{"id":"https://openalex.org/W4206909781","doi":"https://doi.org/10.1142/s0218127422500043","title":"A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography","display_name":"A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4206909781","doi":"https://doi.org/10.1142/s0218127422500043"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218127422500043","pdf_url":null,"source":{"id":"https://openalex.org/S81011612","display_name":"International Journal of Bifurcation and Chaos","issn_l":"0218-1274","issn":["0218-1274","1793-6551"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082779748","display_name":"Jinyuan Liu","orcid":"https://orcid.org/0000-0002-5471-5621"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyuan Liu","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052330166","display_name":"Yong Wang","orcid":"https://orcid.org/0000-0002-5247-043X"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Wang","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China","Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin 541004, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, P. R. China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin 541004, P. R. China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036591099","display_name":"Qi Han","orcid":"https://orcid.org/0000-0002-3264-9571"},"institutions":[{"id":"https://openalex.org/I168337820","display_name":"Chongqing University of Science and Technology","ror":"https://ror.org/03n3v6d52","country_code":"CN","type":"education","lineage":["https://openalex.org/I168337820"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Han","raw_affiliation_strings":["School of Intelligent Technology and Engineering, Chongqing University of Science and Technology, Chongqing 401331, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Intelligent Technology and Engineering, Chongqing University of Science and Technology, Chongqing 401331, P. R. China","institution_ids":["https://openalex.org/I168337820"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074631753","display_name":"Jerry Gao","orcid":"https://orcid.org/0000-0002-1051-5839"},"institutions":[{"id":"https://openalex.org/I51504820","display_name":"San Jose State University","ror":"https://ror.org/04qyvz380","country_code":"US","type":"education","lineage":["https://openalex.org/I51504820"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jerry Gao","raw_affiliation_strings":["Computer Engineering Department, San Jose State University, San Jose, CA 95192, USA"],"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, San Jose State University, San Jose, CA 95192, USA","institution_ids":["https://openalex.org/I51504820"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052330166"],"corresponding_institution_ids":["https://openalex.org/I10535382","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":2.23,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.999942,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"32","issue":"01","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9958,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plaintext","display_name":"Plain text","score":0.537682}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.83129746},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6706176},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.63921475},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.6065267},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5687803},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.537682},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49980235},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.46992195},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.44931877},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.44810572},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.42151508},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42136884},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33198634},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15914133},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09081638},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.087008744}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0218127422500043","pdf_url":null,"source":{"id":"https://openalex.org/S81011612","display_name":"International Journal of Bifurcation and Chaos","issn_l":"0218-1274","issn":["0218-1274","1793-6551"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61876200"}],"datasets":[],"versions":[],"referenced_works_count":46,"referenced_works":["https://openalex.org/W1984185638","https://openalex.org/W2008855788","https://openalex.org/W2010065947","https://openalex.org/W2059464004","https://openalex.org/W2060791695","https://openalex.org/W2068684969","https://openalex.org/W2080294346","https://openalex.org/W2111303611","https://openalex.org/W2121352877","https://openalex.org/W2176627963","https://openalex.org/W2257884123","https://openalex.org/W2280219598","https://openalex.org/W2594438651","https://openalex.org/W2604782356","https://openalex.org/W2739818049","https://openalex.org/W2767875127","https://openalex.org/W2791035318","https://openalex.org/W2806287498","https://openalex.org/W2876368481","https://openalex.org/W2884760936","https://openalex.org/W2901043278","https://openalex.org/W2905741893","https://openalex.org/W2908420681","https://openalex.org/W2910381517","https://openalex.org/W2912584642","https://openalex.org/W2922090551","https://openalex.org/W2924210827","https://openalex.org/W2935953843","https://openalex.org/W2943863922","https://openalex.org/W2951676679","https://openalex.org/W2952607919","https://openalex.org/W2954129260","https://openalex.org/W2957457698","https://openalex.org/W2970166586","https://openalex.org/W2980452906","https://openalex.org/W2987797045","https://openalex.org/W2994988297","https://openalex.org/W2996515043","https://openalex.org/W3000387595","https://openalex.org/W3023833946","https://openalex.org/W3093752067","https://openalex.org/W3106876302","https://openalex.org/W3112281491","https://openalex.org/W3131123584","https://openalex.org/W3169959898","https://openalex.org/W638251766"],"related_works":["https://openalex.org/W4245054042","https://openalex.org/W3211136635","https://openalex.org/W3094092686","https://openalex.org/W2545514196","https://openalex.org/W2389178160","https://openalex.org/W2383771631","https://openalex.org/W2355986883","https://openalex.org/W2341723023","https://openalex.org/W2175086517","https://openalex.org/W2154135737"],"abstract_inverted_index":{"Chaotic":[0],"maps":[1],"have":[2],"been":[3],"widely":[4],"used":[5,64],"in":[6],"image":[7,24,62,94,108],"encryption":[8,25,44,75],"due":[9],"to":[10,17,65,79,96,120,142,148],"their":[11],"complexity,":[12],"pseudorandomness":[13],"and":[14,33,45,125,159,163,174],"high":[15,171],"sensitivity":[16],"initial":[18],"values.":[19],"In":[20,51,101],"this":[21],"paper,":[22],"an":[23],"algorithm":[26,38,76,138,169],"based":[27],"on":[28],"a":[29,152],"4D":[30],"chaotic":[31,70,118],"map":[32],"steganography":[34],"is":[35,63,89,109],"proposed.":[36],"The":[37],"consists":[39],"of":[40,43,48,55,60,69,82,99,105,114,117,130],"two":[41],"rounds":[42],"one":[46],"operation":[47],"embedding":[49],"hash.":[50],"the":[52,57,67,74,80,83,86,92,97,102,107,112,122,128,131,145,149,168],"first":[53],"round":[54,104],"encryption,":[56,106],"hash":[58,87,123,146],"value":[59,88,124,147],"plaintext":[61],"control":[66,113],"generation":[68],"sequences,":[71],"which":[72],"makes":[73],"highly":[77],"relevant":[78],"content":[81],"image.":[84],"Then,":[85],"embedded":[90],"into":[91],"intermediate":[93],"according":[95],"idea":[98],"steganography.":[100],"second":[103],"encrypted":[110],"under":[111],"another":[115],"set":[116],"sequences":[119],"hide":[121],"further":[126],"enhance":[127],"security":[129,164,172],"algorithm.":[132],"Different":[133],"from":[134],"other":[135],"algorithms,":[136],"our":[137],"does":[139],"not":[140],"need":[141],"additionally":[143],"transmit":[144],"decryptor":[150],"through":[151],"special":[153],"channel.":[154],"It":[155],"has":[156,170],"good":[157],"availability":[158],"adaptability.":[160],"Experimental":[161],"results":[162],"analysis":[165],"demonstrate":[166],"that":[167],"performance":[173],"can":[175],"resist":[176],"various":[177],"attacks.":[178]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4206909781","counts_by_year":[{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3}],"updated_date":"2025-01-08T22:34:48.613015","created_date":"2022-01-26"}