{"id":"https://openalex.org/W4295806983","doi":"https://doi.org/10.1016/j.jksuci.2022.09.006","title":"Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication","display_name":"Exploiting compressed sensing and polynomial-based progressive secret image sharing for visually secure image selection encryption with authentication","publication_year":2022,"publication_date":"2022-09-15","ids":{"openalex":"https://openalex.org/W4295806983","doi":"https://doi.org/10.1016/j.jksuci.2022.09.006"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jksuci.2022.09.006","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.jksuci.2022.09.006","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009901155","display_name":"Zhihua Gan","orcid":"https://orcid.org/0000-0002-1138-1887"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihua Gan","raw_affiliation_strings":["Henan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou 450001, China","School of Software, Intelligent Data Processing Engineering Research Center of Henan Province, Institute of Intelligent Network System, Henan University, Kaifeng 475004, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou 450001, China","institution_ids":[]},{"raw_affiliation_string":"School of Software, Intelligent Data Processing Engineering Research Center of Henan Province, Institute of Intelligent Network System, Henan University, Kaifeng 475004, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057289409","display_name":"Shiping Song","orcid":null},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiping Song","raw_affiliation_strings":["School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066782469","display_name":"Lin Zhou","orcid":"https://orcid.org/0009-0006-0102-3222"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin Zhou","raw_affiliation_strings":["School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040363662","display_name":"Daojun Han","orcid":"https://orcid.org/0000-0003-0222-0667"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Daojun Han","raw_affiliation_strings":["School of Computer and Information Engineering, Institute of Image Processing and Pattern Recognition, Henan University, Kaifeng 475004, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Institute of Image Processing and Pattern Recognition, Henan University, Kaifeng 475004, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063001514","display_name":"Jiangyu Fu","orcid":"https://orcid.org/0000-0002-2584-3982"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangyu Fu","raw_affiliation_strings":["School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China","institution_ids":["https://openalex.org/I173899330"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055261387","display_name":"Xiuli Chai","orcid":"https://orcid.org/0000-0002-1609-0624"},"institutions":[{"id":"https://openalex.org/I173899330","display_name":"Henan University","ror":"https://ror.org/003xyzq10","country_code":"CN","type":"education","lineage":["https://openalex.org/I173899330"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiuli Chai","raw_affiliation_strings":["Henan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou 450001, China","School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China"],"affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Cyberspace Situation Awareness, Zhengzhou 450001, China","institution_ids":[]},{"raw_affiliation_string":"School of Artificial Intelligence, Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Zhengzhou 450046, China","institution_ids":["https://openalex.org/I173899330"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5066782469","https://openalex.org/A5040363662","https://openalex.org/A5055261387"],"corresponding_institution_ids":["https://openalex.org/I173899330","https://openalex.org/I173899330","https://openalex.org/I173899330"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350,"provenance":"doaj"},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350,"provenance":"doaj"},"fwci":2.127,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.789252,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"34","issue":"10","first_page":"9252","last_page":"9272"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9842,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/image-sharing","display_name":"Image sharing","score":0.6974592},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.559864},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plain text","score":0.44792083}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7875676},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7616829},{"id":"https://openalex.org/C2780639701","wikidata":"https://www.wikidata.org/wiki/Q354869","display_name":"Image sharing","level":3,"score":0.6974592},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.559864},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48269486},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47843292},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4560835},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.44792083},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4350226},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42160556},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.41910177},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3764344},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.372501},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28962713},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2841287}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jksuci.2022.09.006","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/5849ce2c0e674f96bad2e127fcad28eb","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.jksuci.2022.09.006","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.77,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":56,"referenced_works":["https://openalex.org/W2007006599","https://openalex.org/W2040446335","https://openalex.org/W2141420453","https://openalex.org/W2766131289","https://openalex.org/W2767380740","https://openalex.org/W2768058134","https://openalex.org/W2790038097","https://openalex.org/W2804059437","https://openalex.org/W2804517164","https://openalex.org/W2895660505","https://openalex.org/W2899958868","https://openalex.org/W2904224070","https://openalex.org/W2907856008","https://openalex.org/W2915863155","https://openalex.org/W2928111998","https://openalex.org/W2942651051","https://openalex.org/W2947173686","https://openalex.org/W2947940905","https://openalex.org/W2965334123","https://openalex.org/W2969105488","https://openalex.org/W2969622215","https://openalex.org/W2969815465","https://openalex.org/W2989629898","https://openalex.org/W2992483795","https://openalex.org/W2994417020","https://openalex.org/W2997059293","https://openalex.org/W2998816190","https://openalex.org/W3002364645","https://openalex.org/W3009587941","https://openalex.org/W3011804559","https://openalex.org/W3015061318","https://openalex.org/W3025598099","https://openalex.org/W3039565420","https://openalex.org/W3046890664","https://openalex.org/W3049530924","https://openalex.org/W3088606209","https://openalex.org/W3101998545","https://openalex.org/W3122897445","https://openalex.org/W3123361482","https://openalex.org/W3130576244","https://openalex.org/W3138135684","https://openalex.org/W3138178580","https://openalex.org/W3144401985","https://openalex.org/W3158394543","https://openalex.org/W3158925544","https://openalex.org/W3167657925","https://openalex.org/W3168141894","https://openalex.org/W3176844538","https://openalex.org/W3179208556","https://openalex.org/W3201868523","https://openalex.org/W4205557962","https://openalex.org/W4220717539","https://openalex.org/W4220999568","https://openalex.org/W4221094777","https://openalex.org/W4229026509","https://openalex.org/W4282978043"],"related_works":["https://openalex.org/W4281696921","https://openalex.org/W4206313224","https://openalex.org/W3138619437","https://openalex.org/W3130643437","https://openalex.org/W3022124400","https://openalex.org/W2736079351","https://openalex.org/W2384158193","https://openalex.org/W2350486768","https://openalex.org/W2164344703","https://openalex.org/W1680673927"],"abstract_inverted_index":{"Image":[0],"encryption":[1,20,51],"is":[2,59,77,114,128,158,165],"an":[3],"effective":[4],"method":[5],"to":[6,39,61,79,89,116,130,137,170],"protect":[7],"private":[8],"images":[9,88,133,136,169],"by":[10,111],"converting":[11],"them":[12],"into":[13,85,134,167],"meaningless":[14],"ones,":[15],"but":[16],"many":[17],"current":[18],"image":[19,36,45,84,95,122,196],"algorithms":[21],"still":[22],"have":[23],"security":[24],"and":[25,34,63,67,97,154,160,177,190],"efficiency":[26],"problems.":[27],"This":[28],"paper":[29],"combines":[30],"compressed":[31],"sensing":[32],"(CS)":[33],"secret":[35],"sharing":[37],"(SIS)":[38],"propose":[40],"a":[41,49,102,145],"certifiable":[42],"visually":[43,140],"secure":[44,197],"selection":[46],"encryption.":[47],"Firstly,":[48],"selective":[50],"based":[52,106,149],"on":[53,107,150],"multi-task":[54],"convolutional":[55],"neural":[56],"network":[57],"(SE-MTCNN)":[58],"presented":[60],"distinguish":[62],"encrypt":[64],"the":[65,74,81,91,118,125,161,172,185],"sensitive":[66],"non-sensitive":[68],"information":[69,164],"of":[70,93,174,180,187],"plain":[71,83],"images.":[72,143],"Subsequently,":[73],"SIS":[75],"algorithm":[76,127],"used":[78,129],"decompose":[80],"resulting":[82],"multiple":[86,139],"shadow":[87,132],"disperse":[90],"risk":[92],"cryptographic":[94],"loss":[96],"resist":[98],"hacking":[99],"attacks.":[100],"Herein,":[101],"pseudo-convolutional":[103],"sliding":[104],"scrambling":[105],"chaotic":[108],"sequences":[109],"driven":[110],"plaintext":[112],"(PCSS-CSDP)":[113],"proposed":[115],"eliminate":[117],"correlation":[119],"between":[120],"adjacent":[121],"pixels.":[123],"Finally,":[124],"IWT-M-embedding":[126],"embed":[131],"carrier":[135],"get":[138],"meaningful":[141],"cipher":[142,168],"Additionally,":[144],"new":[146],"authentication":[147,163],"scheme":[148],"bit-level":[151],"cyclic":[152],"shifts":[153],"dynamic":[155],"combination":[156],"(AS-BCSDC)":[157],"introduced,":[159],"obtained":[162],"fused":[166],"prevent":[171],"deception":[173],"illegal":[175],"users":[176],"malicious":[178],"tampering":[179],"cloud":[181],"platform.":[182],"Experiments":[183],"demonstrate":[184],"effectiveness":[186],"our":[188],"algorithm,":[189],"it":[191],"may":[192],"be":[193],"applied":[194],"for":[195],"communication.":[198]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4295806983","counts_by_year":[{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":8}],"updated_date":"2025-01-17T11:57:27.066735","created_date":"2022-09-15"}