{"id":"https://openalex.org/W2906108912","doi":"https://doi.org/10.1109/access.2018.2889323","title":"Research on Scene Understanding-Based Encrypted Image Retrieval Algorithm","display_name":"Research on Scene Understanding-Based Encrypted Image Retrieval Algorithm","publication_year":2018,"publication_date":"2018-12-24","ids":{"openalex":"https://openalex.org/W2906108912","doi":"https://doi.org/10.1109/access.2018.2889323","mag":"2906108912"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2889323","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2889323","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08586796.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08586796.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050116161","display_name":"Shuang Jia","orcid":"https://orcid.org/0000-0003-2374-2528"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuang Jia","raw_affiliation_strings":["Harbin Institute of Technology, Harbin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018662596","display_name":"Lin Ma","orcid":"https://orcid.org/0000-0003-1684-9714"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lin Ma","raw_affiliation_strings":["Harbin Institute of Technology, Harbin, China"],"raw_orcid":"https://orcid.org/0000-0003-1684-9714","affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064750853","display_name":"Danyang Qin","orcid":"https://orcid.org/0000-0001-5829-6121"},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Danyang Qin","raw_affiliation_strings":["Heilongjiang University, Harbin, China"],"raw_orcid":"https://orcid.org/0000-0001-5829-6121","affiliations":[{"raw_affiliation_string":"Heilongjiang University, Harbin, China","institution_ids":["https://openalex.org/I55022517"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050116161"],"corresponding_institution_ids":["https://openalex.org/I204983213"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.106,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.48836587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"7","issue":null,"first_page":"6587","last_page":"6596"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10824","display_name":"Image Retrieval and Classification Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7340095043182373},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6497381329536438},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5200417041778564},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5015854835510254},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4836324453353882},{"id":"https://openalex.org/keywords/image-retrieval","display_name":"Image retrieval","score":0.45717576146125793},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.33278393745422363},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3241890072822571},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09338241815567017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7340095043182373},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6497381329536438},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5200417041778564},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5015854835510254},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4836324453353882},{"id":"https://openalex.org/C1667742","wikidata":"https://www.wikidata.org/wiki/Q10927554","display_name":"Image retrieval","level":3,"score":0.45717576146125793},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.33278393745422363},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3241890072822571},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09338241815567017}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2889323","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2889323","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08586796.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:42fc99e42937413495e213e93a580533","is_oa":true,"landing_page_url":"https://doaj.org/article/42fc99e42937413495e213e93a580533","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 6587-6596 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2889323","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2889323","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08586796.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[{"id":"https://openalex.org/G1605306882","display_name":null,"funder_award_id":"61571162","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3559089671","display_name":null,"funder_award_id":"F2016019","funder_id":"https://openalex.org/F4320323085","funder_display_name":"Natural Science Foundation of Heilongjiang Province"},{"id":"https://openalex.org/G5080260485","display_name":null,"funder_award_id":"F2016019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G734387993","display_name":null,"funder_award_id":"MCM20170106","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8298470322","display_name":null,"funder_award_id":"UNPYSCT-2017125","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8627166697","display_name":null,"funder_award_id":"61771186","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323085","display_name":"Natural Science Foundation of Heilongjiang Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2906108912.pdf","grobid_xml":"https://content.openalex.org/works/W2906108912.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W2002748735","https://openalex.org/W2018398888","https://openalex.org/W2030922352","https://openalex.org/W2032194607","https://openalex.org/W2032820503","https://openalex.org/W2033635401","https://openalex.org/W2083066957","https://openalex.org/W2085261163","https://openalex.org/W2106198479","https://openalex.org/W2109839807","https://openalex.org/W2125574651","https://openalex.org/W2131791003","https://openalex.org/W2153404544","https://openalex.org/W2160550980","https://openalex.org/W2241882783","https://openalex.org/W2475121515","https://openalex.org/W2565851752","https://openalex.org/W2604466980","https://openalex.org/W2745647803","https://openalex.org/W2762479434","https://openalex.org/W2773533917","https://openalex.org/W2789886405","https://openalex.org/W2791414672","https://openalex.org/W2808467956","https://openalex.org/W2808503617","https://openalex.org/W2889366376","https://openalex.org/W2910790844","https://openalex.org/W3100675441","https://openalex.org/W4243493583","https://openalex.org/W6679655593","https://openalex.org/W6824780776","https://openalex.org/W7048444097"],"related_works":["https://openalex.org/W2375981391","https://openalex.org/W45120566","https://openalex.org/W1986902711","https://openalex.org/W2396760013","https://openalex.org/W2148433556","https://openalex.org/W2171776552","https://openalex.org/W2361408597","https://openalex.org/W98391849","https://openalex.org/W1600907701","https://openalex.org/W2726741344"],"abstract_inverted_index":{"Aiming":[0],"to":[1,51],"improve":[2,132],"the":[3,11,48,57,60,65,72,77,86,97,105,111,118,128,133,140],"precision":[4,134],"and":[5,7,46,71,76,110,123,138],"security,":[6],"reduce":[8],"complexity":[9],"of":[10,135,142],"encrypted":[12,19,99],"image":[13,20,34,38,62,78,101,107,113,136],"retrieval":[14,21,137],"algorithm,":[15,36,109],"a":[16],"scene":[17,50,79,87],"understanding-based":[18],"algorithm":[22,130],"is":[23,68,102,114],"proposed":[24,129],"in":[25,85],"this":[26],"paper,":[27],"which":[28],"encrypts":[29],"images":[30,84],"by":[31,64,91,104,117],"chaotic":[32],"system-based":[33],"encryption":[35],"extracts":[37],"features-based":[39],"on":[40],"two-dimensional":[41],"multi-scale":[42,73],"hidden":[43],"Markov":[44],"model,":[45],"classifies":[47],"indoor":[49],"establish":[52],"an":[53],"offline":[54],"database.":[55],"In":[56],"online":[58],"stage,":[59],"query":[61],"captured":[63],"smart":[66],"device":[67],"first":[69],"encrypted,":[70],"feature":[74],"extraction":[75],"matching":[80,100,108],"are":[81,88],"performed.":[82],"Then":[83],"matched":[89],"one":[90,92],"using":[93],"manifold":[94],"ranking.":[95],"Finally,":[96],"optimal":[98],"obtained":[103,116],"homography-based":[106],"plaintext":[112],"also":[115],"decryption":[119],"algorithm.":[120],"Performance":[121],"analysis":[122],"simulation":[124],"results":[125],"show":[126],"that":[127],"can":[131],"protect":[139],"security":[141],"users\u2019":[143],"privacy.":[144]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
