“…From the above, it can be seen that these image cryptosystems [24,25,26,27,28,29,30,31] are insecure, not because they used the chaotic systems with simple dynamic equations, nor because the statistical characteristics of chaotic pseudo-random sequences used are not good, but because their confusion or diffusion schemes are not well designed, which makes their equivalent keys directly involved in image encryption insensitive to plain images. These image cryptosystems are separately cracked by [32,33,34,35,36,37,38,39,40,41], and the main decoding algorithms are the chosen/known plaintext methods. The objects of attack mainly focus on the equivalent keys [42].…”