{"id":"https://openalex.org/W7125591857","doi":"https://doi.org/10.1007/s44443-025-00448-x","title":"A multi-layer windmill image retention encryption algorithm based on composite sequences and DNA","display_name":"A multi-layer windmill image retention encryption algorithm based on composite sequences and DNA","publication_year":2026,"publication_date":"2026-01-24","ids":{"openalex":"https://openalex.org/W7125591857","doi":"https://doi.org/10.1007/s44443-025-00448-x"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-025-00448-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00448-x","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44443-025-00448-x","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123742115","display_name":"Ning Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Zhang","raw_affiliation_strings":["School of Electronic Engineering, Heilongjiang University, Harbin, 150080, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Heilongjiang University, Harbin, 150080, China","institution_ids":["https://openalex.org/I55022517"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104160390","display_name":"Mingxin Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingxin Fang","raw_affiliation_strings":["School of Electronic Engineering, Heilongjiang University, Harbin, 150080, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Heilongjiang University, Harbin, 150080, China","institution_ids":["https://openalex.org/I55022517"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123734232","display_name":"Bing Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bing Zhao","raw_affiliation_strings":["School of Electronic Engineering, Heilongjiang University, Harbin, 150080, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering, Heilongjiang University, Harbin, 150080, China","institution_ids":["https://openalex.org/I55022517"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5123734232"],"corresponding_institution_ids":["https://openalex.org/I55022517"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24734613,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T11261","display_name":"Quantum chaos and dynamical systems","score":0.0005000000237487257,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6851000189781189},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5895000100135803},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.5680999755859375},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5601999759674072},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.42149999737739563},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.41679999232292175},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3862999975681305},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.382099986076355},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.3617999851703644},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.3522999882698059}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6851000189781189},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6186000108718872},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5895000100135803},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.5680999755859375},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5601999759674072},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5335999727249146},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.42149999737739563},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.41679999232292175},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41260001063346863},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3862999975681305},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.382099986076355},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.3617999851703644},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.3522999882698059},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.34200000762939453},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.3386000096797943},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.3359000086784363},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.32679998874664307},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3206999897956848},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.31709998846054077},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.3102000057697296},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3012999892234802},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.2962999939918518},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28529998660087585},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.28519999980926514},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2759000062942505},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.2669999897480011},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2639000117778778},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.263700008392334},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.25600001215934753},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C18017163","wikidata":"https://www.wikidata.org/wiki/Q13560113","display_name":"Randomness tests","level":3,"score":0.25220000743865967},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25119999051094055},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-025-00448-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00448-x","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:eaae4e7014f348578cd05bd3a0ba737e","is_oa":true,"landing_page_url":"https://doaj.org/article/eaae4e7014f348578cd05bd3a0ba737e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 38, Iss 3 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-025-00448-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-025-00448-x","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1708571760","https://openalex.org/W1966092221","https://openalex.org/W2062086221","https://openalex.org/W2073251945","https://openalex.org/W2074268081","https://openalex.org/W2143565504","https://openalex.org/W2338129493","https://openalex.org/W2907236946","https://openalex.org/W2915449064","https://openalex.org/W2969137798","https://openalex.org/W2990908872","https://openalex.org/W3011797753","https://openalex.org/W3037758685","https://openalex.org/W3089176601","https://openalex.org/W3135903680","https://openalex.org/W3164011746","https://openalex.org/W3164271401","https://openalex.org/W4200429023","https://openalex.org/W4221140148","https://openalex.org/W4312196317","https://openalex.org/W4319302639","https://openalex.org/W4323361644","https://openalex.org/W4323570290","https://openalex.org/W4327521759","https://openalex.org/W4380486019","https://openalex.org/W4384525377","https://openalex.org/W4385583282","https://openalex.org/W4385834304","https://openalex.org/W4385840071","https://openalex.org/W4388461448","https://openalex.org/W4388468527","https://openalex.org/W4389152311","https://openalex.org/W4389226287","https://openalex.org/W4390496502","https://openalex.org/W4391535988","https://openalex.org/W4391966959","https://openalex.org/W4392564457","https://openalex.org/W4395063859","https://openalex.org/W4396671517","https://openalex.org/W4396733411","https://openalex.org/W4399052816","https://openalex.org/W4399557610","https://openalex.org/W4406668436","https://openalex.org/W4406675862","https://openalex.org/W4406690257","https://openalex.org/W4407029135","https://openalex.org/W4407396536","https://openalex.org/W4409566828","https://openalex.org/W4410301727","https://openalex.org/W4412108006","https://openalex.org/W4412592833"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,14,67,86],"widespread":[2],"application":[3],"of":[4,19,88],"multimedia":[5],"information":[6,128],"technology":[7],"in":[8,30,71],"cloud":[9],"storage":[10,18],"and":[11,17,48,94,132,138,150],"secure":[12,15],"communications,":[13],"transmission":[16],"digital":[20,31],"images":[21],"have":[22],"become":[23],"a":[24,36,98,123],"critical":[25],"challenge.To":[26],"address":[27],"security":[28,155],"challenges":[29],"images,":[32],"this":[33,120],"paper":[34],"proposes":[35],"multi-layer":[37,99],"windmill":[38],"image":[39,115],"encryption":[40],"scheme":[41,121],"integrating":[42,76],"multidimensional":[43],"chaos,":[44],"quantum-inspired":[45,58],"random":[46,59],"walk,":[47],"DNA":[49,78],"encoding.":[50],"This":[51],"approach":[52],"employs":[53],"chaotic":[54,73],"sequences":[55],"to":[56,106,135,157],"drive":[57],"walks":[60],"for":[61],"generating":[62],"composite":[63],"keys,":[64],"thereby":[65],"resolving":[66],"pseudo-randomness":[68],"trap":[69],"inherent":[70],"traditional":[72],"encryption.":[74],"By":[75],"multi-rule":[77],"encoding":[79],"with":[80],"mathematical":[81],"matrix":[82],"operations,":[83],"it":[84],"overcomes":[85],"limitations":[87],"single-base":[89],"pairing,":[90],"namely":[91],"insufficient":[92],"randomness":[93],"linearity":[95],"defects.":[96],"Furthermore,":[97],"windmill-style":[100],"error":[101],"correction":[102],"structure":[103],"is":[104],"designed":[105],"achieve":[107],"3/4":[108],"cropping":[109,151],"attack":[110],"resistance":[111],"while":[112],"enabling":[113],"effective":[114],"reconstruction.":[116],"Experiments":[117],"demonstrate":[118],"that":[119],"possesses":[122],"key":[124],"space":[125],"exceeding":[126],"225\u2076,":[127],"entropy":[129],"approaching":[130],"8,":[131],"high":[133],"sensitivity":[134],"both":[136],"plaintext":[137],"keys":[139],"(NPCR\u224899.60%,":[140],"UACI\u224833.46%).":[141],"It":[142],"effectively":[143],"resists":[144],"statistical":[145],"analysis,":[146],"differential":[147],"attacks,":[148,152],"noise,":[149],"exhibiting":[153],"superior":[154],"compared":[156],"mainstream":[158],"comparative":[159],"algorithms.":[160]},"counts_by_year":[],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2026-01-25T00:00:00"}
