{"id":"https://openalex.org/W4313270726","doi":"https://doi.org/10.1109/access.2022.3233321","title":"Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution","display_name":"Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution","publication_year":2022,"publication_date":"2022-12-29","ids":{"openalex":"https://openalex.org/W4313270726","doi":"https://doi.org/10.1109/access.2022.3233321"},"language":"en","primary_location":{"id":"doi:10.1109/access.2022.3233321","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3233321","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10003194.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10003194.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010167728","display_name":"Nawal Shaltout","orcid":"https://orcid.org/0000-0002-9510-1060"},"institutions":[{"id":"https://openalex.org/I159247623","display_name":"Mansoura University","ror":"https://ror.org/01k8vtd75","country_code":"EG","type":"education","lineage":["https://openalex.org/I159247623"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Nawal Shaltout","raw_affiliation_strings":["Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt","institution_ids":["https://openalex.org/I159247623"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051434121","display_name":"Ahmed A. Abd El\u2010Latif","orcid":"https://orcid.org/0000-0002-5068-2033"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]},{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Ahmed A.Abd El-Latif","raw_affiliation_strings":["EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia","Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom, Egypt"],"affiliations":[{"raw_affiliation_string":"EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]},{"raw_affiliation_string":"Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007859915","display_name":"Waleed Eladrosy","orcid":null},"institutions":[{"id":"https://openalex.org/I159247623","display_name":"Mansoura University","ror":"https://ror.org/01k8vtd75","country_code":"EG","type":"education","lineage":["https://openalex.org/I159247623"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Waleed M. El-Latif","raw_affiliation_strings":["Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt","institution_ids":["https://openalex.org/I159247623"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080087070","display_name":"Samir Elmougy","orcid":"https://orcid.org/0000-0002-0765-5355"},"institutions":[{"id":"https://openalex.org/I159247623","display_name":"Mansoura University","ror":"https://ror.org/01k8vtd75","country_code":"EG","type":"education","lineage":["https://openalex.org/I159247623"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Samir Elmougy","raw_affiliation_strings":["Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt","institution_ids":["https://openalex.org/I159247623"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5010167728"],"corresponding_institution_ids":["https://openalex.org/I159247623"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.7053,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71085393,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"11","issue":null,"first_page":"2303","last_page":"2317"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8341541290283203},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7482279539108276},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6564709544181824},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5915312767028809},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.530720591545105},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4197109043598175},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.41614261269569397},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4014238119125366},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3632592558860779},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3046349287033081},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22128957509994507}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8341541290283203},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7482279539108276},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6564709544181824},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5915312767028809},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.530720591545105},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4197109043598175},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.41614261269569397},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4014238119125366},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3632592558860779},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3046349287033081},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22128957509994507},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2022.3233321","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3233321","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10003194.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:83ceeb2523114e54b8ac2c7af6d34dfd","is_oa":true,"landing_page_url":"https://doaj.org/article/83ceeb2523114e54b8ac2c7af6d34dfd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 2303-2317 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2022.3233321","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2022.3233321","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10003194.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4313270726.pdf","grobid_xml":"https://content.openalex.org/works/W4313270726.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W2010006328","https://openalex.org/W2021498013","https://openalex.org/W2056105196","https://openalex.org/W2062086221","https://openalex.org/W2064795867","https://openalex.org/W2274123855","https://openalex.org/W2604322561","https://openalex.org/W2747030314","https://openalex.org/W2772503948","https://openalex.org/W2795305769","https://openalex.org/W2798806078","https://openalex.org/W2809225718","https://openalex.org/W2893794750","https://openalex.org/W2902044045","https://openalex.org/W2902876973","https://openalex.org/W2903661981","https://openalex.org/W2921034462","https://openalex.org/W2952974476","https://openalex.org/W2955548329","https://openalex.org/W2982113164","https://openalex.org/W2987242919","https://openalex.org/W3013068682","https://openalex.org/W3016931015","https://openalex.org/W3026266985","https://openalex.org/W3033181913","https://openalex.org/W3034481479","https://openalex.org/W3036595024","https://openalex.org/W3037826251","https://openalex.org/W3038868796","https://openalex.org/W3039501094","https://openalex.org/W3046088399","https://openalex.org/W3128030072","https://openalex.org/W3133218597","https://openalex.org/W3185289424","https://openalex.org/W4206070207","https://openalex.org/W4206570083","https://openalex.org/W4210355663","https://openalex.org/W4213124826"],"related_works":["https://openalex.org/W2167384606","https://openalex.org/W2012379293","https://openalex.org/W2189418772","https://openalex.org/W2042340048","https://openalex.org/W170957052","https://openalex.org/W3194244812","https://openalex.org/W2940359311","https://openalex.org/W3022075301","https://openalex.org/W2293021588","https://openalex.org/W4313473947"],"abstract_inverted_index":{"With":[0],"the":[1,41,54,61,111,125],"emergence":[2],"of":[3,11,20,45,63,115,131,139,143,147,156,161],"new":[4,36],"information":[5,137],"technology":[6],"fields":[7],"and":[8,17,34,43,50,74,83,100,113,149,164],"various":[9],"usages":[10],"internet":[12],"applications,":[13],"securing":[14],"massive":[15],"amounts":[16],"multiple":[18],"varieties":[19],"multimedia":[21,46],"data":[22,47],"has":[23],"become":[24],"a":[25,70,79,150],"significant":[26],"challenge.":[27],"Hence,":[28],"it":[29],"is":[30,106,172],"essential":[31],"to":[32,39,59,109],"investigate":[33],"develop":[35],"cryptographic":[37,65],"algorithms":[38],"ensure":[40],"protection":[42],"privacy":[44],"at":[48],"rest":[49],"during":[51],"transmission":[52],"through":[53],"communication":[55],"channel":[56],"while":[57,134],"attempting":[58],"overcome":[60],"limitations":[62],"traditional":[64],"methods.":[66],"This":[67],"paper":[68],"suggests":[69],"novel":[71],"image":[72,104,169],"encryption":[73,89],"decryption":[75],"technique":[76,127],"based":[77],"on":[78,93],"computational":[80],"genetic":[81],"approach":[82,117],"self-adaptive":[84],"chaotic":[85],"substitution.":[86],"The":[87,102,159],"proposed":[88,126],"method":[90,171],"depends":[91],"mainly":[92],"four":[94],"steps:":[95],"sequence":[96],"generation,":[97],"diffusion,":[98],"confusion,":[99],"optimization.":[101],"USC-SIPI":[103],"dataset":[105],"being":[107],"utilized":[108],"prove":[110],"correctness":[112],"effectiveness":[114],"our":[116,168],"in":[118,154],"defending":[119],"against":[120],"different":[121],"attack":[122],"types.":[123],"Furthermore,":[124],"could":[128],"be":[129],"capable":[130],"withstanding":[132],"attacks":[133],"achieving":[135],"an":[136],"entropy":[138],"7.":[140],"999,":[141],"Number":[142],"Pixel":[144],"Change":[145,153],"Rate":[146],"99.62%,":[148],"Unified":[151],"Average":[152],"Intensity":[155],"33.54%,":[157],"respectively.":[158],"results":[160],"security":[162,170,178],"testing":[163],"analysis":[165],"revealed":[166],"that":[167],"strongly":[173],"recommended":[174],"for":[175],"modern":[176],"communications":[177],"applications.":[179]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
