{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T13:03:02Z","timestamp":1765976582494,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11042-022-12515-w","type":"journal-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T14:03:58Z","timestamp":1658757838000},"page":"4289-4317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Cryptanalysis on a permutation\u2013rewriting\u2013 diffusion (PRD) structure image encryption scheme"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8967-5546","authenticated-orcid":false,"given":"Ruijie","family":"Chen","sequence":"first","affiliation":[]},{"given":"Lidong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhaolun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,25]]},"reference":[{"key":"12515_CR1","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"12515_CR2","doi-asserted-by":"publisher","first-page":"282","DOI":"10.3390\/e20040282","volume":"20","author":"S Cai","year":"2018","unstructured":"Cai S, Huang L, Chen X, Xiong X (2018) A symmetric plaintext-related color image encryption system based on bit permutation. Entropy 20:282\u2013302","journal-title":"Entropy"},{"key":"12515_CR3","doi-asserted-by":"publisher","first-page":"10625","DOI":"10.1007\/s11042-018-6635-8","volume":"78","author":"G Cao","year":"2019","unstructured":"Cao G, Wang X (2019) Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation. Multimed Tools Appl 78:10625\u201310647","journal-title":"Multimed Tools Appl"},{"key":"12515_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.image.2016.12.007","volume":"52","author":"XL Chai","year":"2017","unstructured":"Chai XL, Gan ZH, Yang K, Chen YR, Liu XX (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6\u201319","journal-title":"Signal Process Image Commun"},{"key":"12515_CR5","doi-asserted-by":"crossref","unstructured":"Fan H, Li M, Liu D, An K (2017) Cryptanalysis of a plaintext-related chaotic RGB image encryption scheme using total plain image characteristics. Multimedia Tools Applications","DOI":"10.1007\/s11042-017-5437-8"},{"key":"12515_CR6","first-page":"1","volume":"10","author":"W Feng","year":"2018","unstructured":"Feng W, He Y (2018) Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling. IEEE Photonics Journal 10:1\u201315","journal-title":"IEEE Photonics Journal"},{"key":"12515_CR7","doi-asserted-by":"publisher","first-page":"12584","DOI":"10.1109\/ACCESS.2019.2893760","volume":"7","author":"W Feng","year":"2019","unstructured":"Feng W, He Y, Li H, Li C (2019) Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map. IEEE Access 7:12584\u201312597","journal-title":"IEEE Access"},{"key":"12515_CR8","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8:1259\u20131284","journal-title":"International Journal of Bifurcation and Chaos"},{"key":"12515_CR9","doi-asserted-by":"publisher","first-page":"42227","DOI":"10.1109\/ACCESS.2018.2858839","volume":"6","author":"D Hossam","year":"2018","unstructured":"Hossam D (2018) An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access 6:42227\u201342244","journal-title":"IEEE Access"},{"key":"12515_CR10","doi-asserted-by":"crossref","unstructured":"Hraoui S, Gouiouez M, Gmira F, Berrada M, Jarjar A, Jarrar AO (2020) A novel cryptosystem for color images based on chaotic maps using a random controller. Lecture Notes in Electrical Engineering, vol 745","DOI":"10.1007\/978-981-33-6893-4_71"},{"key":"12515_CR11","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inform Sci 339:237\u2013253","journal-title":"Inform Sci"},{"key":"12515_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D Sine Logistic modulation map for image encryption. Inform Sci 297:80\u201394","journal-title":"Inform Sci"},{"key":"12515_CR13","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.image.2008.01.003","volume":"23","author":"S Li","year":"2008","unstructured":"Li S, Li C, Chen G, Bourbakis N, Lo K (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23:212\u2013223","journal-title":"Signal Process Image Commun"},{"key":"12515_CR14","doi-asserted-by":"publisher","first-page":"75834","DOI":"10.1109\/ACCESS.2018.2883690","volume":"6","author":"C Li","year":"2018","unstructured":"Li C, Lin D, Feng B, Lu J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834\u201375842","journal-title":"IEEE Access"},{"key":"12515_CR15","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1007\/s11071-018-4426-4","volume":"94","author":"Z Li","year":"2018","unstructured":"Li Z, Peng C, Li L, Zhu X (2018) A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dynamics 94:1319\u20131333","journal-title":"Nonlinear Dynamics"},{"key":"12515_CR16","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.optlaseng.2016.10.020","volume":"90","author":"Y Li","year":"2017","unstructured":"Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics Lasers in Engineering 90:238\u2013246","journal-title":"Optics Lasers in Engineering"},{"key":"12515_CR17","doi-asserted-by":"publisher","first-page":"62785","DOI":"10.1109\/ACCESS.2020.2983716","volume":"8","author":"L Liu","year":"2020","unstructured":"Liu L, Jiang D, An T, Guan Y (2020) A plaintext-related dynamical image encryption algorithm based on permutation-combination-diffusion architecture. IEEE Access 8:62785\u201362799","journal-title":"IEEE Access"},{"key":"12515_CR18","doi-asserted-by":"publisher","first-page":"27361","DOI":"10.1109\/ACCESS.2020.2971759","volume":"8","author":"L Liu","year":"2020","unstructured":"Liu L, Lei Y, Wang D (2020) A fast chaotic image encryption scheme with simultaneous permutation-diffusion operation. IEEE Access 8:27361\u201327374","journal-title":"IEEE Access"},{"key":"12515_CR19","doi-asserted-by":"publisher","first-page":"4096","DOI":"10.1007\/s00034-019-01043-y","volume":"38","author":"L Liu","year":"2019","unstructured":"Liu L, Wang Y, Li Y, Feng X, Song H, He Z, Guo C (2019) Noise Robust Method for Analytically Solvable Chaotic Signal Reconstruction. Circuits, Systems, and Signal Process 38:4096\u20134114","journal-title":"Circuits, Systems, and Signal Process"},{"key":"12515_CR20","first-page":"869","volume":"11","author":"L Liu","year":"2017","unstructured":"Liu L, Wang YN, Lin H, Xiao RF (2017) Easy encoding and low bit-error-rate chaos communication system based on reverse-time chaotic oscillator. Signal Process 11:869\u2013876","journal-title":"Signal Process"},{"key":"12515_CR21","doi-asserted-by":"publisher","first-page":"126450","DOI":"10.1109\/ACCESS.2019.2938181","volume":"7","author":"L Liu","year":"2019","unstructured":"Liu L, Zhang Z, Chen R (2019) Cryptanalysis and improvement in a plaintext-related image encryption scheme based on hyper chaos. IEEE Access 7:126450\u2013126463","journal-title":"IEEE Access"},{"key":"12515_CR22","doi-asserted-by":"publisher","first-page":"185796","DOI":"10.1109\/ACCESS.2019.2961164","volume":"7","author":"L Liu","year":"2019","unstructured":"Liu L, Zhang L, Jiang D, Guan Y, Zhang Z (2019) A Simultaneous Scrambling and Diffusion Color Image Encryption Algorithm Based on Hopfield Chaotic Neural Network. IEEE Access 7:185796\u2013185810","journal-title":"IEEE Access"},{"key":"12515_CR23","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s11071-018-4251-9","volume":"93","author":"Y Luo","year":"2018","unstructured":"Luo Y, Zhou R, Liu J, Cao Y, Ding, Xuemei (2018) A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dynamics 93:1165\u20131181","journal-title":"Nonlinear Dynamics"},{"key":"12515_CR24","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.sigpro.2014.10.033","volume":"109","author":"MA Murillo-Escobar","year":"2015","unstructured":"Murillo-Escobar MA, Cruz-Hernandez C, Abundiz-Perez F, Lopez-Gutierrez RM, Campo ORAD (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119\u2013131","journal-title":"Signal Process"},{"key":"12515_CR25","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1016\/j.ijleo.2016.03.076","volume":"127","author":"B Norouzi","year":"2016","unstructured":"Norouzi B, Mirzakuchaki S (2016) Breaking an image encryption algorithm based on the new substitution stage with chaotic functions. Optik 127:5695\u20135701","journal-title":"Optik"},{"key":"12515_CR26","doi-asserted-by":"crossref","unstructured":"\u00d6zkaynak F, \u00d6zer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik International Journal for Light Electron Optics","DOI":"10.1016\/j.ijleo.2016.03.018"},{"key":"12515_CR27","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"12515_CR28","doi-asserted-by":"publisher","first-page":"10301","DOI":"10.1007\/s11042-020-10101-6","volume":"80","author":"X Wang","year":"2021","unstructured":"Wang X, Gao S (2021) A chaotic image encryption algorithm based on a counting system and the semi-tensor product. Multimedia Tools Appl 80:10301\u201310322","journal-title":"Multimedia Tools Appl"},{"key":"12515_CR29","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optlaseng.2014.08.005","volume":"66","author":"X Wang","year":"2015","unstructured":"Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics Lasers in Engineering 66:10\u201318","journal-title":"Optics Lasers in Engineering"},{"key":"12515_CR30","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1016\/j.sigpro.2011.10.023","volume":"92","author":"X Wang","year":"2012","unstructured":"Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92:1101\u20131108","journal-title":"Signal Process"},{"key":"12515_CR31","first-page":"6429","volume":"5","author":"X Wu","year":"2017","unstructured":"Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429\u20136436","journal-title":"IEEE Access"},{"key":"12515_CR32","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/s11071-018-4391-y","volume":"94","author":"G Ye","year":"2018","unstructured":"Ye G, Chen P, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics 94:745\u2013756","journal-title":"Nonlinear Dynamics"},{"key":"12515_CR33","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1177\/1077546314534717","volume":"22","author":"G Ye","year":"2016","unstructured":"Ye G, Huang X (2016) A feedback chaotic image encryption scheme based on both bit-level and pixel-level. J Vib Control 22:1171\u20131180","journal-title":"J Vib Control"},{"key":"12515_CR34","doi-asserted-by":"crossref","unstructured":"Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. International Journal of Bifurcation and Chaos, 28(1)","DOI":"10.1142\/S0218127418500104"},{"key":"12515_CR35","doi-asserted-by":"publisher","first-page":"2066","DOI":"10.1016\/j.cnsns.2012.12.012","volume":"18","author":"W Zhang","year":"2013","unstructured":"Zhang W, Wong K, Yu H, Zhu Z (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18:2066\u20132080","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"12515_CR36","doi-asserted-by":"publisher","first-page":"3039","DOI":"10.1016\/j.sigpro.2013.04.021","volume":"93","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Long B, Chen CLP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93:3039\u20133052","journal-title":"Signal Process"},{"key":"12515_CR37","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.sigpro.2013.10.034","volume":"97","author":"Y Zhou","year":"2014","unstructured":"Zhou Y, Long B, Chen CLP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172\u2013182","journal-title":"Signal Process"},{"key":"12515_CR38","doi-asserted-by":"publisher","first-page":"843","DOI":"10.3390\/e20110843","volume":"20","author":"C Zhu","year":"2018","unstructured":"Zhu C, Wang G, Sun K (2018) Improved cryptanalysis and enhancements of an image encryption scheme using combined 1D chaotic maps. Entropy 20:843\u2013866","journal-title":"Entropy"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12515-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12515-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12515-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T09:47:15Z","timestamp":1672825635000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12515-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["12515"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12515-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,7,25]]},"assertion":[{"value":"11 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}