{"id":"https://openalex.org/W2997484060","doi":"https://doi.org/10.1109/access.2019.2959031","title":"Deep Learning for Improving the Robustness of Image Encryption","display_name":"Deep Learning for Improving the Robustness of Image Encryption","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2997484060","doi":"https://doi.org/10.1109/access.2019.2959031","mag":"2997484060"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2959031","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2959031","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08931601.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08931601.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101426634","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0003-3745-6805"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Chen","raw_affiliation_strings":["School of Electronics and Information Engineering, Sichuan University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0003-3745-6805","affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101889938","display_name":"Xiaowei Li","orcid":"https://orcid.org/0000-0001-5277-5340"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao-Wei Li","raw_affiliation_strings":["School of Electronics and Information Engineering, Sichuan University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-5277-5340","affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering, Sichuan University, Chengdu, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":null,"display_name":"Qiong-Hua Wang","orcid":"https://orcid.org/0000-0003-0293-6550"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiong-Hua Wang","raw_affiliation_strings":["School of Instrumentation and Optoelectronic Engineering, Beihang University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-0293-6550","affiliations":[{"raw_affiliation_string":"School of Instrumentation and Optoelectronic Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101426634"],"corresponding_institution_ids":["https://openalex.org/I24185976","https://openalex.org/I24201400"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.837,"has_fulltext":true,"cited_by_count":55,"citation_normalized_percentile":{"value":0.88951391,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"7","issue":null,"first_page":"181083","last_page":"181091"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.8707128763198853},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8253346681594849},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.81904137134552},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.8143391609191895},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6156842112541199},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5686036348342896},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5441192388534546},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5207293033599854},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4262723922729492},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3431755602359772},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3420259952545166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09682866930961609}],"concepts":[{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.8707128763198853},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8253346681594849},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.81904137134552},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.8143391609191895},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6156842112541199},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5686036348342896},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5441192388534546},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5207293033599854},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4262723922729492},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3431755602359772},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3420259952545166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09682866930961609},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2019.2959031","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2959031","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08931601.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:324913257aee471a853f90ed471fd434","is_oa":true,"landing_page_url":"https://doaj.org/article/324913257aee471a853f90ed471fd434","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 181083-181091 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2959031","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2959031","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08931601.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3610578206","display_name":null,"funder_award_id":"61975138","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7497709266","display_name":null,"funder_award_id":"61705146","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2997484060.pdf","grobid_xml":"https://content.openalex.org/works/W2997484060.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W54257720","https://openalex.org/W1841681959","https://openalex.org/W1973567017","https://openalex.org/W1974911306","https://openalex.org/W1986811147","https://openalex.org/W2000699753","https://openalex.org/W2037642501","https://openalex.org/W2056370875","https://openalex.org/W2064706776","https://openalex.org/W2097073572","https://openalex.org/W2098288204","https://openalex.org/W2103559027","https://openalex.org/W2146360671","https://openalex.org/W2149323482","https://openalex.org/W2153663612","https://openalex.org/W2160248934","https://openalex.org/W2194775991","https://openalex.org/W2325932803","https://openalex.org/W2508457857","https://openalex.org/W2570307742","https://openalex.org/W2613155248","https://openalex.org/W2750706617","https://openalex.org/W2792930077","https://openalex.org/W2808750669","https://openalex.org/W2809954638","https://openalex.org/W2887571806","https://openalex.org/W2889658373","https://openalex.org/W2902237159","https://openalex.org/W2902386756","https://openalex.org/W2907856008","https://openalex.org/W2964125708","https://openalex.org/W2966518004","https://openalex.org/W6602211262","https://openalex.org/W6679991515","https://openalex.org/W6757155232"],"related_works":["https://openalex.org/W69312893","https://openalex.org/W2349686135","https://openalex.org/W84934912","https://openalex.org/W936781193","https://openalex.org/W2353936545","https://openalex.org/W2386594575","https://openalex.org/W4226493464","https://openalex.org/W3133861977","https://openalex.org/W2951211570","https://openalex.org/W3103566983"],"abstract_inverted_index":{"In":[0,24],"this":[1],"paper,":[2],"we":[3,40],"propose":[4],"a":[5,42,74,114],"method":[6,87,106],"to":[7,26,88],"increase":[8],"the":[9,17,28,50,58,61,65,68,84,90,94,97,111,125,134,144,147,156],"robustness":[10,59],"of":[11,52,60,67,93,100,113,155],"2D/3D":[12],"optical":[13],"image":[14,116,121],"encryption":[15,95,112,122],"using":[16],"dilated":[18],"deep":[19,53],"convolutional":[20],"neural":[21],"network":[22],"(CNN).":[23],"order":[25],"solve":[27],"problem":[29],"that":[30],"encrypted":[31],"images":[32],"suffer":[33],"from":[34],"some":[35],"attacks":[36],"in":[37,133],"practical":[38],"application,":[39],"utilize":[41],"fast":[43],"and":[44,79,143,153],"effective":[45],"CNN":[46,56,72],"denoiser":[47],"based":[48],"on":[49],"principle":[51],"learning.":[54],"The":[55,104],"improves":[57],"algorithm":[62],"by":[63,96,123],"improving":[64],"resolution":[66],"reconstructed":[69],"images.":[70],"Besides,":[71],"has":[73],"high":[75],"performance":[76],"against":[77],"blur":[78],"occlusion":[80],"attacks.":[81],"We":[82],"introduce":[83],"pixel":[85,101],"scrambling":[86,102],"enhance":[89],"security":[91,154],"level":[92],"private":[98],"key":[99],"operation.":[103],"proposed":[105,157],"can":[107],"not":[108],"only":[109],"realize":[110],"two-dimensional":[115],"but":[117],"also":[118],"implement":[119],"three-dimensional":[120],"combining":[124],"integral":[126],"imaging":[127],"technology.":[128],"Double":[129],"random":[130],"phase":[131],"encoding":[132],"fractional":[135],"Fourier":[136],"domain":[137],"is":[138],"selected":[139],"for":[140,149],"experimental":[141],"verification,":[142],"results":[145],"show":[146],"capability":[148],"robustness,":[150],"noise":[151],"immunity,":[152],"method.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
