{"id":"https://openalex.org/W4385583282","doi":"https://doi.org/10.1007/s40747-023-01187-0","title":"A new dynamic DNA-coding model for gray-scale image encryption","display_name":"A new dynamic DNA-coding model for gray-scale image encryption","publication_year":2023,"publication_date":"2023-08-04","ids":{"openalex":"https://openalex.org/W4385583282","doi":"https://doi.org/10.1007/s40747-023-01187-0"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-023-01187-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-023-01187-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-023-01187-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-023-01187-0.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072281486","display_name":"Yasmine M. Afify","orcid":"https://orcid.org/0000-0001-6400-8472"},"institutions":[{"id":"https://openalex.org/I107720978","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016","country_code":"EG","type":"education","lineage":["https://openalex.org/I107720978"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Yasmine M. Afify","raw_affiliation_strings":["Faculty of Computer and Information Sciences, Ain Shams University, Cairo, 11566, Egypt"],"raw_orcid":"https://orcid.org/0000-0001-6400-8472","affiliations":[{"raw_affiliation_string":"Faculty of Computer and Information Sciences, Ain Shams University, Cairo, 11566, Egypt","institution_ids":["https://openalex.org/I107720978"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087869159","display_name":"Nada H. Sharkawy","orcid":"https://orcid.org/0000-0002-7507-9812"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nada H. Sharkawy","raw_affiliation_strings":["Higher Institute for Computers and Information Technology, ElShorouk, Cairo, 11837, Egypt"],"raw_orcid":"https://orcid.org/0000-0002-7507-9812","affiliations":[{"raw_affiliation_string":"Higher Institute for Computers and Information Technology, ElShorouk, Cairo, 11837, Egypt","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033458445","display_name":"Walaa Gad","orcid":"https://orcid.org/0000-0002-7816-3518"},"institutions":[{"id":"https://openalex.org/I107720978","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016","country_code":"EG","type":"education","lineage":["https://openalex.org/I107720978"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Walaa Gad","raw_affiliation_strings":["Faculty of Computer and Information Sciences, Ain Shams University, Cairo, 11566, Egypt"],"raw_orcid":"https://orcid.org/0000-0002-7816-3518","affiliations":[{"raw_affiliation_string":"Faculty of Computer and Information Sciences, Ain Shams University, Cairo, 11566, Egypt","institution_ids":["https://openalex.org/I107720978"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000210684","display_name":"Nagwa Badr","orcid":"https://orcid.org/0000-0002-5382-1385"},"institutions":[{"id":"https://openalex.org/I107720978","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016","country_code":"EG","type":"education","lineage":["https://openalex.org/I107720978"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Nagwa Badr","raw_affiliation_strings":["Faculty of Computer and Information Sciences, Ain Shams University, Cairo, 11566, Egypt"],"raw_orcid":"https://orcid.org/0000-0002-5382-1385","affiliations":[{"raw_affiliation_string":"Faculty of Computer and Information Sciences, Ain Shams University, Cairo, 11566, Egypt","institution_ids":["https://openalex.org/I107720978"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072281486"],"corresponding_institution_ids":["https://openalex.org/I107720978"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":3.7679,"has_fulltext":true,"cited_by_count":32,"citation_normalized_percentile":{"value":0.94865704,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"10","issue":"1","first_page":"745","last_page":"761"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9679999947547913,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8065367937088013},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5612255930900574},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.5373201966285706},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4579675495624542},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4495196044445038},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.4237462878227234},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4177030920982361},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.36752384901046753},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3159208297729492},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30963414907455444},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23974215984344482},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11952155828475952}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8065367937088013},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5612255930900574},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5373201966285706},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4579675495624542},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4495196044445038},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.4237462878227234},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4177030920982361},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36752384901046753},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3159208297729492},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30963414907455444},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23974215984344482},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11952155828475952},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s40747-023-01187-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-023-01187-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-023-01187-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cb37d1dfbc4b413e8750871f823d2450","is_oa":true,"landing_page_url":"https://doaj.org/article/cb37d1dfbc4b413e8750871f823d2450","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complex & Intelligent Systems, Vol 10, Iss 1, Pp 745-761 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s40747-023-01187-0","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-023-01187-0","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-023-01187-0.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321119","display_name":"Ain Shams University","ror":"https://ror.org/00cb9w016"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4385583282.pdf"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W2071673800","https://openalex.org/W2792930077","https://openalex.org/W2930668970","https://openalex.org/W3043421987","https://openalex.org/W3047267927","https://openalex.org/W3048532210","https://openalex.org/W3083299998","https://openalex.org/W3089532416","https://openalex.org/W3090893159","https://openalex.org/W3122910428","https://openalex.org/W3128030072","https://openalex.org/W3135649137","https://openalex.org/W3151314261","https://openalex.org/W3156578259","https://openalex.org/W3158024884","https://openalex.org/W3164225583","https://openalex.org/W3165071126","https://openalex.org/W3177140957","https://openalex.org/W3188020797","https://openalex.org/W3188259400","https://openalex.org/W3201065986","https://openalex.org/W3211099767","https://openalex.org/W4210963550","https://openalex.org/W4213256318","https://openalex.org/W4214888704","https://openalex.org/W4220908614","https://openalex.org/W4224214100","https://openalex.org/W4224278994","https://openalex.org/W4226088892","https://openalex.org/W4229377957","https://openalex.org/W4282007345","https://openalex.org/W4285107854","https://openalex.org/W4285151156","https://openalex.org/W4292188619","https://openalex.org/W4313537271","https://openalex.org/W4361301288"],"related_works":["https://openalex.org/W115686965","https://openalex.org/W2768918307","https://openalex.org/W2110031805","https://openalex.org/W2040020606","https://openalex.org/W4362659915","https://openalex.org/W2998642419","https://openalex.org/W2376048186","https://openalex.org/W2375981391","https://openalex.org/W45120566","https://openalex.org/W2361408597"],"abstract_inverted_index":{"Abstract":[0],"To":[1],"protect":[2],"the":[3,27,36,50,61,64,99,105,109,119,127,130,141,149,161,169,182,200,203],"images":[4],"and":[5,59,66,111,129,174],"provide":[6],"a":[7,20,72,89,135,192],"more":[8],"secure":[9],"cipher":[10],"image,":[11,51],"DNA":[12,30],"encoding":[13,31],"is":[14,82,143,152,165],"crucial":[15],"in":[16,98,195],"image":[17,28,65,110,142,151],"encryption.":[18],"Applying":[19],"single,":[21],"easily":[22],"detectable":[23],"coding":[24,44,91,138,162],"rule":[25],"to":[26,49,57,84,114,145,172,180],"during":[29],"has":[32],"no":[33],"impact":[34],"on":[35,185],"encryption":[37,48,62,78],"model's":[38],"security":[39,201],"level.":[40],"Therefore,":[41],"using":[42,88,126,160],"various":[43],"rules":[45],"while":[46],"applying":[47,155],"dynamic":[52,73],"DNA-coding":[53,74],"techniques":[54],"have":[55],"emerged":[56],"strengthen":[58],"improve":[60],"of":[63,137,202],"its":[67,112],"security.":[68],"This":[69],"study":[70],"integrates":[71],"method":[75],"with":[76,168],"an":[77],"model.":[79,204],"The":[80,101],"model":[81,103,184],"applied":[83],"gray-scale":[85],"images,":[86],"where":[87,148],"predetermined":[90],"rule,":[92],"every":[93],"two":[94],"bits":[95],"are":[96],"DNA-encoded":[97],"image.":[100],"proposed":[102,183],"generates":[104,134],"key":[106],"by":[107,154],"sending":[108],"metadata":[113],"hash":[115],"functions.":[116],"Following":[117],"that,":[118],"hyperchaotic":[120],"system":[121,133],"constructs":[122],"three":[123],"chaotic":[124,132,157,170],"sequences":[125,171],"key,":[128],"Lorenz\u2013Liu":[131],"sequence":[136],"rules.":[139],"Then,":[140],"passed":[144],"Arnold":[146],"Transform,":[147],"resulted":[150],"diffused":[153],"five":[156],"maps.":[158],"Last,":[159],"rules,":[163],"it":[164,198],"DNA-encoded,":[166],"provided":[167],"DNA,":[173],"DNA-decoded.":[175],"Twelve":[176],"metrics":[177],"were":[178],"used":[179,188],"assess":[181],"ten":[186],"widely":[187],"images.":[189],"Results":[190],"show":[191],"promising":[193],"improvement":[194],"performance,":[196],"since":[197],"enhanced":[199]},"counts_by_year":[{"year":2026,"cited_by_count":8},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":1}],"updated_date":"2026-01-21T23:30:37.877113","created_date":"2025-10-10T00:00:00"}
