{"id":"https://openalex.org/W4416337040","doi":"https://doi.org/10.1007/s44443-025-00272-3","title":"Multiple face encryption based on non-adjacent coupled map lattice and improved YOLOv8 algorithm","display_name":"Multiple face encryption based on non-adjacent coupled map lattice and improved YOLOv8 algorithm","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W4416337040","doi":"https://doi.org/10.1007/s44443-025-00272-3"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00272-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00272-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00272-3.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00272-3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100318457","display_name":"Wei Li","orcid":"https://orcid.org/0000-0003-4589-2711"},"institutions":[{"id":"https://openalex.org/I4210095818","display_name":"Qinzhou Maternity and Child Health Care Hospital","ror":"https://ror.org/00kfae706","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210095818"]},{"id":"https://openalex.org/I4210164246","display_name":"First Hospital of Qinhuangdao","ror":"https://ror.org/05pmkqv04","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210164246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Li","raw_affiliation_strings":["Medical Equipment and Computer Services Center, Qinhuangdao Maternity and Child Health Hospital, Qinhuangdao, 066000, China"],"affiliations":[{"raw_affiliation_string":"Medical Equipment and Computer Services Center, Qinhuangdao Maternity and Child Health Hospital, Qinhuangdao, 066000, China","institution_ids":["https://openalex.org/I4210095818","https://openalex.org/I4210164246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053091022","display_name":"Lingling Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210159152","display_name":"Tongling University","ror":"https://ror.org/04kqvjg13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210159152"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lingling Lu","raw_affiliation_strings":["Department of Practical Teaching Management, Tongling University, Tongling, 244000, China"],"affiliations":[{"raw_affiliation_string":"Department of Practical Teaching Management, Tongling University, Tongling, 244000, China","institution_ids":["https://openalex.org/I4210159152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102921230","display_name":"Yu Yang","orcid":"https://orcid.org/0000-0002-0604-048X"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Yu","raw_affiliation_strings":["School of Information Science and Engineering, Yanshan University, Qinhuangdao, 066004, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, 066004, China","institution_ids":["https://openalex.org/I39333907"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101947229","display_name":"Chengye Zou","orcid":"https://orcid.org/0000-0002-3373-5180"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengye Zou","raw_affiliation_strings":["School of Information Science and Engineering, Yanshan University, Qinhuangdao, 066004, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, 066004, China","institution_ids":["https://openalex.org/I39333907"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037955677","display_name":"Yunong Liu","orcid":"https://orcid.org/0009-0003-9197-6657"},"institutions":[{"id":"https://openalex.org/I39333907","display_name":"Yanshan University","ror":"https://ror.org/02txfnf15","country_code":"CN","type":"education","lineage":["https://openalex.org/I39333907"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunong Liu","raw_affiliation_strings":["School of Information Science and Engineering, Yanshan University, Qinhuangdao, 066004, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yanshan University, Qinhuangdao, 066004, China","institution_ids":["https://openalex.org/I39333907"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053091022"],"corresponding_institution_ids":["https://openalex.org/I4210159152"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37009,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"10","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.40299999713897705,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11448","display_name":"Face recognition and analysis","score":0.40299999713897705,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.17679999768733978,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.11309999972581863,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.722599983215332},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7064999938011169},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.5321000218391418},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.4927000105381012},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4787999987602234},{"id":"https://openalex.org/keywords/resist","display_name":"Resist","score":0.3788999915122986}],"concepts":[{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.722599983215332},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7161999940872192},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7064999938011169},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5931000113487244},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.5321000218391418},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.4927000105381012},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4787999987602234},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.41130000352859497},{"id":"https://openalex.org/C53524968","wikidata":"https://www.wikidata.org/wiki/Q7315582","display_name":"Resist","level":3,"score":0.3788999915122986},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3668999969959259},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3594000041484833},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.3495999872684479},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.34769999980926514},{"id":"https://openalex.org/C4641261","wikidata":"https://www.wikidata.org/wiki/Q11681085","display_name":"Face detection","level":4,"score":0.3384000062942505},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3131999969482422},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.30219998955726624},{"id":"https://openalex.org/C39630112","wikidata":"https://www.wikidata.org/wiki/Q5178018","display_name":"Coupled map lattice","level":5,"score":0.26829999685287476},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2612999975681305}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00272-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00272-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00272-3.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ae84b0517cfa406ab10dec3222717191","is_oa":true,"landing_page_url":"https://doaj.org/article/ae84b0517cfa406ab10dec3222717191","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 37, Iss 10, Pp 1-24 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00272-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00272-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s44443-025-00272-3.pdf","source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416337040.pdf","grobid_xml":"https://content.openalex.org/works/W4416337040.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W1530653297","https://openalex.org/W2020039621","https://openalex.org/W2058358215","https://openalex.org/W2105145864","https://openalex.org/W2239443241","https://openalex.org/W2318171290","https://openalex.org/W2739818049","https://openalex.org/W2908273099","https://openalex.org/W2917426586","https://openalex.org/W2922504910","https://openalex.org/W2963566548","https://openalex.org/W2970447871","https://openalex.org/W3034971973","https://openalex.org/W3036812293","https://openalex.org/W3042803509","https://openalex.org/W3043241920","https://openalex.org/W3046316429","https://openalex.org/W3048971533","https://openalex.org/W3108739619","https://openalex.org/W3121772643","https://openalex.org/W3127393100","https://openalex.org/W3131701911","https://openalex.org/W3133397640","https://openalex.org/W3134100751","https://openalex.org/W3137414551","https://openalex.org/W3139411438","https://openalex.org/W3148532360","https://openalex.org/W3151949888","https://openalex.org/W3153833593","https://openalex.org/W3156484751","https://openalex.org/W3194790201","https://openalex.org/W4290958908","https://openalex.org/W4307270720","https://openalex.org/W4318465030","https://openalex.org/W4319297871","https://openalex.org/W4323338688","https://openalex.org/W4372347372","https://openalex.org/W4387261692","https://openalex.org/W4391507935","https://openalex.org/W4396758501","https://openalex.org/W4399027252","https://openalex.org/W4400110111","https://openalex.org/W4401321540","https://openalex.org/W4402754006","https://openalex.org/W4403071747","https://openalex.org/W4403557599","https://openalex.org/W4403770406","https://openalex.org/W4404136086","https://openalex.org/W4404710207","https://openalex.org/W4404785313","https://openalex.org/W4407304478","https://openalex.org/W4407948341","https://openalex.org/W4408699641","https://openalex.org/W4409698409","https://openalex.org/W4411863145","https://openalex.org/W4411865836","https://openalex.org/W4412905837","https://openalex.org/W4415795831"],"related_works":[],"abstract_inverted_index":{"With":[0],"increasing":[1],"concerns":[2],"over":[3],"privacy":[4],"protection,":[5],"existing":[6],"methods":[7],"face":[8,31,75,150],"significant":[9],"challenges":[10],"in":[11,109,149],"securing":[12],"images":[13],"containing":[14],"multiple":[15,81],"faces.":[16],"This":[17],"paper":[18],"addresses":[19],"this":[20],"issue":[21],"by":[22],"proposing":[23],"a":[24,34,86,92,114,143],"multiple-face":[25],"encryption":[26,36],"framework":[27],"that":[28,130],"integrates":[29],"precise":[30],"localization":[32],"with":[33],"robust":[35],"scheme.":[37],"For":[38,84],"localization,":[39],"an":[40],"enhanced":[41],"YOLOv8":[42],"model":[43],"is":[44,98,118],"developed,":[45],"where":[46],"the":[47,54,62,102,105,131],"EMA":[48],"attention":[49],"mechanism":[50,117],"captures":[51],"fine-grained":[52],"features,":[53],"BiFPN":[55],"module":[56],"enables":[57],"efficient":[58],"multi-scale":[59],"fusion,":[60],"and":[61],"WIoU":[63],"loss":[64],"reduces":[65],"training":[66],"errors.":[67],"These":[68],"improvements":[69],"substantially":[70],"enhance":[71],"detection":[72],"performance":[73],"on":[74,91],"datasets,":[76],"ensuring":[77],"reliable":[78],"identification":[79],"of":[80,104],"facial":[82],"regions.":[83],"encryption,":[85],"novel":[87],"superposed":[88],"algorithm":[89],"based":[90],"non-adjacent":[93],"logistic-dynamic":[94],"coupled":[95],"map":[96,108],"lattice":[97],"introduced,":[99],"effectively":[100],"overcoming":[101],"limitations":[103],"Arnold":[106],"cat":[107],"handling":[110],"rectangular":[111],"images.":[112],"Moreover,":[113],"two-way":[115],"diffusion":[116],"incorporated":[119],"to":[120],"resist":[121],"chosen-plaintext":[122],"attacks,":[123,140],"thereby":[124],"enhancing":[125],"security.":[126],"Experimental":[127],"results":[128],"demonstrate":[129],"proposed":[132],"method":[133],"achieves":[134],"strong":[135],"robustness":[136],"against":[137],"various":[138],"cryptographic":[139],"while":[141],"providing":[142],"promising":[144],"direction":[145],"for":[146],"advancing":[147],"research":[148],"image":[151],"cryptography.":[152]},"counts_by_year":[],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-11-18T00:00:00"}
