{"id":"https://openalex.org/W3000117283","doi":"https://doi.org/10.1109/access.2020.2966264","title":"Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz","display_name":"Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3000117283","doi":"https://doi.org/10.1109/access.2020.2966264","mag":"3000117283"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2966264","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2966264","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08957545.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08957545.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102008970","display_name":"Tao Li","orcid":"https://orcid.org/0000-0003-4564-5753"},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Li","raw_affiliation_strings":["Electronic Engineering College, Heilongjiang University, Harbin, China","Electronic Engineering College, Heilongjiang University, Harbin 150080, China"],"affiliations":[{"raw_affiliation_string":"Electronic Engineering College, Heilongjiang University, Harbin, China","institution_ids":["https://openalex.org/I55022517"]},{"raw_affiliation_string":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China","institution_ids":["https://openalex.org/I55022517"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105841445","display_name":"Baoxiang Du","orcid":"https://orcid.org/0000-0001-6300-5907"},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baoxiang Du","raw_affiliation_strings":["Electronic Engineering College, Heilongjiang University, Harbin, China","Electronic Engineering College, Heilongjiang University, Harbin 150080, China"],"affiliations":[{"raw_affiliation_string":"Electronic Engineering College, Heilongjiang University, Harbin, China","institution_ids":["https://openalex.org/I55022517"]},{"raw_affiliation_string":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China","institution_ids":["https://openalex.org/I55022517"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101776009","display_name":"Xiaowen Liang","orcid":"https://orcid.org/0000-0003-1376-6251"},"institutions":[{"id":"https://openalex.org/I55022517","display_name":"Heilongjiang University","ror":"https://ror.org/04zyhq975","country_code":"CN","type":"education","lineage":["https://openalex.org/I55022517"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaowen Liang","raw_affiliation_strings":["Electronic Engineering College, Heilongjiang University, Harbin, China","Electronic Engineering College, Heilongjiang University, Harbin 150080, China"],"affiliations":[{"raw_affiliation_string":"Electronic Engineering College, Heilongjiang University, Harbin, China","institution_ids":["https://openalex.org/I55022517"]},{"raw_affiliation_string":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China","institution_ids":["https://openalex.org/I55022517"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5105841445"],"corresponding_institution_ids":["https://openalex.org/I55022517"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":5.7642,"has_fulltext":true,"cited_by_count":78,"citation_normalized_percentile":{"value":0.97013847,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"13792","last_page":"13805"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9395999908447266,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8453481197357178},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.7439315915107727},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.6913978457450867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6370400190353394},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.5892478823661804},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.586696982383728},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.5335679054260254},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.48906785249710083},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.44225209951400757},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4218369722366333},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37222951650619507},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3183719515800476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22753503918647766},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21286922693252563}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8453481197357178},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.7439315915107727},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.6913978457450867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6370400190353394},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.5892478823661804},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.586696982383728},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.5335679054260254},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.48906785249710083},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.44225209951400757},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4218369722366333},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37222951650619507},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3183719515800476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22753503918647766},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21286922693252563}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2966264","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2966264","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08957545.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ba27aa59f0bd46959b29309d1954e131","is_oa":true,"landing_page_url":"https://doaj.org/article/ba27aa59f0bd46959b29309d1954e131","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 13792-13805 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2966264","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2966264","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08957545.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3000117283.pdf","grobid_xml":"https://content.openalex.org/works/W3000117283.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1787484557","https://openalex.org/W2010065947","https://openalex.org/W2010620862","https://openalex.org/W2012379293","https://openalex.org/W2013503531","https://openalex.org/W2030573814","https://openalex.org/W2066705753","https://openalex.org/W2073059321","https://openalex.org/W2102151192","https://openalex.org/W2129847479","https://openalex.org/W2171285933","https://openalex.org/W2185903905","https://openalex.org/W2195922142","https://openalex.org/W2347090988","https://openalex.org/W2554661066","https://openalex.org/W2556501516","https://openalex.org/W2747030314","https://openalex.org/W2748321167","https://openalex.org/W2767797770","https://openalex.org/W2784049843","https://openalex.org/W2790033804","https://openalex.org/W2790533449","https://openalex.org/W2791035318","https://openalex.org/W2800685942","https://openalex.org/W2888893909","https://openalex.org/W2890831669","https://openalex.org/W2891021314","https://openalex.org/W2897061137","https://openalex.org/W2897664099","https://openalex.org/W2901082204","https://openalex.org/W2904006810","https://openalex.org/W2904536104","https://openalex.org/W2908587336","https://openalex.org/W2935804727","https://openalex.org/W2945665032","https://openalex.org/W2954129260","https://openalex.org/W2965629185","https://openalex.org/W2968550531","https://openalex.org/W2980764073"],"related_works":["https://openalex.org/W2389178160","https://openalex.org/W2355986883","https://openalex.org/W2545514196","https://openalex.org/W2184870945","https://openalex.org/W2144246620","https://openalex.org/W2564633714","https://openalex.org/W2994118162","https://openalex.org/W2391125300","https://openalex.org/W2357687494","https://openalex.org/W2027741953"],"abstract_inverted_index":{"In":[0,32,147],"recent":[1],"years,":[2],"experts":[3],"and":[4,56,72,144],"scholars":[5],"in":[6,117],"the":[7,17,37,67,79,88,112,126,130,139,149],"field":[8],"of":[9,19,40,61,81,87,92,95,132],"information":[10],"security":[11,18,38,71,80],"have":[12,23],"attached":[13],"great":[14],"importance":[15],"to":[16,34,138],"image":[20,26,41,49,113,123],"information.":[21],"They":[22],"proposed":[24,116],"many":[25],"encryption":[27,42,50,59,82,114,124,127,150],"algorithms":[28],"with":[29,120],"higher":[30],"security.":[31],"order":[33],"further":[35],"improve":[36],"level":[39],"algorithm,":[43],"this":[44,118],"paper":[45,76,119],"proposes":[46],"a":[47],"new":[48],"algorithm":[51,68,115,128,151],"based":[52],"on":[53],"two-dimensional":[54],"Lorenz":[55],"Logistic.":[57],"The":[58],"test":[60],"several":[62],"classic":[63],"images":[64],"proves":[65],"that":[66],"has":[69,129],"high":[70,145],"strong":[73],"robustness.":[74],"This":[75],"also":[77,156],"analyzes":[78],"algorithms,":[83,125],"such":[84],"as":[85],"analysis":[86],"histogram,":[89],"entropy":[90],"process":[91],"information,":[93],"examination":[94],"correlation,":[96],"differential":[97],"attack,":[98],"key":[99,103,135],"sensitivity":[100,137],"test,":[101],"secret":[102,134],"space":[104],"analysis,":[105],"noise":[106,158],"attacks,":[107],"contrast":[108],"analysis.":[109],"By":[110],"comparing":[111],"some":[121],"existing":[122],"characteristics":[131],"large":[133],"space,":[136],"key,":[140],"small":[141],"correlation":[142],"coefficient":[143],"contrast.":[146],"addition,":[148],"is":[152],"used.":[153],"It":[154],"can":[155],"resist":[157],"attacks.":[159]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":24},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
