{"id":"https://openalex.org/W3025856485","doi":"https://doi.org/10.1109/access.2020.2994583","title":"Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications","display_name":"Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3025856485","doi":"https://doi.org/10.1109/access.2020.2994583","mag":"3025856485"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2994583","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2994583","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09093857.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09093857.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014295449","display_name":"Osama S. Faragallah","orcid":"https://orcid.org/0000-0003-1982-335X"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]},{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG","SA"],"is_corresponding":true,"raw_author_name":"Osama S. Faragallah","raw_affiliation_strings":["College of Computers and Information Technology, Taif University, Al-Hawiya, Saudi Arabia","Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"College of Computers and Information Technology, Taif University, Al-Hawiya, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]},{"raw_affiliation_string":"Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071259001","display_name":"Ashraf Afifi","orcid":"https://orcid.org/0000-0002-9366-4994"},"institutions":[{"id":"https://openalex.org/I160419504","display_name":"Higher Technological Institute","ror":"https://ror.org/051q8jk17","country_code":"EG","type":"education","lineage":["https://openalex.org/I160419504"]},{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Ashraf Afifi","raw_affiliation_strings":["College of Computers and Information Technology, Taif University, Al-Hawiya, Saudi Arabia","Higher Technological Institute, 10th of Ramadan, Egypt"],"affiliations":[{"raw_affiliation_string":"College of Computers and Information Technology, Taif University, Al-Hawiya, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]},{"raw_affiliation_string":"Higher Technological Institute, 10th of Ramadan, Egypt","institution_ids":["https://openalex.org/I160419504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006443274","display_name":"Walid El\u2010Shafai","orcid":"https://orcid.org/0000-0001-7509-2120"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Walid El-Shafai","raw_affiliation_strings":["Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067404637","display_name":"Hala S. El\u2010sayed","orcid":"https://orcid.org/0000-0002-2776-783X"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Hala S. El-Sayed","raw_affiliation_strings":["Faculty of Engineering, Menoufia University, Shebin El-Kom, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering, Menoufia University, Shebin El-Kom, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002473480","display_name":"Mohammed A. AlZain","orcid":"https://orcid.org/0000-0001-5595-4280"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed A. Alzain","raw_affiliation_strings":["College of Computers and Information Technology, Taif University, Al-Hawiya, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computers and Information Technology, Taif University, Al-Hawiya, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006526405","display_name":"Jehad F. Al\u2010Amri","orcid":"https://orcid.org/0000-0001-6758-5443"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Jehad F. Al-Amri","raw_affiliation_strings":["College of Computers and Information Technology, Taif University, Al-Hawiya, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computers and Information Technology, Taif University, Al-Hawiya, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080762590","display_name":"Fathi E. Abd El\u2010Samie","orcid":"https://orcid.org/0000-0001-8749-9518"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]},{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Fathi E. Abd El-Samie","raw_affiliation_strings":["College of Computer and Information Sciences, Princess NourahBint Abdulrahman University, Riyadh, Saudi Arabia","Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences, Princess NourahBint Abdulrahman University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]},{"raw_affiliation_string":"Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5014295449"],"corresponding_institution_ids":["https://openalex.org/I179331831","https://openalex.org/I63601056"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.7284,"has_fulltext":true,"cited_by_count":44,"citation_normalized_percentile":{"value":0.94504654,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"8","issue":null,"first_page":"103200","last_page":"103218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8270310163497925},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.778520405292511},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7619578838348389},{"id":"https://openalex.org/keywords/codebook","display_name":"Codebook","score":0.561732828617096},{"id":"https://openalex.org/keywords/block-cipher-mode-of-operation","display_name":"Block cipher mode of operation","score":0.5610980987548828},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5273590683937073},{"id":"https://openalex.org/keywords/rgb-color-model","display_name":"RGB color model","score":0.4466380178928375},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.43308961391448975},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.4199734032154083},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4121789038181305},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35529768466949463},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35157322883605957},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33311882615089417},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2517200708389282},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19377073645591736}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8270310163497925},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.778520405292511},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7619578838348389},{"id":"https://openalex.org/C127759330","wikidata":"https://www.wikidata.org/wiki/Q637416","display_name":"Codebook","level":2,"score":0.561732828617096},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.5610980987548828},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5273590683937073},{"id":"https://openalex.org/C82990744","wikidata":"https://www.wikidata.org/wiki/Q166194","display_name":"RGB color model","level":2,"score":0.4466380178928375},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.43308961391448975},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4199734032154083},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4121789038181305},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35529768466949463},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35157322883605957},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33311882615089417},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2517200708389282},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19377073645591736}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2994583","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2994583","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09093857.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bee2bec36d14470eac931da396187f28","is_oa":true,"landing_page_url":"https://doaj.org/article/bee2bec36d14470eac931da396187f28","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 103200-103218 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2994583","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2994583","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09093857.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4393481380","display_name":null,"funder_award_id":"Saudi Arabia","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"},{"id":"https://openalex.org/G8276131993","display_name":null,"funder_award_id":"1-439-6083","funder_id":"https://openalex.org/F4320323722","funder_display_name":"Taif University"}],"funders":[{"id":"https://openalex.org/F4320323722","display_name":"Taif University","ror":"https://ror.org/014g1a453"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3025856485.pdf","grobid_xml":"https://content.openalex.org/works/W3025856485.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W1706453177","https://openalex.org/W1976913157","https://openalex.org/W1977520231","https://openalex.org/W1982712329","https://openalex.org/W2023917641","https://openalex.org/W2058988619","https://openalex.org/W2065305112","https://openalex.org/W2065502301","https://openalex.org/W2126870044","https://openalex.org/W2177291055","https://openalex.org/W2317434586","https://openalex.org/W2318171290","https://openalex.org/W2547857037","https://openalex.org/W2766391863","https://openalex.org/W2783543293","https://openalex.org/W2790225553","https://openalex.org/W2811001982","https://openalex.org/W2876368481","https://openalex.org/W2888919094","https://openalex.org/W2889887095","https://openalex.org/W2895101672","https://openalex.org/W2895697904","https://openalex.org/W2905741893","https://openalex.org/W2908372611","https://openalex.org/W2918149988","https://openalex.org/W2930326836","https://openalex.org/W2938541128","https://openalex.org/W2944785541","https://openalex.org/W2951676679","https://openalex.org/W2952446293","https://openalex.org/W2965398406","https://openalex.org/W2967243140","https://openalex.org/W2971348745","https://openalex.org/W2979781733","https://openalex.org/W2981178906","https://openalex.org/W3003680203","https://openalex.org/W3028858340","https://openalex.org/W3168682951","https://openalex.org/W3187337342","https://openalex.org/W4249658326","https://openalex.org/W4285719527","https://openalex.org/W6771896390","https://openalex.org/W6778011241","https://openalex.org/W6799864793"],"related_works":["https://openalex.org/W4298706439","https://openalex.org/W2374306464","https://openalex.org/W4253338219","https://openalex.org/W2152042367","https://openalex.org/W2496164548","https://openalex.org/W3022296361","https://openalex.org/W2120129724","https://openalex.org/W2782133800","https://openalex.org/W2348979250","https://openalex.org/W3168414399"],"abstract_inverted_index":{"Recently,":[0],"massive":[1],"research":[2],"works":[3],"have":[4],"been":[5],"accomplished":[6],"for":[7,13,33,119],"augmenting":[8],"privacy":[9],"and":[10,36,69,165,172,230,242],"security":[11,28],"requirements":[12],"cybersecurity":[14],"applications":[15],"in":[16,88,128,185,213,233,236],"wireless":[17],"communication":[18],"networks.":[19],"This":[20,124],"is":[21,63,126,138,208],"attributed":[22],"to":[23],"the":[24,77,110,121,129,135,154,178,186,196,199,203,220,224,227],"fact":[25],"that":[26,153,202],"conventional":[27],"processes":[29],"are":[30,90,97,117],"not":[31,209],"appropriate":[32,104],"robust,":[34],"efficient,":[35],"reliable":[37],"multimedia":[38],"streaming":[39],"over":[40],"unsecure":[41],"media.":[42],"Therefore,":[43],"this":[44],"paper":[45],"presents":[46],"an":[47,103],"efficient":[48],"color":[49,78,179],"image":[50],"cryptosystem":[51,62,137,156,229],"based":[52],"on":[53],"RC6":[54,101],"with":[55,80,102,157,181,192],"different":[56],"modes":[57,169],"of":[58,65,106,114,134,145,177,188,217,226,238],"operation.":[59,107],"The":[60,71,132,149],"proposed":[61,136,155,228],"composed":[64],"two":[66],"phases:":[67],"encryption":[68,72,146,240],"decryption.":[70],"phase":[73],"starts":[74],"by":[75],"decomposing":[76],"plainimage":[79],"few":[81,182],"details":[82,183,216],"into":[83,92],"its":[84,231],"RGB":[85,115],"components,":[86],"which":[87],"turn,":[89],"segmented":[91],"128-bit":[93],"blocks.":[94],"These":[95],"blocks":[96,113,191],"then":[98],"enciphered":[99,112],"using":[100,142],"mode":[105,207],"After":[108],"that,":[109],"corresponding":[111],"components":[116],"multiplexed":[118],"constructing":[120],"final":[122],"cipherimage.":[123],"scenario":[125],"reversed":[127],"decryption":[130],"phase.":[131],"performance":[133],"gauged":[139],"via":[140],"simulation":[141,150],"a":[143],"set":[144],"quality":[147],"metrics.":[148],"results":[151,200,222],"reveal":[152],"cipher":[158,162],"block":[159],"chaining":[160],"(CBC),":[161],"feedback":[163,167],"(CFB),":[164],"output":[166],"(OFB)":[168],"can":[170],"efficiently":[171],"effectively":[173],"hide":[174],"all":[175,212,215],"information":[176],"images":[180,235],"even":[184],"presence":[187],"some":[189],"input":[190],"similar":[193],"data.":[194],"On":[195],"other":[197],"hand,":[198],"show":[201],"electronic":[204],"codebook":[205],"(ECB)":[206],"effective":[210],"at":[211],"hiding":[214],"images.":[218],"Finally,":[219],"obtained":[221],"ensure":[223],"applicability":[225],"efficiency":[232],"encrypting":[234],"terms":[237],"security,":[239],"quality,":[241],"noise":[243],"immunity.":[244]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":17}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
