_primary_10_1109_ACCESS_2019_2916402 crossref_primary_10_3390_e21100960 crossref_primary_10_1007_s40745_021_00364_7 crossref_primary_10_1177_1748302619853470 crossref_primary_10_1007_s11042_020_09264_z crossref_primary_10_3390_e24020266 crossref_primary_10_1016_j_jisa_2021_103019 crossref_primary_10_1007_s11042_022_12472_4 crossref_primary_10_1016_j_jisa_2021_102844 crossref_primary_10_1016_j_sigpro_2020_107525 crossref_primary_10_1007_s11071_022_07990_7 crossref_primary_10_1007_s11042_021_10631_7 crossref_primary_10_1016_j_jisa_2019_102390 crossref_primary_10_1109_ACCESS_2019_2958336 crossref_primary_10_3390_electronics10172116 crossref_primary_10_1109_ACCESS_2019_2906052 crossref_primary_10_1007_s11220_021_00340_8 crossref_primary_10_1109_JETCAS_2021_3077023 crossref_primary_10_3390_e23050535 crossref_primary_10_1109_ACCESS_2020_2995839 crossref_primary_10_3390_e27080790 crossref_primary_10_1016_j_aeue_2019_153050 crossref_primary_10_1109_ACCESS_2019_2957858 crossref_primary_10_1093_comjnl_bxac038 crossref_primary_10_1371_journal_pone_0295060 crossref_primary_10_1007_s11042_023_17581_2 crossref_primary_10_3390_e25030395 crossref_primary_10_1007_s12596_024_02396_7 crossref_primary_10_1038_s41598_020_58636_w crossref_primary_10_3390_asi5030057 crossref_primary_10_1016_j_sigpro_2019_107293 crossref_primary_10_1007_s11042_022_13253_9 crossref_primary_10_1007_s11071_019_05413_8 crossref_primary_10_3390_s23177600 crossref_primary_10_1109_ACCESS_2019_2930606 crossref_primary_10_1016_j_neucom_2020_06_022 crossref_primary_10_1109_ACCESS_2020_2968226 crossref_primary_10_1016_j_ijleo_2020_164993 crossref_primary_10_1007_s11071_020_05625_3 crossref_primary_10_1088_2631_8695_ae04c8 crossref_primary_10_1109_TCSII_2021_3081604 crossref_primary_10_1038_s41598_025_95995_8 crossref_primary_10_1016_j_chaos_2020_109615 crossref_primary_10_1016_j_measurement_2021_110541 crossref_primary_10_1109_TCSI_2018_2888688 crossref_primary_10_1016_j_chaos_2020_109697 crossref_primary_10_1007_s11042_019_08273_x crossref_primary_10_1016_j_sigpro_2019_107340 crossref_primary_10_1007_s10462_022_10295_1 crossref_primary_10_1109_TII_2019_2923553 crossref_primary_10_1016_j_sigpro_2020_107457 crossref_primary_10_1007_s11071_020_05637_z crossref_primary_10_3390_sym13122290 crossref_primary_10_1140_epjst_e2019_800209_3 crossref_primary_10_1038_s41467_022_35090_y crossref_primary_10_1007_s11042_023_15445_3 crossref_primary_10_1007_s11071_019_04771_7 crossref_primary_10_1109_ACCESS_2022_3218668 crossref_primary_10_1007_s11042_019_08226_4 crossref_primary_10_1007_s00521_020_04808_8 crossref_primary_10_1109_ACCESS_2020_2983716 crossref_primary_10_1109_TCSI_2019_2933365 crossref_primary_10_1109_TCSI_2022_3213268 crossref_primary_10_1007_s11042_022_12515_w crossref_primary_10_1007_s10489_025_06281_z crossref_primary_10_1088_1402_4896_ad1d42 crossref_primary_10_1016_j_sigpro_2018_11_010 crossref_primary_10_3390_math13060982 crossref_primary_10_3390_e21080790 crossref_primary_10_1109_ACCESS_2019_2920383 crossref_primary_10_1007_s40747_022_00829_z crossref_primary_10_1049_ipr2_12261 crossref_primary_10_1007_s11042_019_08168_x crossref_primary_10_1016_j_sigpro_2020_107684 crossref_primary_10_1007_s11042_024_18319_4 crossref_primary_10_1109_ACCESS_2019_2916600 crossref_primary_10_1109_ACCESS_2024_3406766 crossref_primary_10_1631_FITEE_1900167 crossref_primary_10_1109_ACCESS_2019_2935751 crossref_primary_10_1007_s11042_019_07852_2 crossref_primary_10_1007_s00521_021_05797_y crossref_primary_10_1007_s11042_022_13175_6 crossref_primary_10_3390_fractalfract7040282 crossref_primary_10_1016_j_asr_2025_08_070 crossref_primary_10_1016_j_cjph_2024_02_012 crossref_primary_10_3390_app10062187 crossref_primary_10_1007_s10489_021_03071_1 crossref_primary_10_1109_TC_2021_3051387 crossref_primary_10_1007_s11071_020_05735_y crossref_primary_10_1016_j_optlastec_2020_106339 crossref_primary_10_1063_5_0229908 crossref_primary_10_1109_ACCESS_2019_2949704 crossref_primary_10_3390_math13020313 crossref_primary_10_51537_chaos_1500547 crossref_primary_10_3390_e24050742 crossref_primary_10_1007_s11071_019_05112_4 crossref_primary_10_1016_j_chaos_2021_111693 crossref_primary_10_3390_cryptography3010004 crossref_primary_10_1007_s11042_021_10807_1 crossref_primary_10_1007_s11042_023_17812_6 crossref_primary_10_1007_s11071_020_06164_7 crossref_primary_10_1016_j_ins_2022_11_104 crossref_primary_10_1109_ACCESS_2020_2982567 crossref_primary_10_1007_s00521_019_04207_8 crossref_primary_10_1016_j_jisa_2019_05_004 crossref_primary_10_1016_j_chaos_2024_114681 crossref_primary_10_1016_j_cjph_2019_09_011 crossref_primary_10_1016_j_jisa_2020_102566 crossref_primary_10_1109_ACCESS_2020_2979827 crossref_primary_10_3390_e25030476 crossref_primary_10_1016_j_ins_2024_120420 crossref_primary_10_1016_j_eswa_2024_125050 crossref_primary_10_1007_s11265_023_01853_z crossref_primary_10_1109_ACCESS_2020_2978297 crossref_primary_10_1109_ACCESS_2024_3476347 crossref_primary_10_3390_math10122034 crossref_primary_10_1016_j_jisa_2019_102361 crossref_primary_10_1109_ACCESS_2020_2973286 crossref_primary_10_1016_j_jksuci_2021_03_007 crossref_primary_10_1109_ACCESS_2021_3090804 crossref_primary_10_1007_s13198_023_02174_x crossref_primary_10_3390_e21090910 crossref_primary_10_1109_TCSVT_2019_2924910 crossref_primary_10_1109_ACCESS_2020_3015882 crossref_primary_10_1109_JPHOT_2021_3068161 crossref_primary_10_1007_s11071_019_04809_w crossref_primary_10_1016_j_amc_2022_127080 crossref_primary_10_1177_1550147721993402 crossref_primary_10_1016_j_image_2020_115994 crossref_primary_10_1016_j_heliyon_2024_e25373 crossref_primary_10_1140_epjp_i2019_12797_4 crossref_primary_10_1109_ACCESS_2019_2902873 crossref_primary_10_1016_j_buildenv_2024_112360 crossref_primary_10_1109_ACCESS_2020_2970981 crossref_primary_10_1007_s10489_023_04727_w crossref_primary_10_1016_j_ijleo_2022_170356 |
| Cites_doi | 10.1142/S0218127417500730 10.1109/ACCESS.2018.2817600 10.1142/S0218127406015970 10.1007/s11071-017-3825-2 10.1109/TDSC.2016.2616876 10.1016/j.sigpro.2018.03.010 10.1142/S021812741750033X 10.1109/ACCESS.2018.2820724 10.1142/S0218127416501121 10.1109/TCSI.2016.2515398 10.1109/TIE.2017.2736515 10.1109/MCOM.2018.1701148 10.1109/MMUL.2017.3051512 10.1016/j.jss.2007.07.037 10.1007/s11071-018-4056-x 10.1016/j.sigpro.2016.10.002 10.1007/s11071-015-1956-x 10.1142/S0218127416501923 10.1016/j.optcom.2011.08.079 10.1109/JBHI.2016.2517146 10.1142/S0218127417501061 10.1016/j.sigpro.2015.07.008 10.1142/S0218127417502042 10.1007/s11071-017-3715-7 10.1109/TIFS.2016.2515503 10.1109/MMUL.2018.2873472 10.1142/S0218127418500104 10.1109/TIFS.2018.2812080 10.1007/s11071-014-1533-8 10.1016/j.ins.2016.01.017 10.1109/MMUL.2017.4031322 10.1002/rsa.20385 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
| DOI | 10.1109/ACCESS.2018.2883690 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library (IEL) (UW System Shared) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Open Access Full Text |
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Materials Research Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Open Access Full Text url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 75842 |
| ExternalDocumentID | oai_doaj_org_article_e5098dc61a2049d8b68db84ba0255bc2 10_1109_ACCESS_2018_2883690 8548554 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61772447; 61532020; U1736113 funderid: 10.13039/501100001809 |
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c474t-921a67df0d305c3fd472b7888fd14b9af4b212f17fceaae7914d5429c3c3d5823 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 201 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000454479900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:42:42 EDT 2025 Sun Nov 09 06:24:56 EST 2025 Tue Nov 18 21:44:59 EST 2025 Sat Nov 29 03:33:32 EST 2025 Wed Aug 27 03:03:38 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c474t-921a67df0d305c3fd472b7888fd14b9af4b212f17fceaae7914d5429c3c3d5823 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5385-7644 |
| OpenAccessLink | https://ieeexplore.ieee.org/document/8548554 |
| PQID | 2455930880 |
| PQPubID | 4845423 |
| PageCount | 9 |
| ParticipantIDs | crossref_primary_10_1109_ACCESS_2018_2883690 doaj_primary_oai_doaj_org_article_e5098dc61a2049d8b68db84ba0255bc2 ieee_primary_8548554 proquest_journals_2455930880 crossref_citationtrail_10_1109_ACCESS_2018_2883690 |
| PublicationCentury | 2000 |
| PublicationDate | 20180000 2018-00-00 20180101 2018-01-01 |
| PublicationDateYYYYMMDD | 2018-01-01 |
| PublicationDate_xml | – year: 2018 text: 20180000 |
| PublicationDecade | 2010 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2018 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref15 ref14 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref8 ref7 ref9 ref4 ref3 ref6 ref5 li (ref29) 2017 |
| References_xml | – ident: ref15 doi: 10.1142/S0218127417500730 – ident: ref26 doi: 10.1109/ACCESS.2018.2817600 – ident: ref24 doi: 10.1142/S0218127406015970 – ident: ref12 doi: 10.1007/s11071-017-3825-2 – ident: ref4 doi: 10.1109/TDSC.2016.2616876 – ident: ref7 doi: 10.1016/j.sigpro.2018.03.010 – ident: ref23 doi: 10.1142/S021812741750033X – ident: ref3 doi: 10.1109/ACCESS.2018.2820724 – ident: ref11 doi: 10.1142/S0218127416501121 – ident: ref22 doi: 10.1109/TCSI.2016.2515398 – ident: ref28 doi: 10.1109/TIE.2017.2736515 – ident: ref2 doi: 10.1109/MCOM.2018.1701148 – ident: ref5 doi: 10.1109/MMUL.2017.3051512 – ident: ref18 doi: 10.1016/j.jss.2007.07.037 – ident: ref25 doi: 10.1007/s11071-018-4056-x – ident: ref32 doi: 10.1016/j.sigpro.2016.10.002 – ident: ref21 doi: 10.1007/s11071-015-1956-x – ident: ref14 doi: 10.1142/S0218127416501923 – ident: ref9 doi: 10.1016/j.optcom.2011.08.079 – ident: ref13 doi: 10.1109/JBHI.2016.2517146 – ident: ref8 doi: 10.1142/S0218127417501061 – ident: ref17 doi: 10.1016/j.sigpro.2015.07.008 – ident: ref10 doi: 10.1142/S0218127417502042 – ident: ref20 doi: 10.1007/s11071-017-3715-7 – ident: ref33 doi: 10.1109/TIFS.2016.2515503 – ident: ref19 doi: 10.1109/MMUL.2018.2873472 – ident: ref27 doi: 10.1142/S0218127418500104 – year: 2017 ident: ref29 publication-title: Dynamic analysis of chaotic maps as complex networks in the digital domain – ident: ref30 doi: 10.1109/TIFS.2018.2812080 – ident: ref16 doi: 10.1007/s11071-014-1533-8 – ident: ref6 doi: 10.1016/j.ins.2016.01.017 – ident: ref1 doi: 10.1109/MMUL.2017.4031322 – ident: ref31 doi: 10.1002/rsa.20385 |
| SSID | ssj0000816957 |
| Score | 2.5441515 |
| Snippet | Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the... |
| SourceID | doaj proquest crossref ieee |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 75834 |
| SubjectTerms | Algorithms Chaos theory Chaotic communication Chaotic cryptanalysis Cryptography Encryption Entropy Entropy (Information theory) image encryption Information entropy multimedia cryptography privacy protection secure communication Security Sensitivity |
| SummonAdditionalLinks | – databaseName: DOAJ Open Access Full Text dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1JS8QwFA4iHvQgrjhu5ODRape0SY5jGdGLiCh4C1lV0JlhZhT8976XxmFA0IvXNGmbLy9vKen3EXIiBPOQhheZ1nWVsTLnmTZaZEJAs8kDaj1EsQl-cyMeH-XtgtQXngnr6IE74M49RDThbFPoEpJZJ0wjnBHMaEyGjY3eN-dyoZiKPhgeIWueaIaKXJ732xZmhGe5xBkq7DbohRdCUWTsTxIrP_xyDDaXG2Q9ZYm0373dJlnywy2ytsAduE3u2snnGDK7jlOEjgLVtH3WIxhBr9_AS9DB0GIXAJ72X59Gk5fZ8xu9gKjlKDSl_5Di5QEeVx9_7pCHy8F9e5UlgYTMMs5mmSwL3XAXcge71lbBMV4arGmDK5iROjADkSkUPFivteeyYA71qWxlK1eLstoly8PR0O8RynNrvS1CaIxhQtZaS0DXNx4qFhZ40yPlN1bKJvZwFLF4VbGKyKXqAFYIsEoA98jpfNC4I8_4vfsFLsK8KzJfxwawB5XsQf1lDz2yjUs4v4mokf6G9cjh95KqtEunqmRQT1XgZ_P9_3j0AVnF6XQfaA7J8mzy7o_Iiv2YvUwnx9FAvwAJ7Oa7 priority: 102 providerName: Directory of Open Access Journals |
| Title | Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy |
| URI | https://ieeexplore.ieee.org/document/8548554 https://www.proquest.com/docview/2455930880 https://doaj.org/article/e5098dc61a2049d8b68db84ba0255bc2 |
| Volume | 6 |
| WOSCitedRecordID | wos000454479900001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Open Access Full Text customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1La9wwEB6S0EN76Cst3TQNOvQYJ37IlnTcmA3toaGUFnITejaBZL1sNoVc-tszIysm0FLoxRhZErI_aV6WvgH4KCUPaIZXhTFtU_C6FIWxRhZSYrEtI-V6SMkmxNmZPD9XX7fgcDoLE0JIm8_CEd2mf_l-cLcUKjuWLVGZ8G3YFqIbz2pN8RTqVLUiEwtVpTqe9z2-A-3ekkeUU7cjuftI-SSO_pxU5Q9JnNTL6Yv_G9hLeJ7NSDYfcX8FW2H5Gp49IhfchW_9-m6Fpt9IOsKGyAzrL8yALdjnaxQjbLF0VAWRYfOrn8P6cnNxzU5QrXmGRfmgUnq8oP3sq7s38ON08b3_VOQMCoXjgm8KVVemEz6WHpe1a6Lnorbk9EZfcatM5BZVV6xEdMGYIFTFPSWwco1rfCvr5i3sLIdleAdMlM4FV8XYWculao1RrXWhC-jS8Ci6GdQPn1a7TC9OWS6udHIzSqVHPDThoTMeMzicGq1Gdo1_Vz8hzKaqRI2dChAMnVeaDmgCSe-6ytTo_XhpO-mt5NaQ92RdPYNdAnDqJGM3g_2HGaDzMr7RNUeHq0FBXO79vdV7eEoDHGMy-7CzWd-GD_DE_dpc3qwPkoOP1y-_Fwdptt4DzFjl_A |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1baxQxFD7UKqgP3qp0tWoefOy0c8lMMo_bYUuLdRGp0LeQqy20O8t2W-i_95xMOhQUwbchk4SZ-ZJzySTfB_BFSu4xDC8yresq42UuMm20zKTEYpMH0nqIYhNiPpdnZ-33Ddgdz8J47-PmM79Hl_FfvuvtDS2V7cuaqEz4I3hcc-x2OK01rqhQt20tErVQkbf7067Dt6D9W3KPVHUbsrwP3E9k6U-yKn_Y4uhgDl_-36O9ghcpkGTTAfnXsOEXb-D5A3rBLfjRre6WGPwNtCOsD0yz7lz32IIdX6EhYbOFpSqIDZte_upXF-vzK3aAjs0xLEpHleLtGe1oX969hZ-Hs9PuKEsaCpnlgq-ztix0I1zIHU5sWwXHRWko7Q2u4KbVgRt0XqEQwXqtvWgL7kjCyla2crUsq3ewuegXfhuYyK31tgihMYbLtta6rY31jcekhgfRTKC8_7TKJoJx0rm4VDHRyFs14KEID5XwmMDu2Gg58Gv8u_oBYTZWJXLsWIBgqDTXlMcgSDrbFLrE_MdJ00hnJDea8idjywlsEYBjJwm7CezcjwCVJvK1KjmmXBWa4vz931t9hqdHp99O1Mnx_OsHeEYPO6zQ7MDmenXjP8ITe7u-uF59iqP1Nw6R5x0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cryptanalysis+of+a+Chaotic+Image+Encryption+Algorithm+Based+on+Information+Entropy&rft.jtitle=IEEE+access&rft.au=Li%2C+Chengqing&rft.au=Lin%2C+Dongdong&rft.au=Feng%2C+Bingbing&rft.au=Lu%2C+Jinhu&rft.date=2018&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=6&rft.spage=75834&rft.epage=75842&rft_id=info:doi/10.1109%2FACCESS.2018.2883690&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2018_2883690 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |