{"id":"https://openalex.org/W4414424706","doi":"https://doi.org/10.1002/spy2.70103","title":"Advancing Image Cipher: Quadratic Residue on Elliptic Curve With <scp>DNA</scp> Encryption","display_name":"Advancing Image Cipher: Quadratic Residue on Elliptic Curve With <scp>DNA</scp> Encryption","publication_year":2025,"publication_date":"2025-09-21","ids":{"openalex":"https://openalex.org/W4414424706","doi":"https://doi.org/10.1002/spy2.70103"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70103","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70103","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012424060","display_name":"M. G. Abbas Malik","orcid":null},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"M. G. Abbas Malik","raw_affiliation_strings":["Interdisciplinary Sustainable Systems (IS2) Research Group College of Computer and Information Science, Prince Sultan University  Riyadh Saudi Arabia","Interdisciplinary Sustainable Systems (IS2) Research Group, College of Computer and Information Science, Prince Sultan University, Riyadh, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Interdisciplinary Sustainable Systems (IS2) Research Group College of Computer and Information Science, Prince Sultan University  Riyadh Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]},{"raw_affiliation_string":"Interdisciplinary Sustainable Systems (IS2) Research Group, College of Computer and Information Science, Prince Sultan University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080843198","display_name":"Muhammad Hussain","orcid":null},"institutions":[{"id":"https://openalex.org/I4210143942","display_name":"National University of Technology","ror":"https://ror.org/05e21fw44","country_code":"PK","type":"education","lineage":["https://openalex.org/I4210143942"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Hussain","raw_affiliation_strings":["Department of Basic Sciences &amp; Humanities College of Electrical and Mechanical Engineering, National University of Sciences and Technology  Islamabad Pakistan","Department of Basic Sciences &amp; Humanities College of Electrical and Mechanical Engineering, National University of Sciences and Technology Islamabad Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Basic Sciences &amp; Humanities College of Electrical and Mechanical Engineering, National University of Sciences and Technology  Islamabad Pakistan","institution_ids":["https://openalex.org/I4210143942"]},{"raw_affiliation_string":"Department of Basic Sciences &amp; Humanities College of Electrical and Mechanical Engineering, National University of Sciences and Technology Islamabad Pakistan","institution_ids":["https://openalex.org/I4210143942"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068963911","display_name":"Zia Bashir","orcid":"https://orcid.org/0000-0002-6051-8413"},"institutions":[{"id":"https://openalex.org/I12469534","display_name":"Quaid-i-Azam University","ror":"https://ror.org/04s9hft57","country_code":"PK","type":"education","lineage":["https://openalex.org/I12469534"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Zia Bashir","raw_affiliation_strings":["Department of Mathematics Quaid\u2010i\u2010Azam University  Islamabad Pakistan","Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-6051-8413","affiliations":[{"raw_affiliation_string":"Department of Mathematics Quaid\u2010i\u2010Azam University  Islamabad Pakistan","institution_ids":["https://openalex.org/I12469534"]},{"raw_affiliation_string":"Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I12469534"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068963911"],"corresponding_institution_ids":["https://openalex.org/I12469534"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2391909,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.754800021648407},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5909000039100647},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4790000021457672},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44110000133514404},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4366999864578247},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.4205999970436096},{"id":"https://openalex.org/keywords/quadratic-equation","display_name":"Quadratic equation","score":0.39079999923706055},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.3714999854564667}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.754800021648407},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5909000039100647},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4860999882221222},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4790000021457672},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4779999852180481},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.45739999413490295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.44940000772476196},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44110000133514404},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4366999864578247},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.4205999970436096},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.39079999923706055},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.3714999854564667},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.34060001373291016},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.31119999289512634},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.2572999894618988},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.2551000118255615},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.2524000108242035},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70103","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70103","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1535097613","https://openalex.org/W1672978577","https://openalex.org/W1754939103","https://openalex.org/W2001193973","https://openalex.org/W2007326055","https://openalex.org/W2036378739","https://openalex.org/W2056105196","https://openalex.org/W2063685463","https://openalex.org/W2066730489","https://openalex.org/W2105145864","https://openalex.org/W2109394932","https://openalex.org/W2229807295","https://openalex.org/W2343224012","https://openalex.org/W2523079709","https://openalex.org/W2605542652","https://openalex.org/W2656881249","https://openalex.org/W2767797770","https://openalex.org/W2802026902","https://openalex.org/W2889887095","https://openalex.org/W2906510026","https://openalex.org/W2946199307","https://openalex.org/W2990655023","https://openalex.org/W3020188411","https://openalex.org/W3037826251","https://openalex.org/W3083378171","https://openalex.org/W3204139930","https://openalex.org/W3215715978","https://openalex.org/W4210322702","https://openalex.org/W4220710095","https://openalex.org/W4223420278","https://openalex.org/W4224288992","https://openalex.org/W4243494487","https://openalex.org/W4281658363","https://openalex.org/W4285021361","https://openalex.org/W4286447693","https://openalex.org/W4292553313","https://openalex.org/W4306248871","https://openalex.org/W4313419372","https://openalex.org/W4313652559","https://openalex.org/W4389267288","https://openalex.org/W4391014865","https://openalex.org/W4392381163","https://openalex.org/W4399661803","https://openalex.org/W4399868238","https://openalex.org/W4404835300","https://openalex.org/W4405325102","https://openalex.org/W4405531574","https://openalex.org/W4406675862","https://openalex.org/W4407304478","https://openalex.org/W4407948341","https://openalex.org/W4409249359","https://openalex.org/W4410196906"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Recent":[1],"research":[2],"on":[3,9,102],"image":[4,54,84,140,144,246],"encryption":[5,55,76,178,189,247],"has":[6],"predominantly":[7],"focused":[8],"pixel\u2010swapping":[10],"techniques.":[11],"However,":[12],"such":[13],"approaches":[14],"often":[15],"lack":[16],"sufficient":[17],"complexity":[18],"and":[19,24,52,78,87,106,141,153,176,202,231,241],"remain":[20],"susceptible":[21],"to":[22,171,186,239],"known\u2010plaintext":[23],"chosen\u2010plaintext":[25],"attacks.":[26,214],"Another":[27],"critical":[28],"challenge":[29],"lies":[30],"in":[31,40,69],"securely":[32,88],"sharing":[33],"the":[34,73,79,82,91,112,123,131,139,159,188,193,200,206,219,224],"hash":[35,80,228],"values":[36],"of":[37,81,114,138,226],"plain":[38,83],"images":[39],"asymmetric":[41],"cryptographic":[42],"settings.":[43],"Addressing":[44],"these":[45],"gaps,":[46],"this":[47],"study":[48],"proposes":[49],"a":[50,98,142,163],"novel":[51],"efficient":[53],"scheme":[56,207],"integrating":[57],"elliptic":[58,115],"curve":[59,116],"cryptography":[60],"(ECC)":[61],"with":[62,90],"DNA":[63,126,150],"computing.":[64],"The":[65,94],"proposed":[66,220],"method":[67],"operates":[68],"three":[70],"phases.":[71],"In":[72,122],"first":[74],"phase,":[75,125],"keys":[77],"are":[85,128,145,156],"generated":[86],"shared":[89],"authorized":[92],"party.":[93],"second":[95],"phase":[96],"introduces":[97],"pixel\u2010switching":[99],"mechanism":[100],"based":[101],"quadratic":[103,107],"residues":[104],"(QR)":[105],"non\u2010residues":[108],"(QNR)":[109],"derived":[110],"from":[111],"\u2010coordinates":[113],"points,":[117],"ensuring":[118,174],"high":[119,235],"structural":[120],"complexity.":[121],"final":[124],"operations":[127],"applied":[129],"for":[130,167,244],"diffusion":[132,204,232],"process,":[133],"where":[134],"randomly":[135],"chosen":[136],"rows":[137],"mask":[143],"processed":[146],"using":[147],"dynamically":[148],"selected":[149],"rules.":[151],"Row":[152],"rule":[154],"selection":[155],"governed":[157],"by":[158],"intertwining":[160],"logistic":[161],"map,":[162],"chaotic":[164],"map":[165],"known":[166],"its":[168],"extreme":[169],"sensitivity":[170],"initial":[172],"conditions,":[173],"unpredictable":[175],"non\u2010repetitive":[177],"behavior.":[179],"This":[180],"unpredictability":[181],"significantly":[182],"complicates":[183],"any":[184],"attempt":[185],"reverse\u2010engineer":[187],"process.":[190],"By":[191],"incorporating":[192],"Diffie\u2013Hellman":[194],"(DH)":[195],"key":[196],"exchange":[197],"into":[198],"both":[199],"confusion":[201],"dynamic":[203],"stages,":[205],"achieves":[208],"robust":[209],"security":[210],"against":[211],"various":[212],"cryptanalytic":[213],"Experimental":[215],"results":[216],"demonstrate":[217],"that":[218],"approach":[221],"effectively":[222],"addresses":[223],"challenges":[225],"secure":[227],"sharing,":[229],"confusion,":[230],"while":[233],"offering":[234],"efficiency,":[236],"strong":[237],"resistance":[238],"cryptanalysis,":[240],"practical":[242],"feasibility":[243],"real\u2010world":[245],"applications.":[248]},"counts_by_year":[],"updated_date":"2025-11-19T23:35:23.961156","created_date":"2025-10-10T00:00:00"}
