{"id":"https://openalex.org/W4415604543","doi":"https://doi.org/10.1002/spy2.70128","title":"An Advanced Image Encryption Algorithm Integrating Orthogonal Latin Square Transversal for Shuffling With Lorenz Chaotic System for Diffusion","display_name":"An Advanced Image Encryption Algorithm Integrating Orthogonal Latin Square Transversal for Shuffling With Lorenz Chaotic System for Diffusion","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W4415604543","doi":"https://doi.org/10.1002/spy2.70128"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70128","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70128","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Balmukund Jha","orcid":null},"institutions":[{"id":"https://openalex.org/I343503978","display_name":"Central University of South Bihar","ror":"https://ror.org/01t1agx36","country_code":"IN","type":"education","lineage":["https://openalex.org/I343503978"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Balmukund Jha","raw_affiliation_strings":["Department of Computer Science Central University of South Bihar  Gaya India","Department of Computer Science, Central University of South Bihar, Gaya, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science Central University of South Bihar  Gaya India","institution_ids":["https://openalex.org/I343503978"]},{"raw_affiliation_string":"Department of Computer Science, Central University of South Bihar, Gaya, India","institution_ids":["https://openalex.org/I343503978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037604194","display_name":"Piyush Kumar Singh","orcid":"https://orcid.org/0000-0001-8954-4861"},"institutions":[{"id":"https://openalex.org/I343503978","display_name":"Central University of South Bihar","ror":"https://ror.org/01t1agx36","country_code":"IN","type":"education","lineage":["https://openalex.org/I343503978"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Piyush Kumar Singh","raw_affiliation_strings":["Department of Computer Science Central University of South Bihar  Gaya India","Department of Computer Science, Central University of South Bihar, Gaya, India"],"raw_orcid":"https://orcid.org/0000-0001-8954-4861","affiliations":[{"raw_affiliation_string":"Department of Computer Science Central University of South Bihar  Gaya India","institution_ids":["https://openalex.org/I343503978"]},{"raw_affiliation_string":"Department of Computer Science, Central University of South Bihar, Gaya, India","institution_ids":["https://openalex.org/I343503978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065138869","display_name":"Rohitesh Pradhan","orcid":null},"institutions":[{"id":"https://openalex.org/I343503978","display_name":"Central University of South Bihar","ror":"https://ror.org/01t1agx36","country_code":"IN","type":"education","lineage":["https://openalex.org/I343503978"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rohitesh Pradhan","raw_affiliation_strings":["Department of Mathematics Central University of South Bihar  Gaya India","Department of Mathematics, Central University of South Bihar, Gaya, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics Central University of South Bihar  Gaya India","institution_ids":["https://openalex.org/I343503978"]},{"raw_affiliation_string":"Department of Mathematics, Central University of South Bihar, Gaya, India","institution_ids":["https://openalex.org/I343503978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080501358","display_name":"Pankaj Mishra","orcid":"https://orcid.org/0000-0002-3324-6598"},"institutions":[{"id":"https://openalex.org/I343503978","display_name":"Central University of South Bihar","ror":"https://ror.org/01t1agx36","country_code":"IN","type":"education","lineage":["https://openalex.org/I343503978"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Pankaj Mishra","raw_affiliation_strings":["Department of Mathematics Central University of South Bihar  Gaya India","Department of Mathematics, Central University of South Bihar, Gaya, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics Central University of South Bihar  Gaya India","institution_ids":["https://openalex.org/I343503978"]},{"raw_affiliation_string":"Department of Mathematics, Central University of South Bihar, Gaya, India","institution_ids":["https://openalex.org/I343503978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101788014","display_name":"Vivek Kumar Jain","orcid":"https://orcid.org/0000-0002-1602-9110"},"institutions":[{"id":"https://openalex.org/I343503978","display_name":"Central University of South Bihar","ror":"https://ror.org/01t1agx36","country_code":"IN","type":"education","lineage":["https://openalex.org/I343503978"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vivek Kumar Jain","raw_affiliation_strings":["Department of Mathematics Central University of South Bihar  Gaya India","Department of Mathematics, Central University of South Bihar, Gaya, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics Central University of South Bihar  Gaya India","institution_ids":["https://openalex.org/I343503978"]},{"raw_affiliation_string":"Department of Mathematics, Central University of South Bihar, Gaya, India","institution_ids":["https://openalex.org/I343503978"]}]},{"author_position":"last","author":{"id":null,"display_name":"Fahmi Ansari","orcid":null},"institutions":[{"id":"https://openalex.org/I343503978","display_name":"Central University of South Bihar","ror":"https://ror.org/01t1agx36","country_code":"IN","type":"education","lineage":["https://openalex.org/I343503978"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Fahmi Ansari","raw_affiliation_strings":["Department of Mathematics Central University of South Bihar  Gaya India","Department of Mathematics, Central University of South Bihar, Gaya, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics Central University of South Bihar  Gaya India","institution_ids":["https://openalex.org/I343503978"]},{"raw_affiliation_string":"Department of Mathematics, Central University of South Bihar, Gaya, India","institution_ids":["https://openalex.org/I343503978"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037604194"],"corresponding_institution_ids":["https://openalex.org/I343503978"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":1.1332,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83629836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.982200026512146,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.005400000140070915,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.0005000000237487257,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7883999943733215},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5978000164031982},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5220999717712402},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.4887999892234802},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43880000710487366},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.42820000648498535},{"id":"https://openalex.org/keywords/lorenz-system","display_name":"Lorenz system","score":0.390500009059906},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.38580000400543213},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.359499990940094}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7883999943733215},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6299999952316284},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5978000164031982},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5220999717712402},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.4887999892234802},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43880000710487366},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4334999918937683},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.42820000648498535},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4205000102519989},{"id":"https://openalex.org/C151510863","wikidata":"https://www.wikidata.org/wiki/Q899844","display_name":"Lorenz system","level":3,"score":0.390500009059906},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.38580000400543213},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.359499990940094},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.3531000018119812},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.34299999475479126},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3379000127315521},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3264000117778778},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3206999897956848},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.31310001015663147},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.30230000615119934},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.271699994802475},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.26579999923706055},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.25929999351501465},{"id":"https://openalex.org/C150921843","wikidata":"https://www.wikidata.org/wiki/Q1170431","display_name":"Resampling","level":2,"score":0.2583000063896179},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.25380000472068787},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70128","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70128","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2081388274","https://openalex.org/W2547857037","https://openalex.org/W2561013577","https://openalex.org/W2746926486","https://openalex.org/W2750693009","https://openalex.org/W2767015783","https://openalex.org/W2786395579","https://openalex.org/W2790033804","https://openalex.org/W2792836087","https://openalex.org/W2811448493","https://openalex.org/W2904080995","https://openalex.org/W2919456313","https://openalex.org/W2951380443","https://openalex.org/W3012355694","https://openalex.org/W3118245404","https://openalex.org/W3133565686","https://openalex.org/W3159927403","https://openalex.org/W3197716997","https://openalex.org/W3212896427","https://openalex.org/W4221140148","https://openalex.org/W4362731127","https://openalex.org/W4363673654","https://openalex.org/W4380486019","https://openalex.org/W4390541499","https://openalex.org/W4391507935","https://openalex.org/W4394858356","https://openalex.org/W4395047878","https://openalex.org/W4396758501","https://openalex.org/W4399661803","https://openalex.org/W4399998206","https://openalex.org/W4402050915","https://openalex.org/W4408571717","https://openalex.org/W4413103727","https://openalex.org/W4414259746","https://openalex.org/W7083707333"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"In":[1],"this":[2],"work,":[3],"we":[4,40,61],"introduce":[5],"a":[6,50,63,177],"new":[7],"image":[8,182],"encryption":[9,79,96,183],"method":[10],"designed":[11],"to":[12,25,30,46,72,82,87,123,164,191],"overcome":[13],"key":[14,26,143],"weaknesses":[15],"found":[16],"in":[17,49],"many":[18],"existing":[19],"techniques\u2014like":[20],"low":[21],"randomness,":[22],"poor":[23],"sensitivity":[24,144],"changes,":[27],"and":[28,55,59,85,104,139,142,148,172,189,193],"vulnerability":[29],"statistical":[31,192],"attacks.":[32,158],"Our":[33,174],"algorithm":[34,153,175],"combines":[35],"two":[36,91],"powerful":[37],"ideas:":[38],"first,":[39],"use":[41],"orthogonal":[42],"Latin":[43],"square":[44],"transversals":[45],"shuffle":[47],"pixels":[48],"way":[51],"that":[52],"avoids":[53],"repetition":[54],"boosts":[56],"spatial":[57],"unpredictability,":[58],"second,":[60],"apply":[62],"chaos\u2010based":[64],"diffusion":[65,105],"process":[66,97],"using":[67,101,106],"the":[68,78,95,111,125,152,169],"Lorenz":[69,112],"chaotic":[70,107,113],"system":[71],"change":[73],"pixel":[74,99],"values,":[75],"which":[76],"makes":[77],"highly":[80],"sensitive":[81],"initial":[83],"conditions":[84],"resistant":[86,190],"intrusion":[88],"attempts.":[89],"The":[90],"primary":[92],"steps":[93],"of":[94,128,151,157],"are":[98],"permutation":[100],"organized":[102],"shuffling":[103],"sequences":[108],"produced":[109],"by":[110],"system.":[114],"Standard":[115],"grayscale":[116],"images":[117],"(256":[118],"\u00d7":[119],"256)":[120],"were":[121],"used":[122],"evaluate":[124],"method.":[126],"Results":[127],"keyspace":[129],"analysis,":[130,132,134,137,141],"histogram":[131],"correlation":[133],"information":[135],"entropy":[136],"NPCR":[138],"UACI":[140],"analysis":[145],"indicate":[146],"strong":[147],"robust":[149],"security":[150],"against":[154],"various":[155],"kinds":[156],"It":[159],"only":[160],"took":[161],"0.1689":[162],"s":[163],"encrypt":[165],"each":[166],"image,":[167],"demonstrating":[168],"method's":[170],"efficiency":[171],"security.":[173],"offers":[176],"dependable":[178],"solution":[179],"for":[180],"safe":[181],"since":[184],"it":[185],"is":[186],"complicated,":[187],"resilient,":[188],"differential":[194],"assaults":[195],"when":[196],"compared":[197],"with":[198],"other":[199],"methods.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-28T00:00:00"}
