{"id":"https://openalex.org/W4415835145","doi":"https://doi.org/10.1002/spy2.70130","title":"A High Secure Image Encryption Method Based on an Efficient and Low\u2010Cost Cryptographic System","display_name":"A High Secure Image Encryption Method Based on an Efficient and Low\u2010Cost Cryptographic System","publication_year":2025,"publication_date":"2025-11-01","ids":{"openalex":"https://openalex.org/W4415835145","doi":"https://doi.org/10.1002/spy2.70130"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70130","is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.70130","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.70130","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.70130","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114329204","display_name":"Bahram Rashidi","orcid":"https://orcid.org/0009-0005-6025-1543"},"institutions":[{"id":"https://openalex.org/I4210129530","display_name":"Ayatollah Boroujerdi University","ror":"https://ror.org/0377qcz53","country_code":"IR","type":"education","lineage":["https://openalex.org/I4210129530"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Bahram Rashidi","raw_affiliation_strings":["Department of Electrical Engineering Faculty of Engineering, Ayatollah Boroujerdi University  Boroujerd Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering Faculty of Engineering, Ayatollah Boroujerdi University  Boroujerd Iran","institution_ids":["https://openalex.org/I4210129530"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5114329204"],"corresponding_institution_ids":["https://openalex.org/I4210129530"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34821715,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9851999878883362,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.004999999888241291,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.0008999999845400453,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7343000173568726},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.6510000228881836},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5347999930381775},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48899999260902405},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.4821000099182129},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4587000012397766},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4260999858379364},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.39969998598098755},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.3790000081062317}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7343000173568726},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.6510000228881836},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5347999930381775},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5335999727249146},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48899999260902405},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.4821000099182129},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4587000012397766},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4366999864578247},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4260999858379364},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.39969998598098755},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.3790000081062317},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.3395000100135803},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.32839998602867126},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3248000144958496},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.3215000033378601},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.321399986743927},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.31049999594688416},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.28700000047683716},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.28459998965263367},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.2825999855995178},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2797999978065491},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.27799999713897705},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2648000121116638},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.2533000111579895},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.25270000100135803},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70130","is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.70130","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.70130","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1002/spy2.70130","is_oa":true,"landing_page_url":"https://doi.org/10.1002/spy2.70130","pdf_url":"https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/spy2.70130","source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415835145.pdf"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1787484557","https://openalex.org/W2026253492","https://openalex.org/W2133665775","https://openalex.org/W2301947605","https://openalex.org/W2323017631","https://openalex.org/W2336401120","https://openalex.org/W2551507508","https://openalex.org/W2787079824","https://openalex.org/W2909333747","https://openalex.org/W2909459674","https://openalex.org/W2920295725","https://openalex.org/W2930840217","https://openalex.org/W2947881701","https://openalex.org/W2952428911","https://openalex.org/W2965070013","https://openalex.org/W2972569152","https://openalex.org/W2979494553","https://openalex.org/W3008565680","https://openalex.org/W3011797753","https://openalex.org/W3013460602","https://openalex.org/W3020966938","https://openalex.org/W3037588371","https://openalex.org/W3040359258","https://openalex.org/W3085059903","https://openalex.org/W3108772878","https://openalex.org/W3119940826","https://openalex.org/W3126787982","https://openalex.org/W3137867917","https://openalex.org/W3137938560","https://openalex.org/W3155913577","https://openalex.org/W3156749721","https://openalex.org/W3161781318","https://openalex.org/W3175033924","https://openalex.org/W3183347057","https://openalex.org/W3194780722","https://openalex.org/W3211136635","https://openalex.org/W3215715978","https://openalex.org/W4246847112","https://openalex.org/W4294833856","https://openalex.org/W4296337425","https://openalex.org/W4311219515","https://openalex.org/W4317512969","https://openalex.org/W4319080601","https://openalex.org/W4380371844","https://openalex.org/W4388209803","https://openalex.org/W4388635570","https://openalex.org/W4399868238","https://openalex.org/W4403556889","https://openalex.org/W4405325102","https://openalex.org/W4409679283"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"In":[1,95],"this":[2,124,155],"paper,":[3],"an":[4,198,202,301],"efficient":[5],"and":[6,39,48,62,74,82,91,107,143,200,258,274],"low\u2010cost":[7],"cryptographic":[8],"system":[9],"for":[10,197,264,283,305],"highly":[11],"secure":[12],"image":[13,19,36,54,73,179,183,268,279,306],"encryption":[14,20,116,269,280],"is":[15,22,68,85,218,281],"presented.":[16],"The":[17,44,66,150,212,225,277,297],"proposed":[18,97,216,236,266,298],"structure":[21,217,299],"implemented":[23],"based":[24,220,233],"on":[25,221,234],"the":[26,31,34,40,49,52,71,75,79,88,92,96,101,104,108,115,127,132,137,140,158,170,177,181,210,215,230,235,251,265,292],"key":[27,45,60,90,167,171],"processing":[28,32,46,50,172,184],"(KP)":[29],"stage,":[30,38],"of":[33,51,70,78,139,154,161,176,214,229,253],"input":[35,53,72],"(PII)":[37],"round":[41,204],"function":[42,205],"(KPPII\u2010RF).":[43],"stage":[47,55],"are":[56,112,238,245,270],"used":[57],"to":[58,118,130,206,209,248],"increase":[59],"sensitivity":[61],"plain\u2010image":[63],"sensitivity,":[64],"respectively.":[65,276],"method":[67,125],"independent":[69],"bit":[76],"pattern":[77],"main":[80,89,102],"key,":[81,103],"no":[83],"information":[84,226],"affected":[86],"by":[87,169,180],"original":[93,178,182],"image.":[94],"method,":[98],"three":[99],"parameters,":[100],"counter":[105],"value,":[106],"previously":[109],"generated":[110],"ciphertext,":[111,134],"utilized":[113],"within":[114],"process":[117],"produce":[119],"each":[120],"subsequent":[121],"ciphertext.":[122],"Because":[123],"uses":[126],"previous":[128],"ciphertext":[129],"generate":[131],"next":[133],"it":[135],"increases":[136],"confusion":[138],"final":[141],"result":[142],"provides":[144,300],"better":[145],"security":[146,223,303],"against":[147],"differential":[148],"attacks.":[149],"most":[151],"important":[152],"innovations":[153],"work":[156],"include":[157],"simultaneous":[159],"use":[160],"various":[162],"techniques":[163],"such":[164],"as":[165,190,193],"shuffling":[166,174],"bits":[168],"unit,":[173,185],"pixels":[175],"utilizing":[186],"a":[187,191,194],"parameter":[188,196],"known":[189],"seed":[192],"unique":[195],"image,":[199],"employing":[201],"appropriate":[203],"apply":[207],"complexity":[208],"data.":[211],"performance":[213],"evaluated":[219],"different":[222],"analyses.":[224],"entropy":[227],"values":[228,244],"encrypted":[231],"images":[232],"scheme":[237],"higher":[239,271],"than":[240,272],"7.995,":[241],"while":[242],"correlation":[243],"very":[246],"close":[247],"zero.":[249],"Furthermore,":[250],"number":[252],"pixel":[254],"change":[255,261],"rate":[256],"(NPCR)":[257],"unified":[259],"average":[260],"intensity":[262],"(UACI)":[263],"KPPII\u2010RF":[267,278],"99.5%":[273],"33.3,":[275],"verified":[282],"randomness":[284],"through":[285],"16":[286],"NIST":[287,293],"benchmark":[288],"statistical":[289],"tests":[290],"from":[291],"SP":[294],"800\u201022":[295],"suite.":[296],"acceptable":[302],"level":[304],"encryption.":[307]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-04T00:00:00"}
