{"id":"https://openalex.org/W4312710080","doi":"https://doi.org/10.1109/access.2022.3223355","title":"Chaos Based Encryption Technique for Compressed H264/AVC Videos","display_name":"Chaos Based Encryption Technique for Compressed H264/AVC Videos","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4312710080","doi":"https://doi.org/10.1109/access.2022.3223355"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3223355","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3223355","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09955541.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09955541.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045877564","display_name":"M. A. El-Mowafy","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156128","display_name":"Electronics Research Institute","ror":"https://ror.org/0532wcf75","country_code":"EG","type":"facility","lineage":["https://openalex.org/I4210094263","https://openalex.org/I4210156128"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"M. A. El-Mowafy","raw_affiliation_strings":["Electronics Research Institute, Cairo, Egypt","ORCiD"],"affiliations":[{"raw_affiliation_string":"Electronics Research Institute, Cairo, Egypt","institution_ids":["https://openalex.org/I4210156128"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074886803","display_name":"Sawsan Morkos Gharghory","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156128","display_name":"Electronics Research Institute","ror":"https://ror.org/0532wcf75","country_code":"EG","type":"facility","lineage":["https://openalex.org/I4210094263","https://openalex.org/I4210156128"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"S. M. Gharghory","raw_affiliation_strings":["Electronics Research Institute, Cairo, Egypt","ORCiD"],"affiliations":[{"raw_affiliation_string":"Electronics Research Institute, Cairo, Egypt","institution_ids":["https://openalex.org/I4210156128"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112796891","display_name":"M.A. Abo-Elsoud","orcid":null},"institutions":[{"id":"https://openalex.org/I159247623","display_name":"Mansoura University","ror":"https://ror.org/01k8vtd75","country_code":"EG","type":"education","lineage":["https://openalex.org/I159247623"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"M. A. Abo-Elsoud","raw_affiliation_strings":["Department of Communications and Electronics, Mansoura University, Mansoura, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Communications and Electronics, Mansoura University, Mansoura, Egypt","institution_ids":["https://openalex.org/I159247623"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010863688","display_name":"Marwa Obayya","orcid":"https://orcid.org/0000-0003-3099-9567"},"institutions":[{"id":"https://openalex.org/I159247623","display_name":"Mansoura University","ror":"https://ror.org/01k8vtd75","country_code":"EG","type":"education","lineage":["https://openalex.org/I159247623"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"M. Obayya","raw_affiliation_strings":["Department of Communications and Electronics, Mansoura University, Mansoura, Egypt","ORCiD"],"affiliations":[{"raw_affiliation_string":"Department of Communications and Electronics, Mansoura University, Mansoura, Egypt","institution_ids":["https://openalex.org/I159247623"]},{"raw_affiliation_string":"ORCiD","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004931311","display_name":"M. I. Fath Allah","orcid":"https://orcid.org/0000-0002-2582-0908"},"institutions":[{"id":"https://openalex.org/I4210120363","display_name":"Higher Institute of Engineering","ror":"https://ror.org/02pyw9g57","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210120363"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"M. I. Fath Allah","raw_affiliation_strings":["Department of Communications and Electronics, Delta Higher Institute for Engineering and Technology, Talkha, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Communications and Electronics, Delta Higher Institute for Engineering and Technology, Talkha, Egypt","institution_ids":["https://openalex.org/I4210120363"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5045877564"],"corresponding_institution_ids":["https://openalex.org/I4210156128"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.43,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.8318073,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"10","issue":null,"first_page":"124002","last_page":"124016"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.858989953994751},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.765740156173706},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6058192849159241},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4703429341316223},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.45881423354148865},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4587024450302124},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.4310033917427063},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41561299562454224},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.35516268014907837},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29666978120803833},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.26256975531578064},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24286770820617676},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.15515482425689697}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.858989953994751},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.765740156173706},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6058192849159241},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4703429341316223},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.45881423354148865},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4587024450302124},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.4310033917427063},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41561299562454224},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.35516268014907837},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29666978120803833},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.26256975531578064},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24286770820617676},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.15515482425689697}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3223355","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3223355","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09955541.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8930c7124ba0492e962a50f5ca845d38","is_oa":true,"landing_page_url":"https://doaj.org/article/8930c7124ba0492e962a50f5ca845d38","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 10, Pp 124002-124016 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3223355","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3223355","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/09955541.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6899999976158142,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4312710080.pdf","grobid_xml":"https://content.openalex.org/works/W4312710080.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W94110017","https://openalex.org/W1983642991","https://openalex.org/W2036714741","https://openalex.org/W2050724426","https://openalex.org/W2111282197","https://openalex.org/W2309654581","https://openalex.org/W2344891549","https://openalex.org/W2505094182","https://openalex.org/W2555818964","https://openalex.org/W2725522151","https://openalex.org/W2745701080","https://openalex.org/W2789018543","https://openalex.org/W2900394486","https://openalex.org/W2919024212","https://openalex.org/W2919234133","https://openalex.org/W2945163637","https://openalex.org/W2969708644","https://openalex.org/W2982684954","https://openalex.org/W3002912544","https://openalex.org/W3005410028","https://openalex.org/W3023530077","https://openalex.org/W3037686054","https://openalex.org/W3049617384","https://openalex.org/W3086888578","https://openalex.org/W3131599470","https://openalex.org/W3131633731","https://openalex.org/W3137867917","https://openalex.org/W3193466441","https://openalex.org/W4206678625","https://openalex.org/W4225668582","https://openalex.org/W4239208109","https://openalex.org/W4240186163","https://openalex.org/W4285193079","https://openalex.org/W6703703100","https://openalex.org/W6821432289"],"related_works":["https://openalex.org/W2521839693","https://openalex.org/W2969135852","https://openalex.org/W2188948172","https://openalex.org/W38533693","https://openalex.org/W2892069487","https://openalex.org/W2741842698","https://openalex.org/W2376048186","https://openalex.org/W2588780717","https://openalex.org/W2732488017","https://openalex.org/W2891774131"],"abstract_inverted_index":{"Saving":[0],"videos":[1,80,97],"streaming":[2],"from":[3,85],"the":[4,15,25,29,58,99,119,140,181,194],"unlawful":[5],"users":[6],"became":[7],"an":[8,41],"urgent":[9],"claim.":[10],"Cryptography":[11],"and":[12,18,23,48,81,145,211],"Steganography":[13],"are":[14,104,157,184],"most":[16],"important":[17],"indispensable":[19],"processes":[20],"to":[21,39,125,191,202,206],"protect":[22],"embed":[24],"multimedia":[26,46],"data":[27],"during":[28],"transfer":[30],"or":[31],"storage":[32],"process.":[33],"Chaotic-based":[34],"cryptography":[35,146],"has":[36,49,109,135],"been":[37,110,136],"proposed":[38,93,155,182],"be":[40,126,203],"efficient":[42],"encryption":[43,73,115],"technique":[44],"for":[45,76,95,151,214],"applications":[47],"played":[50],"a":[51,62,68,164],"vital":[52],"role":[53],"in":[54,79,217],"information":[55],"security.":[56],"While":[57],"chaotic":[59,149],"maps":[60,121,150],"have":[61,200],"long":[63],"history":[64],"of":[65,142,163,166,180,209],"researching":[66],"as":[67],"nonlinear":[69],"dynamic":[70],"system,":[71],"visual":[72],"is":[74,212],"useful":[75],"concealing":[77],"messages":[78],"safeguarding":[82],"private":[83],"content":[84],"unauthorized":[86],"intrusion.":[87],"In":[88],"this":[89],"paper,":[90],"two":[91],"new":[92],"algorithms":[94,156,183],"compressed":[96],"by":[98,112,138],"advanced":[100],"H.264/AVC":[101],"video":[102,114,152,169],"coding":[103],"presented.":[105],"First":[106],"algorithm":[107,116,133],"approach":[108,134],"implemented":[111,137],"robust":[113],"based":[117,147],"on":[118,148,159],"chaos":[120],"with":[122,171,193],"random":[123],"key":[124],"tested":[127],"under":[128],"different":[129,167,172],"attacks.":[130],"The":[131,154,177,197],"second":[132],"using":[139,174,186,216],"hybrid":[141],"both":[143],"steganography":[144],"frames.":[153],"conducted":[158],"luminance":[160],"component":[161],"Y":[162],"set":[165],"YUV":[168],"sequences":[170],"resolution":[173],"MATLAB":[175],"software.":[176],"simulation":[178],"results":[179],"evaluated":[185],"various":[187],"performance":[188],"metrics":[189],"comparing":[190],"that":[192],"state-of-art":[195],"techniques.":[196],"suggested":[198],"approaches":[199],"shown":[201],"more":[204],"resistant":[205],"many":[207],"sorts":[208],"attacks":[210],"recommended":[213],"future":[215],"real-time":[218],"applications.":[219]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":7}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
