{"id":"https://openalex.org/W4411016691","doi":"https://doi.org/10.1007/s40747-025-01912-x","title":"A dual-image encryption scheme for sensitive region of traffic image using public key cryptosystem and novel chaotic map","display_name":"A dual-image encryption scheme for sensitive region of traffic image using public key cryptosystem and novel chaotic map","publication_year":2025,"publication_date":"2025-06-04","ids":{"openalex":"https://openalex.org/W4411016691","doi":"https://doi.org/10.1007/s40747-025-01912-x"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-025-01912-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-025-01912-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-025-01912-x.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-025-01912-x.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076732025","display_name":"Tingyu An","orcid":"https://orcid.org/0000-0003-3429-7482"},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tingyu An","raw_affiliation_strings":["School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","School of Information Engineering, Chang'an University, Xi'an, 710064, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","institution_ids":["https://openalex.org/I25355098"]},{"raw_affiliation_string":"School of Information Engineering, Chang'an University, Xi'an, 710064, China","institution_ids":["https://openalex.org/I25355098"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068774365","display_name":"Tao Gao","orcid":"https://orcid.org/0000-0002-5750-7449"},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Gao","raw_affiliation_strings":["School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","School of Information Engineering, Chang'an University, Xi'an, 710064, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","institution_ids":["https://openalex.org/I25355098"]},{"raw_affiliation_string":"School of Information Engineering, Chang'an University, Xi'an, 710064, China","institution_ids":["https://openalex.org/I25355098"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101425579","display_name":"Ting Chen","orcid":"https://orcid.org/0009-0007-4297-470X"},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Chen","raw_affiliation_strings":["School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","School of Information Engineering, Chang'an University, Xi'an, 710064, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Chang\u2019an University, Xi\u2019an, 710064, China","institution_ids":["https://openalex.org/I25355098"]},{"raw_affiliation_string":"School of Information Engineering, Chang'an University, Xi'an, 710064, China","institution_ids":["https://openalex.org/I25355098"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019416858","display_name":"Donghua Jiang","orcid":"https://orcid.org/0000-0002-3545-6409"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Donghua Jiang","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, 510006, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, 510006, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5076732025"],"corresponding_institution_ids":["https://openalex.org/I25355098"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":11.6299,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.98649428,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"11","issue":"7","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9708999991416931,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.8035085797309875},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7300472855567932},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.6902221441268921},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6755106449127197},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6186091899871826},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6097601652145386},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5961973667144775},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5382686853408813},{"id":"https://openalex.org/keywords/computational-intelligence","display_name":"Computational intelligence","score":0.5349000692367554},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.49051159620285034},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.48471689224243164},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.45671477913856506},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.4260508418083191},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.36461693048477173},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35620060563087463},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35012686252593994},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34593361616134644},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23461362719535828}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.8035085797309875},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7300472855567932},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.6902221441268921},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6755106449127197},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6186091899871826},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6097601652145386},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5961973667144775},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5382686853408813},{"id":"https://openalex.org/C139502532","wikidata":"https://www.wikidata.org/wiki/Q1122090","display_name":"Computational intelligence","level":2,"score":0.5349000692367554},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.49051159620285034},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.48471689224243164},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.45671477913856506},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.4260508418083191},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.36461693048477173},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35620060563087463},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35012686252593994},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34593361616134644},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23461362719535828},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s40747-025-01912-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-025-01912-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-025-01912-x.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ac0564757c3143b7b3307aacc2612db6","is_oa":true,"landing_page_url":"https://doaj.org/article/ac0564757c3143b7b3307aacc2612db6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complex & Intelligent Systems, Vol 11, Iss 7, Pp 1-23 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s40747-025-01912-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-025-01912-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-025-01912-x.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1517041379","display_name":null,"funder_award_id":"52172","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2011710298","display_name":null,"funder_award_id":"2023YFB2504703","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6214113610","display_name":null,"funder_award_id":"52441205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8023445152","display_name":null,"funder_award_id":"52172379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411016691.pdf","grobid_xml":"https://content.openalex.org/works/W4411016691.grobid-xml"},"referenced_works_count":48,"referenced_works":["https://openalex.org/W1982511904","https://openalex.org/W2073630396","https://openalex.org/W2909459674","https://openalex.org/W2912217246","https://openalex.org/W2921203334","https://openalex.org/W2972948178","https://openalex.org/W3048304757","https://openalex.org/W3137710647","https://openalex.org/W3158925544","https://openalex.org/W3181762346","https://openalex.org/W3211136635","https://openalex.org/W3215715978","https://openalex.org/W3216142894","https://openalex.org/W4206197292","https://openalex.org/W4210661959","https://openalex.org/W4220669322","https://openalex.org/W4304606321","https://openalex.org/W4323567474","https://openalex.org/W4377030789","https://openalex.org/W4380451180","https://openalex.org/W4380854368","https://openalex.org/W4382862563","https://openalex.org/W4382936982","https://openalex.org/W4386378733","https://openalex.org/W4386600428","https://openalex.org/W4387261692","https://openalex.org/W4387591425","https://openalex.org/W4388635570","https://openalex.org/W4389076276","https://openalex.org/W4389889497","https://openalex.org/W4390819739","https://openalex.org/W4392511198","https://openalex.org/W4395047878","https://openalex.org/W4396214987","https://openalex.org/W4399249343","https://openalex.org/W4399316329","https://openalex.org/W4399327623","https://openalex.org/W4401046799","https://openalex.org/W4401051167","https://openalex.org/W4401541385","https://openalex.org/W4403278195","https://openalex.org/W4403656371","https://openalex.org/W4404026039","https://openalex.org/W4405325102","https://openalex.org/W4405855969","https://openalex.org/W4406052309","https://openalex.org/W4406078961","https://openalex.org/W4407026506"],"related_works":["https://openalex.org/W1528334372","https://openalex.org/W2007236187","https://openalex.org/W2521974440","https://openalex.org/W2153970283","https://openalex.org/W2363792252","https://openalex.org/W4206984193","https://openalex.org/W2036640741","https://openalex.org/W1998172183","https://openalex.org/W3030581698","https://openalex.org/W2392237044"],"abstract_inverted_index":{"Intelligent":[0],"transport":[1],"systems":[2],"(ITS)":[3],"extensively":[4],"employ":[5],"traffic":[6,9,105,116],"images":[7,19,106,117],"for":[8,176],"flow":[10],"analysis,":[11],"accident":[12],"detection":[13],"and":[14,27,47,61,87,126,131,149,165],"other":[15],"tasks.":[16],"However,":[17],"these":[18,67],"contain":[20],"sensitive":[21,34,178],"privacy":[22,163],"information,":[23],"including":[24],"license":[25],"plates":[26],"facial":[28],"features":[29],"of":[30,158],"drivers,":[31],"which":[32],"form":[33],"regions":[35],"(SRs)":[36],"that":[37,99,134],"are":[38],"vulnerable":[39],"to":[40,44,83,169],"unauthorized":[41],"exposure.":[42],"Due":[43],"computational":[45],"limits":[46],"security":[48],"risks":[49],"caused":[50],"by":[51,80],"key":[52,63,124,143,147,151],"transmission,":[53],"existing":[54],"encryption":[55,93,111,133],"techniques":[56],"face":[57],"challenges":[58],"in":[59,161,180],"efficiency":[60],"complex":[62],"management.":[64,152],"To":[65],"address":[66],"issues,":[68],"we":[69],"first":[70],"introduce":[71],"a":[72,173],"novel":[73],"three-dimensional":[74],"composite":[75],"chaotic":[76],"map":[77],"(3D-CCM)":[78],"validated":[79],"various":[81],"metrics":[82],"ensure":[84],"superior":[85],"complexity":[86],"randomness.":[88],"Then,":[89],"an":[90],"efficient":[91],"dual-image":[92],"scheme":[94],"based":[95],"on":[96,101],"the":[97,102,110,139,156,159],"3D-CCM(DIES-CCM)":[98],"focuses":[100],"SRs":[103,113],"within":[104],"is":[107],"proposed.":[108],"In":[109],"phase,":[112],"from":[114],"two":[115],"undergo":[118],"1D":[119],"permutation,":[120],"cellular":[121,140],"automaton-based":[122,141],"public":[123,142],"encryption,":[125],"bidirectional":[127],"diffusion,":[128],"achieving":[129],"parallel":[130],"region-specific":[132],"significantly":[135],"improves":[136],"efficiency.":[137],"Additionally,":[138],"cryptosystem":[144],"ensures":[145],"secure":[146],"transmission":[148],"simplifies":[150],"Experimental":[153],"results":[154],"demonstrate":[155],"effectiveness":[157],"DIES-CCM":[160],"enhancing":[162],"protection":[164],"its":[166],"strong":[167],"resistance":[168],"cryptographic":[170],"attacks,":[171],"providing":[172],"practical":[174],"solution":[175],"safeguarding":[177],"information":[179],"ITS.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":7}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
