{"entities":{"Q2196949":{"pageid":2207692,"ns":120,"title":"Item:Q2196949","lastrevid":72811572,"modified":"2026-04-14T08:00:52Z","type":"item","id":"Q2196949","labels":{"en":{"language":"en","value":"On the cryptanalysis of a bit-level image chaotic encryption algorithm"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 7243844"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$D0057295-EE61-48B9-A837-024A9C1FEAD2","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"7c43500ed4701b5087ad2a4d60e51c6541f43d06","datavalue":{"value":{"text":"On the cryptanalysis of a bit-level image chaotic encryption algorithm","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q2196949$C812325C-13FF-4371-BDB3-EC616E5AD703","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"e3f7f065c25be834400c0017541ae82ee6846816","datavalue":{"value":"1459.94116","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2196949$BC49A6A5-A90F-4706-8444-48F7ACEFF5AA","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"37a3adfa72e82e13134ad712973ab2daf6f2f639","datavalue":{"value":"10.1155/2020/5747082","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2196949$61AFB38B-8A32-480B-AB76-654F50BA7271","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"e1dc59cceb1f0e3462efc841f54b2c84fbd3bdcc","datavalue":{"value":{"entity-type":"item","numeric-id":2196947,"id":"Q2196947"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$0860493B-4502-4F7B-A074-71B534894928","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"daa460d05375a2e77f6c25a0047a133e675f3003","datavalue":{"value":{"entity-type":"item","numeric-id":415171,"id":"Q415171"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$CA718E96-3B12-4A70-8380-16FA51D05962","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"132d824ebf2b9b0290ab1dc53b5029474825470e","datavalue":{"value":{"entity-type":"item","numeric-id":2196948,"id":"Q2196948"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$8E1B6B7F-0286-44F6-88AC-28680CADC364","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"3dc97bc0aff607b9c22ce37ffa18b6de85001d90","datavalue":{"value":{"entity-type":"item","numeric-id":86199,"id":"Q86199"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$8B59E159-8F8F-4C60-B20C-7FBC482D0B6E","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"573b9cb855f2ea77ed354a87809d416cf7ff64d5","datavalue":{"value":{"time":"+2020-09-04T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q2196949$587CEA0E-94AA-4AEE-8C19-9F70F49C1A8B","rank":"normal"}],"P1448":[{"mainsnak":{"snaktype":"value","property":"P1448","hash":"3a156749ccb06d488141332d893166613f68d241","datavalue":{"value":"Summary: In this paper, the security analysis of a bit-level image chaotic encryption algorithm based on the 1D chaotic map is proposed. The original image chaotic encryption algorithm includes bit-level permutation encryption, diffusion encryption, and linear transform. Deciphering of it can be divided into two stages. First, bit-level permutation encryption, diffusion encryption, and linear transform can be simplified into bit-level equivalent permutation encryption and equivalent diffusion encryption, which is a key breakthrough point of cryptanalysis. Second, the chaotic sequence generated by this algorithm is independent of the plaintext image. Therefore, the equivalent diffusion key and the equivalent permutation key can be obtained by chosen-plaintext attack, respectively. Theoretical analysis and numerical simulation experiment results verify the effectiveness of the analytical method. Finally, some suggestions are proposed to promote the security of the original image chaotic encryption algorithm.","type":"string"},"datatype":"string"},"type":"statement","id":"Q2196949$1F8EDA8D-4883-4680-AF62-82CEBEF5586B","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2196949$0CCD4415-A366-4051-827F-71C6ABAF46B5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"a1467d026b887f8281acc7bddfbc4c385d0007ce","datavalue":{"value":"94A08","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2196949$E61EC463-DF99-4098-A821-89A84E0C4720","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"c7432ca2eec5e400128340f579a59c8fd9d0e92d","datavalue":{"value":"7243844","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2196949$8F3B4D33-616F-4833-A02E-12DF9ED6F575","rank":"normal"}],"P12":[{"mainsnak":{"snaktype":"value","property":"P12","hash":"ac0b3b886a0ec7d6e069379a0096f4120dd1c5ea","datavalue":{"value":"Q122434279","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2196949$D4C5F0FC-C544-437C-AD9D-B475ED159611","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$47943568-3F70-4F69-9107-6BA477B88ED3","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"0bf368452d5582bcf12c4b13c43ad5c43f3cf6da","datavalue":{"value":"https://doi.org/10.1155/2020/5747082","type":"string"},"datatype":"url"},"type":"statement","id":"Q2196949$8B678A9E-5EEE-4404-995F-58B27CFCE2C5","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"e30edc53c9eb698fa9e2c67411f389809bed1061","datavalue":{"value":"W3046595764","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2196949$696BE319-7816-414F-89DA-B6C69FE1BC64","rank":"normal"}],"P223":[{"mainsnak":{"snaktype":"value","property":"P223","hash":"76520b049d591ae19b3735fbb43edef38eb5f306","datavalue":{"value":{"entity-type":"item","numeric-id":1878247,"id":"Q1878247"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$1729F761-B7F1-4EB6-8EAA-F6ADB518E929","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"66c961e619eb47bb89c56a084a5473cf8b874afe","datavalue":{"value":{"entity-type":"item","numeric-id":552561,"id":"Q552561"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$796A88F6-318C-44D0-AA41-684DEC713A98","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"a83c923b11ca922d7bc5e027221669e99e854588","datavalue":{"value":{"entity-type":"item","numeric-id":1674293,"id":"Q1674293"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$31F2485F-9138-4380-B3EB-174E6A376114","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"89aee92a6d6485007140a5c8e998cb95b1517fca","datavalue":{"value":{"entity-type":"item","numeric-id":3586855,"id":"Q3586855"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$52899886-7E62-4C73-86A8-31DFB187C5C8","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"7e591df2376f74c33d2d32b3da649fa6546a90d1","datavalue":{"value":{"entity-type":"item","numeric-id":936839,"id":"Q936839"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$E7261777-21F5-49E9-B726-D8739ECB96FC","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"76f4ddd2bea948e23262da9696152efce88a83d5","datavalue":{"value":{"entity-type":"item","numeric-id":602619,"id":"Q602619"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$99231BBC-963F-46B2-A6BD-A0F39C07528F","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"8d2fc03182974d7b2c850c45f0a81877656d7710","datavalue":{"value":{"entity-type":"item","numeric-id":551640,"id":"Q551640"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$E21DD66A-F135-4B13-A43E-65A9FEF222D9","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P223","hash":"1c711730881e81150c0467ad09c58e72e00f8e62","datavalue":{"value":{"entity-type":"item","numeric-id":5007631,"id":"Q5007631"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$D014B028-118D-4207-9C31-B2EC453E750E","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"d46c1e313b0a1c4986cb5622403938309ba57fdb","datavalue":{"value":{"entity-type":"item","numeric-id":653545,"id":"Q653545"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"abe989a0a2d2983653f5f43a6a92efba7e91c81f","datavalue":{"value":{"amount":"+0.8564392328262329","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2196949$0ECC5027-34CF-483D-B43F-553DDBD745B5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"fac739175d271feda34b7c3cf2daa0495e987880","datavalue":{"value":{"entity-type":"item","numeric-id":3586855,"id":"Q3586855"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"7f6f7aa7c83ad9ae4cb21bc1ea2309c6728e9bd0","datavalue":{"value":{"amount":"+0.8500138521194458","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2196949$FFAE922A-834B-428B-8056-5D81C02DCDD7","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"7d1a0d20cbb0e565257b0404c9752ee8059f3aeb","datavalue":{"value":{"entity-type":"item","numeric-id":1742027,"id":"Q1742027"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"958b29ee133837ea75566983abc510bc01255191","datavalue":{"value":{"amount":"+0.8418822288513184","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2196949$76DC0BFD-2D4B-442E-8F4C-4B26EC7C632D","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"e3016b41c7647a97be39f720d6e15fdb48c274c9","datavalue":{"value":{"entity-type":"item","numeric-id":2205327,"id":"Q2205327"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"92096b89bd629a92ceb618a4d67cb1b28baad6bb","datavalue":{"value":{"amount":"+0.8404536247253418","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2196949$14969DA9-1F03-4580-AF4A-566CAF291568","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"0eab9b4554343054747952a6745396673f4a4449","datavalue":{"value":{"entity-type":"item","numeric-id":5171551,"id":"Q5171551"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"ce6c38e7c07c4a60652f0013dc7b5b3c285e7142","datavalue":{"value":{"amount":"+0.8350200057029724","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2196949$3E7AE0D6-EF42-4A66-872D-BA6C2778191F","rank":"normal"}],"P163":[{"mainsnak":{"snaktype":"value","property":"P163","hash":"45fcd4163b5f33e6e8c784f5522d7246c0a1a61e","datavalue":{"value":{"entity-type":"item","numeric-id":57056,"id":"Q57056"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2196949$0833911B-8034-4E92-9748-3B5673ECA0B1","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"On the cryptanalysis of a bit-level image chaotic encryption algorithm","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/On_the_cryptanalysis_of_a_bit-level_image_chaotic_encryption_algorithm"}}}}}