{"id":"https://openalex.org/W3133565686","doi":"https://doi.org/10.1109/access.2021.3063237","title":"A New Image Encryption Algorithm for Grey and Color Medical Images","display_name":"A New Image Encryption Algorithm for Grey and Color Medical Images","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3133565686","doi":"https://doi.org/10.1109/access.2021.3063237","mag":"3133565686"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3063237","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3063237","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09366688.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09366688.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013880600","display_name":"Sara T. Kamal","orcid":"https://orcid.org/0000-0003-0915-8667"},"institutions":[{"id":"https://openalex.org/I91041137","display_name":"Assiut University","ror":"https://ror.org/01jaj8n65","country_code":"EG","type":"education","lineage":["https://openalex.org/I91041137"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Sara T. Kamal","raw_affiliation_strings":["Assiut University, Assiut, Egypt"],"affiliations":[{"raw_affiliation_string":"Assiut University, Assiut, Egypt","institution_ids":["https://openalex.org/I91041137"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074599271","display_name":"Khalid M. Hosny","orcid":"https://orcid.org/0000-0001-8065-8977"},"institutions":[{"id":"https://openalex.org/I192398990","display_name":"Zagazig University","ror":"https://ror.org/053g6we49","country_code":"EG","type":"education","lineage":["https://openalex.org/I192398990"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Khalid M. Hosny","raw_affiliation_strings":["Zagazig University, Zagazig, Egypt"],"affiliations":[{"raw_affiliation_string":"Zagazig University, Zagazig, Egypt","institution_ids":["https://openalex.org/I192398990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020979867","display_name":"T. M. El\u2010Gindy","orcid":"https://orcid.org/0000-0003-4933-2973"},"institutions":[{"id":"https://openalex.org/I91041137","display_name":"Assiut University","ror":"https://ror.org/01jaj8n65","country_code":"EG","type":"education","lineage":["https://openalex.org/I91041137"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Taha M. Elgindy","raw_affiliation_strings":["Assiut University, Assiut, Egypt"],"affiliations":[{"raw_affiliation_string":"Assiut University, Assiut, Egypt","institution_ids":["https://openalex.org/I91041137"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101473699","display_name":"Mohamed Darwish","orcid":"https://orcid.org/0000-0003-3256-8728"},"institutions":[{"id":"https://openalex.org/I91041137","display_name":"Assiut University","ror":"https://ror.org/01jaj8n65","country_code":"EG","type":"education","lineage":["https://openalex.org/I91041137"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Mohamed M. Darwish","raw_affiliation_strings":["Assiut University, Assiut, Egypt"],"affiliations":[{"raw_affiliation_string":"Assiut University, Assiut, Egypt","institution_ids":["https://openalex.org/I91041137"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068882573","display_name":"Mostafa M. Fouda","orcid":"https://orcid.org/0000-0003-1790-8640"},"institutions":[{"id":"https://openalex.org/I106969075","display_name":"Idaho State University","ror":"https://ror.org/0162z8b04","country_code":"US","type":"education","lineage":["https://openalex.org/I106969075"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa M. Fouda","raw_affiliation_strings":["Idaho State University, Pocatello, ID, USA"],"affiliations":[{"raw_affiliation_string":"Idaho State University, Pocatello, ID, USA","institution_ids":["https://openalex.org/I106969075"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5013880600"],"corresponding_institution_ids":["https://openalex.org/I91041137"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":17.9689,"has_fulltext":true,"cited_by_count":255,"citation_normalized_percentile":{"value":0.99547306,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"37855","last_page":"37865"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8837029337882996},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7225742340087891},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.6047404408454895},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45171478390693665},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.4398857355117798},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.4253227114677429},{"id":"https://openalex.org/keywords/link-encryption","display_name":"Link encryption","score":0.4212716221809387},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4162825644016266},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.366909384727478},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.32117384672164917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1426512598991394}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8837029337882996},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7225742340087891},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.6047404408454895},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45171478390693665},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4398857355117798},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.4253227114677429},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.4212716221809387},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4162825644016266},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.366909384727478},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.32117384672164917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1426512598991394}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2021.3063237","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3063237","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09366688.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:abb6a6497cde4207835f5e5f6614691e","is_oa":true,"landing_page_url":"https://doaj.org/article/abb6a6497cde4207835f5e5f6614691e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 37855-37865 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3063237","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3063237","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09366688.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3133565686.pdf","grobid_xml":"https://content.openalex.org/works/W3133565686.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W2257939694","https://openalex.org/W2529607158","https://openalex.org/W2576498569","https://openalex.org/W2607256305","https://openalex.org/W2743436145","https://openalex.org/W2746926486","https://openalex.org/W2760967785","https://openalex.org/W2767015783","https://openalex.org/W2786395579","https://openalex.org/W2789491851","https://openalex.org/W2792836087","https://openalex.org/W2898808960","https://openalex.org/W2900073629","https://openalex.org/W2903241858","https://openalex.org/W2904080995","https://openalex.org/W2912937820","https://openalex.org/W2924210827","https://openalex.org/W2951380443","https://openalex.org/W2972307409","https://openalex.org/W3002995625","https://openalex.org/W3016697736","https://openalex.org/W3025268656"],"related_works":["https://openalex.org/W3004922236","https://openalex.org/W4361852638","https://openalex.org/W4250199380","https://openalex.org/W4239572594","https://openalex.org/W2553675779","https://openalex.org/W2127067832","https://openalex.org/W2248547719","https://openalex.org/W4308992061","https://openalex.org/W2392000646","https://openalex.org/W2234517094"],"abstract_inverted_index":{"Recently,":[0],"diagnosing":[1],"diseases":[2],"using":[3,101,134],"medical":[4,55,84,130,172,194],"images":[5,10,28,56,131],"became":[6],"crucial.":[7],"As":[8],"these":[9,27],"are":[11,29,41,62],"transmitted":[12],"through":[13],"the":[14,24,49,63,97,119,187],"network,":[15],"they":[16],"need":[17],"a":[18,74,102,110,115,159],"high":[19],"level":[20,162],"of":[21,48,124,167],"protection.":[22],"If":[23],"data":[25],"in":[26,68,128,144,192],"liable":[30],"for":[31,44,53,78],"unauthorized":[32],"usage,":[33],"this":[34],"may":[35],"lead":[36],"to":[37,117],"severe":[38],"problems.":[39],"There":[40],"different":[42],"methods":[43,179,191],"securing":[45,54],"images.":[46,85,173,195],"One":[47],"most":[50],"efficient":[51],"techniques":[52],"is":[57,132,142,180],"encryption.":[58],"Confusion":[59],"and":[60,82,106,137,153,170],"diffusion":[61],"two":[64],"main":[65],"steps":[66],"used":[67],"encryption":[69,76,166,178,184,190],"algorithms.":[70],"This":[71],"paper":[72],"presents":[73],"new":[75,87],"algorithm":[77,185],"encrypting":[79,129,193],"both":[80,168],"grey":[81,169],"color":[83,171],"A":[86,174],"image":[88,93,98],"splitting":[89],"technique":[90],"based":[91],"on":[92],"blocks":[94,99],"introduced.":[95],"Then,":[96,109],"scrambled":[100,120],"zigzag":[103],"pattern,":[104],"rotation,":[105],"random":[107],"permutation.":[108],"chaotic":[111],"logistic":[112],"map":[113],"generates":[114],"key":[116],"diffuse":[118],"image.":[121],"The":[122,140,155,182],"efficiency":[123],"our":[125],"proposed":[126,183],"method":[127],"evaluated":[133],"security":[135,141,161],"analysis":[136],"time":[138],"complexity.":[139],"tested":[143],"entropy,":[145],"histogram":[146],"differential":[147],"attacks,":[148],"correlation":[149],"coefficient,":[150],"PSNR,":[151],"keyspace,":[152],"sensitivity.":[154],"achieved":[156],"results":[157],"show":[158],"high-performance":[160],"reached":[163],"by":[164],"successful":[165],"comparison":[175],"with":[176],"various":[177],"performed.":[181],"outperformed":[186],"recent":[188],"existing":[189]},"counts_by_year":[{"year":2026,"cited_by_count":15},{"year":2025,"cited_by_count":55},{"year":2024,"cited_by_count":72},{"year":2023,"cited_by_count":56},{"year":2022,"cited_by_count":49},{"year":2021,"cited_by_count":8}],"updated_date":"2026-04-03T22:45:19.894376","created_date":"2025-10-10T00:00:00"}
