{"id":"https://openalex.org/W2885711533","doi":"https://doi.org/10.1080/17445760.2018.1510929","title":"A robust image-based cryptology scheme based on cellular nonlinear network and local image descriptors","display_name":"A robust image-based cryptology scheme based on cellular nonlinear network and local image descriptors","publication_year":2018,"publication_date":"2018-09-01","ids":{"openalex":"https://openalex.org/W2885711533","doi":"https://doi.org/10.1080/17445760.2018.1510929","mag":"2885711533"},"language":"en","primary_location":{"id":"doi:10.1080/17445760.2018.1510929","is_oa":false,"landing_page_url":"https://doi.org/10.1080/17445760.2018.1510929","pdf_url":null,"source":{"id":"https://openalex.org/S85375271","display_name":"International Journal of Parallel Emergent and Distributed Systems","issn_l":"1744-5760","issn":["1744-5760","1744-5779"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Parallel, Emergent and Distributed Systems","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1808.03702","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mohammad Mahdi Dehshibi","orcid":"https://orcid.org/0000-0001-8112-5419"},"institutions":[{"id":"https://openalex.org/I155419210","display_name":"Islamic Azad University, Science and Research Branch","ror":"https://ror.org/03187yj51","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I155419210"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Mahdi Dehshibi","raw_affiliation_strings":["Department of Computer Engineering, Faculty of Computer and Electrical Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Faculty of Computer and Electrical Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran","institution_ids":["https://openalex.org/I155419210"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jamshid Shanbehzadeh","orcid":null},"institutions":[{"id":"https://openalex.org/I181744264","display_name":"Kharazmi University","ror":"https://ror.org/05hsgex59","country_code":"IR","type":"education","lineage":["https://openalex.org/I181744264"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Jamshid Shanbehzadeh","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Faculty of Engineering, Kharazmi University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Faculty of Engineering, Kharazmi University, Tehran, Iran","institution_ids":["https://openalex.org/I181744264"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mir Mohsen Pedram","orcid":null},"institutions":[{"id":"https://openalex.org/I181744264","display_name":"Kharazmi University","ror":"https://ror.org/05hsgex59","country_code":"IR","type":"education","lineage":["https://openalex.org/I181744264"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mir Mohsen Pedram","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Faculty of Engineering, Kharazmi University, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Faculty of Engineering, Kharazmi University, Tehran, Iran","institution_ids":["https://openalex.org/I181744264"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I181744264"],"apc_list":null,"apc_paid":null,"fwci":0.2137,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.557983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"35","issue":"5","first_page":"514","last_page":"534"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.5097000002861023,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.5097000002861023,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11347","display_name":"Neural Networks Stability and Synchronization","score":0.1923999935388565,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.1809999942779541,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cellular-automaton","display_name":"Cellular automaton","score":0.6639000177383423},{"id":"https://openalex.org/keywords/cellular-neural-network","display_name":"Cellular neural network","score":0.6503999829292297},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5943999886512756},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5200999975204468},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5048999786376953},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4943000078201294},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48240000009536743},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.45419999957084656},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.43619999289512634}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8083000183105469},{"id":"https://openalex.org/C35527583","wikidata":"https://www.wikidata.org/wiki/Q189156","display_name":"Cellular automaton","level":2,"score":0.6639000177383423},{"id":"https://openalex.org/C812465","wikidata":"https://www.wikidata.org/wiki/Q5058375","display_name":"Cellular neural network","level":3,"score":0.6503999829292297},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5943999886512756},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5200999975204468},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5048999786376953},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4984000027179718},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4943000078201294},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48240000009536743},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.45419999957084656},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.43619999289512634},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.41499999165534973},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4120999872684479},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.40560001134872437},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.3903000056743622},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34689998626708984},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3465999960899353},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.34619998931884766},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3418999910354614},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3294999897480011},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.32519999146461487},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.3165000081062317},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.30709999799728394},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.3046000003814697},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.27239999175071716},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C2983793180","wikidata":"https://www.wikidata.org/wiki/Q166314","display_name":"Chaotic map","level":3,"score":0.26100000739097595},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.25270000100135803}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1080/17445760.2018.1510929","is_oa":false,"landing_page_url":"https://doi.org/10.1080/17445760.2018.1510929","pdf_url":null,"source":{"id":"https://openalex.org/S85375271","display_name":"International Journal of Parallel Emergent and Distributed Systems","issn_l":"1744-5760","issn":["1744-5760","1744-5779"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Parallel, Emergent and Distributed Systems","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1808.03702","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1808.03702","pdf_url":"https://arxiv.org/pdf/1808.03702","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1808.03702","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1808.03702","pdf_url":"https://arxiv.org/pdf/1808.03702","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1500657154","https://openalex.org/W1640628807","https://openalex.org/W1787504841","https://openalex.org/W1966917092","https://openalex.org/W1978868455","https://openalex.org/W1982471090","https://openalex.org/W1984185638","https://openalex.org/W1987177841","https://openalex.org/W2010620862","https://openalex.org/W2013069555","https://openalex.org/W2013503531","https://openalex.org/W2016359567","https://openalex.org/W2019409703","https://openalex.org/W2020039621","https://openalex.org/W2025266594","https://openalex.org/W2027036558","https://openalex.org/W2028197392","https://openalex.org/W2031029123","https://openalex.org/W2035332689","https://openalex.org/W2041560266","https://openalex.org/W2051800924","https://openalex.org/W2055713607","https://openalex.org/W2058358215","https://openalex.org/W2063215317","https://openalex.org/W2086515950","https://openalex.org/W2087092764","https://openalex.org/W2088694610","https://openalex.org/W2092886131","https://openalex.org/W2094780448","https://openalex.org/W2102166818","https://openalex.org/W2105145864","https://openalex.org/W2107465879","https://openalex.org/W2112139527","https://openalex.org/W2115605660","https://openalex.org/W2119605622","https://openalex.org/W2123849779","https://openalex.org/W2129332069","https://openalex.org/W2147141800","https://openalex.org/W2148514738","https://openalex.org/W2151103935","https://openalex.org/W2152834677","https://openalex.org/W2153936398","https://openalex.org/W2177274842","https://openalex.org/W2218458479","https://openalex.org/W2245893443","https://openalex.org/W2247254865","https://openalex.org/W2332610686","https://openalex.org/W2344041610","https://openalex.org/W2522253541","https://openalex.org/W2524981363","https://openalex.org/W2620664631","https://openalex.org/W4238907724"],"related_works":[],"abstract_inverted_index":{"Cellular":[0],"nonlinear":[1],"network":[2],"(CNN)":[3],"provides":[4],"an":[5,14,18],"infrastructure":[6],"for":[7,121],"cellular":[8],"automata":[9],"to":[10,64,75,94,98,116,136],"have":[11,39],"not":[12],"only":[13],"initial":[15],"state":[16],"but":[17],"input":[19],"which":[20,37,58],"has":[21,34],"a":[22,44,52,59,66,89,107,111,118,138],"local":[23],"memory":[24],"in":[25,42,57,81,158],"each":[26],"cell":[27],"with":[28],"much":[29],"more":[30],"complexity.":[31],"This":[32,48],"property":[33],"many":[35],"applications":[36],"we":[38],"investigated":[40],"it":[41],"proposing":[43],"robust":[45],"cryptology":[46,156],"scheme.":[47],"scheme":[49,157],"consists":[50],"of":[51,72,153,160],"cryptography":[53],"and":[54,78,128,163],"steganography":[55],"sub-module":[56],"3D":[60,112],"CNN":[61,113,132],"is":[62,92,114,133],"designed":[63],"produce":[65],"chaotic":[67,119],"map":[68,120],"as":[69],"the":[70,73,95,100,125,130,151,154],"kernel":[71],"system":[74],"preserve":[76],"confidentiality":[77],"data":[79],"integrity":[80],"cryptology.":[82],"Our":[83],"contributions":[84],"are":[85],"three-fold":[86],"including":[87],"(1)":[88],"feature":[90],"descriptor":[91],"applied":[93],"cover":[96],"image":[97],"form":[99],"secret":[101],"key":[102],"while":[103],"conventional":[104],"methods":[105],"use":[106],"predefined":[108],"key,":[109],"(2)":[110],"used":[115,135],"make":[117,137],"making":[122],"cipher":[123],"from":[124],"visual":[126],"message,":[127],"(3)":[129],"proposed":[131,155],"also":[134],"dynamic":[139],"k-least":[140],"significant":[141],"bit":[142],"steganography.":[143],"Conducted":[144],"experiments":[145],"on":[146],"25":[147],"standard":[148],"images":[149],"prove":[150],"effectiveness":[152],"terms":[159],"security,":[161],"visual,":[162],"complexity":[164],"analysis.":[165]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2018-08-22T00:00:00"}
