{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:08:33Z","timestamp":1772294913788,"version":"3.50.1"},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T00:00:00Z","timestamp":1739923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National Key R&D Program of China","award":["2022ZD0117302"],"award-info":[{"award-number":["2022ZD0117302"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>Chaos-based cryptosystems are regarded as highly secure techniques for image encryption. However, despite the considerable enhancement of encryption robustness provided by chaotic systems, security vulnerabilities may still arise, potentially leading to drastic damage in contexts involving sensitive data such as medical or military images. Identifying these vulnerabilities and developing corresponding countermeasures are essential to prevent security breaches and achieve higher protection. From this perspective, this research thoroughly examines the security of an image encryption scheme based on the 1D sine-powered chaotic map. This analysis identifies vulnerabilities within the scheme that can reduce it to a permutation-only scheme. Exploiting the found vulnerabilities, three distinct cryptanalysis attacks are proposed in this work. These attacks enable unauthorized individuals to replicate the encryption and decryption processes without possessing the secret key, posing significant security risks. Under ciphertext-only attack, chosen-plaintext attack, and chosen-ciphertext attack conditions, the proposed attacks demonstrate their effectiveness through simulation and experimentation. Notably, the results indicate that these attacks can be executed within seconds and using only a few special plaintext or ciphertext images. An improved version of the analyzed scheme is introduced to address the identified vulnerabilities and enhance its security and speed.<\/jats:p>","DOI":"10.1145\/3708546","type":"journal-article","created":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T10:08:02Z","timestamp":1734170882000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual Protection"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9020-8590","authenticated-orcid":false,"given":"Mohamed Zakariya","family":"Talhaoui","sequence":"first","affiliation":[{"name":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4959-3372","authenticated-orcid":false,"given":"Zhelong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4570-4258","authenticated-orcid":false,"given":"Mohamed Amine","family":"Midoun","sequence":"additional","affiliation":[{"name":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8280-283X","authenticated-orcid":false,"given":"Abdelkarim","family":"Smaili","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6323-9516","authenticated-orcid":false,"given":"Djamel Eddine","family":"Mekkaoui","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5997-7199","authenticated-orcid":false,"given":"Mourad","family":"Lablack","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4370-7877","authenticated-orcid":false,"given":"Ke","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Control Science and Engineering, Dalian University of Technology, Dalian, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,19]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3570165"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10043-021-00705-0"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3614433"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10062187"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.113032"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893760"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3123571"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract7120887"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038006"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/math10152751"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2717943"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJCVR.2020.109389"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121452"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118845"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2022.127738"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2024.3356494"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.3390\/e25081147"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2022.07.030"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.07.120"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.008"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106485"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930606"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3633459"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3498342"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/0307-904X(95)00168-J"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3550275"},{"key":"e_1_3_1_28_2","first-page":"1","article-title":"A new one-dimensional cosine polynomial chaotic map and its use in image encryption","volume":"37","author":"Talhaoui Mohamed Zakariya","year":"2020","unstructured":"Mohamed Zakariya Talhaoui, Xingyuan Wang, and Mohamed Amine Midoun. 2020. A new one-dimensional cosine polynomial chaotic map and its use in image encryption. The Visual Computer 37 (2020), 1\u201311.","journal-title":"The Visual Computer"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123583"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.02.083"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101612"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121514"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123748"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:46Z","timestamp":1750295866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,19]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3708546"],"URL":"https:\/\/doi.org\/10.1145\/3708546","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,19]]},"assertion":[{"value":"2024-04-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}