{"id":"https://openalex.org/W4402530329","doi":"https://doi.org/10.1007/s11042-024-20125-x","title":"A new four-tier technique for efficient multiple images encryption","display_name":"A new four-tier technique for efficient multiple images encryption","publication_year":2024,"publication_date":"2024-09-12","ids":{"openalex":"https://openalex.org/W4402530329","doi":"https://doi.org/10.1007/s11042-024-20125-x"},"language":"en","primary_location":{"id":"doi:10.1007/s11042-024-20125-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-024-20125-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-024-20125-x.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s11042-024-20125-x.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074599271","display_name":"Khalid M. Hosny","orcid":"https://orcid.org/0000-0001-8065-8977"},"institutions":[{"id":"https://openalex.org/I192398990","display_name":"Zagazig University","ror":"https://ror.org/053g6we49","country_code":"EG","type":"education","lineage":["https://openalex.org/I192398990"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Khalid M. Hosny","raw_affiliation_strings":["Department of Information Technology, Faculty of Computers and Information, Zagazig University, Zagazig, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Faculty of Computers and Information, Zagazig University, Zagazig, Egypt","institution_ids":["https://openalex.org/I192398990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013880600","display_name":"Sara T. Kamal","orcid":"https://orcid.org/0000-0003-0915-8667"},"institutions":[{"id":"https://openalex.org/I91041137","display_name":"Assiut University","ror":"https://ror.org/01jaj8n65","country_code":"EG","type":"education","lineage":["https://openalex.org/I91041137"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Sara T. Kamal","raw_affiliation_strings":["Department of Computer Sciences, Faculty of Computers and Information, Assiut University, Assiut, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences, Faculty of Computers and Information, Assiut University, Assiut, Egypt","institution_ids":["https://openalex.org/I91041137"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074599271"],"corresponding_institution_ids":["https://openalex.org/I192398990"],"apc_list":null,"apc_paid":null,"fwci":0.7708,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72829747,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"84","issue":"23","first_page":"26797","last_page":"26815"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8818427920341492},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8230993747711182},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5289378762245178},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.5246230363845825},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.47287672758102417},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46067556738853455},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.43742403388023376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24275708198547363},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.21564611792564392}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8818427920341492},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8230993747711182},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5289378762245178},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.5246230363845825},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.47287672758102417},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46067556738853455},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.43742403388023376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24275708198547363},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.21564611792564392},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11042-024-20125-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-024-20125-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-024-20125-x.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s11042-024-20125-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s11042-024-20125-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s11042-024-20125-x.pdf","source":{"id":"https://openalex.org/S110206669","display_name":"Multimedia Tools and Applications","issn_l":"1380-7501","issn":["1380-7501","1573-7721"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Multimedia Tools and Applications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320324156","display_name":"Zagazig University","ror":"https://ror.org/053g6we49"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402530329.pdf","grobid_xml":"https://content.openalex.org/works/W4402530329.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W2578324953","https://openalex.org/W2739818049","https://openalex.org/W2887477933","https://openalex.org/W2895929913","https://openalex.org/W2897961929","https://openalex.org/W2901602009","https://openalex.org/W2902871491","https://openalex.org/W2983620831","https://openalex.org/W3001010821","https://openalex.org/W3024278770","https://openalex.org/W3136062515","https://openalex.org/W3146401826","https://openalex.org/W3158538571","https://openalex.org/W3165444304","https://openalex.org/W3209032532","https://openalex.org/W4205232018","https://openalex.org/W4206198265","https://openalex.org/W4206511399","https://openalex.org/W4210931300","https://openalex.org/W4221065228","https://openalex.org/W4221101677","https://openalex.org/W4286209887"],"related_works":["https://openalex.org/W2375981391","https://openalex.org/W45120566","https://openalex.org/W2104599943","https://openalex.org/W2361408597","https://openalex.org/W2387112055","https://openalex.org/W2391464897","https://openalex.org/W2376168677","https://openalex.org/W2025536124","https://openalex.org/W4387763778","https://openalex.org/W2368473326"],"abstract_inverted_index":{"Abstract":[0],"People":[1],"transmit":[2],"millions":[3],"of":[4,46,104],"digital":[5,29,78],"images":[6,14,30,48,86],"daily":[7],"over":[8],"various":[9,185],"networks,":[10],"where":[11],"securing":[12,28,41],"these":[13],"is":[15,21,97,178],"a":[16,22,63,141,144],"big":[17],"challenge.":[18],"Image":[19],"encryption":[20,36,45,56,69],"successful":[23],"approach":[24],"widely":[25],"used":[26],"in":[27],"while":[31],"transmitting.":[32],"Researchers":[33],"developed":[34],"different":[35],"techniques":[37],"that":[38,175],"focus":[39],"on":[40],"individual":[42],"images.":[43],"Recently,":[44],"multiple":[47,67],"has":[49],"gained":[50],"more":[51],"interest":[52],"as":[53],"an":[54,89,133,148],"emerging":[55],"approach.":[57],"In":[58],"this":[59,168,176],"paper,":[60],"we":[61,82,109,126],"proposed":[62,154],"four-tier":[64],"technique":[65,177],"for":[66],"image":[68,79,96,114,131],"(MIE)":[70],"to":[71,87,151,160,166,183],"increase":[72],"the":[73,84,93,102,111,116,128,153,172],"transmission":[74],"speed":[75],"and":[76,120,146,156,171,181],"improve":[77],"security.":[80],"First,":[81],"attached":[83],"plain":[85,106],"create":[88],"augmented":[90,95,113,130],"image.":[91,107],"Second,":[92],"randomized":[94,112],"obtained":[98],"by":[99],"randomly":[100],"changing":[101],"position":[103],"each":[105],"Third,":[108],"scrambled":[110,129],"using":[115,132],"zigzag":[117],"pattern,":[118],"rotation,":[119],"random":[121],"permutation":[122],"between":[123],"blocks.":[124],"Finally,":[125],"diffuse":[127],"Altered":[134],"Sine-logistic-based":[135],"Tent":[136],"map":[137],"(ASLT).":[138],"We":[139],"draw":[140],"flowchart,":[142],"write":[143],"pseudo-code,":[145],"present":[147],"illustrative":[149],"example":[150],"simplify":[152],"method":[155],"make":[157],"it":[158],"easy":[159],"understand.":[161],"Many":[162],"experiments":[163],"were":[164],"performed":[165],"evaluate":[167],"Four-Tier":[169],"technique,":[170],"results":[173],"show":[174],"extremely":[179],"effective":[180],"secure":[182],"withstand":[184],"attacks.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-03-12T06:13:28.667946","created_date":"2025-10-10T00:00:00"}
