{"id":"https://openalex.org/W4392449528","doi":"https://doi.org/10.1109/access.2024.3374218","title":"A New 12-Bit Chaotic Image Encryption Scheme Using a 12 \u00d7 12 Dynamic S-Box","display_name":"A New 12-Bit Chaotic Image Encryption Scheme Using a 12 \u00d7 12 Dynamic S-Box","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4392449528","doi":"https://doi.org/10.1109/access.2024.3374218"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3374218","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3374218","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10460526.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10460526.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044827655","display_name":"Saleh Ibrahim","orcid":"https://orcid.org/0000-0002-7135-9366"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]},{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]}],"countries":["EG","SA"],"is_corresponding":true,"raw_author_name":"Saleh Ibrahim","raw_affiliation_strings":["Department of Electrical Engineering, College of Engineering, Taif University, Taif, Saudi Arabia","Department of computer engineering, faculty of engineering, Cairo university, Giza, Egypt","Department of electrical engineering, college of engineering, Taif university, p.o. box 11099, Taif, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-7135-9366","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, College of Engineering, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]},{"raw_affiliation_string":"Department of computer engineering, faculty of engineering, Cairo university, Giza, Egypt","institution_ids":["https://openalex.org/I145487455"]},{"raw_affiliation_string":"Department of electrical engineering, college of engineering, Taif university, p.o. box 11099, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088865393","display_name":"Alaa M. Abbas","orcid":"https://orcid.org/0000-0003-0929-161X"},"institutions":[{"id":"https://openalex.org/I179331831","display_name":"Taif University","ror":"https://ror.org/014g1a453","country_code":"SA","type":"education","lineage":["https://openalex.org/I179331831"]},{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG","SA"],"is_corresponding":false,"raw_author_name":"Alaa M. Abbas","raw_affiliation_strings":["Department of Electrical Engineering, College of Engineering, Taif University, Taif, Saudi Arabia","Department of electrical engineering, college of engineering, Taif university, p.o. box 11099, Taif, Saudi Arabia","Department of electronics and electrical communications, faculty of electronic engineering, Menouf university, Menouf, Egypt"],"raw_orcid":"https://orcid.org/0000-0003-0929-161X","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, College of Engineering, Taif University, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]},{"raw_affiliation_string":"Department of electrical engineering, college of engineering, Taif university, p.o. box 11099, Taif, Saudi Arabia","institution_ids":["https://openalex.org/I179331831"]},{"raw_affiliation_string":"Department of electronics and electrical communications, faculty of electronic engineering, Menouf university, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102917924","display_name":"Ayman Alharbi","orcid":"https://orcid.org/0000-0002-5995-5771"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ayman A. Alharbi","raw_affiliation_strings":["Department of Computer Engineering, College of Computers and Information Systems, Umm Al-Qura University, Makkah, Saudi Arabia","Department of computer engineering, college of computers and information systems, umm al-qura university, Makkah, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-5995-5771","affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computers and Information Systems, Umm Al-Qura University, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]},{"raw_affiliation_string":"Department of computer engineering, college of computers and information systems, umm al-qura university, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039377037","display_name":"Marwan Ali Albahar","orcid":"https://orcid.org/0000-0003-3586-3423"},"institutions":[{"id":"https://openalex.org/I199693650","display_name":"Umm al-Qura University","ror":"https://ror.org/01xjqrm90","country_code":"SA","type":"education","lineage":["https://openalex.org/I199693650"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Marwan Ali Albahar","raw_affiliation_strings":["Department of Computer Science, College of Computer Science, Umm Al-Qura University, Makkah, Saudi Arabia","Department of computer science, college of computer science, umm al-qura university, Makkah, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0003-3586-3423","affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Computer Science, Umm Al-Qura University, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]},{"raw_affiliation_string":"Department of computer science, college of computer science, umm al-qura university, Makkah, Saudi Arabia","institution_ids":["https://openalex.org/I199693650"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5044827655"],"corresponding_institution_ids":["https://openalex.org/I145487455","https://openalex.org/I179331831"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.9598,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.92015269,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"37631","last_page":"37642"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7865051031112671},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7115679383277893},{"id":"https://openalex.org/keywords/s-box","display_name":"S-box","score":0.6890687942504883},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5612941980361938},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5562493801116943},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5439462661743164},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.49197933077812195},{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.4806610345840454},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.47169259190559387},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34833747148513794},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33869779109954834},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.24060708284378052},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2203158736228943},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1981414258480072},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15592479705810547},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.14637359976768494}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7865051031112671},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7115679383277893},{"id":"https://openalex.org/C45737032","wikidata":"https://www.wikidata.org/wiki/Q748364","display_name":"S-box","level":4,"score":0.6890687942504883},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5612941980361938},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5562493801116943},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5439462661743164},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.49197933077812195},{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.4806610345840454},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.47169259190559387},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34833747148513794},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33869779109954834},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.24060708284378052},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2203158736228943},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1981414258480072},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15592479705810547},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.14637359976768494},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3374218","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3374218","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10460526.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:43995834edb3498a9c650bc240ed6352","is_oa":true,"landing_page_url":"https://doaj.org/article/43995834edb3498a9c650bc240ed6352","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 37631-37642 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3374218","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3374218","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10460526.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4392449528.pdf","grobid_xml":"https://content.openalex.org/works/W4392449528.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W1562740620","https://openalex.org/W1992478301","https://openalex.org/W2128718974","https://openalex.org/W2425286230","https://openalex.org/W2558390409","https://openalex.org/W2574136921","https://openalex.org/W2607400578","https://openalex.org/W2735932337","https://openalex.org/W2743436145","https://openalex.org/W2760967785","https://openalex.org/W2924210827","https://openalex.org/W2972948178","https://openalex.org/W2980350017","https://openalex.org/W2981730353","https://openalex.org/W2997069489","https://openalex.org/W3003734798","https://openalex.org/W3020481428","https://openalex.org/W3028957377","https://openalex.org/W3041996169","https://openalex.org/W3081530559","https://openalex.org/W3085059903","https://openalex.org/W3093657066","https://openalex.org/W3094970337","https://openalex.org/W3114521268","https://openalex.org/W3122415221","https://openalex.org/W3147815246","https://openalex.org/W3156749721","https://openalex.org/W3159986193","https://openalex.org/W4205489843","https://openalex.org/W4206898960","https://openalex.org/W4210322702","https://openalex.org/W4220856367","https://openalex.org/W4221090089","https://openalex.org/W4285211411","https://openalex.org/W4377043110","https://openalex.org/W6717539790"],"related_works":["https://openalex.org/W2954599081","https://openalex.org/W2776913024","https://openalex.org/W2989815216","https://openalex.org/W2349647033","https://openalex.org/W2290993309","https://openalex.org/W3194519548","https://openalex.org/W4388441189","https://openalex.org/W4212913304","https://openalex.org/W2997069489","https://openalex.org/W2989206541"],"abstract_inverted_index":{"The":[0,62],"use":[1],"of":[2,5,57,64,84,167],"12-bit":[3,41,59,116,139],"levels":[4],"grayscale":[6],"in":[7,78],"medical":[8,60,173],"image":[9,15,33,174],"representation":[10],"allows":[11],"for":[12,25],"more":[13],"precise":[14],"analysis":[16],"and":[17,19,29,82,100,164],"diagnosis,":[18],"encrypting":[20,58],"such":[21],"images":[22,117,140],"is":[23,68],"essential":[24],"protecting":[26],"patient":[27],"privacy":[28],"security.":[30],"Existing":[31],"8-bit":[32,157],"encryption":[34,51,86,175],"schemes":[35],"become":[36],"inefficient":[37],"when":[38],"applied":[39],"to":[40,53,114,144,154],"images.":[42,61,158],"In":[43],"this":[44],"paper,":[45],"we":[46],"design":[47],"a":[48,69,75],"cryptographically":[49],"strong":[50],"scheme":[52,67,113,136,149,170],"improve":[54],"the":[55,65,80,85,109,134,147,162,168],"efficiency":[56,83,165],"core":[63],"proposed":[66,110,135,148,169],"key-dependent":[70],"12\u00d712":[71,94,111],"S-box,":[72],"which":[73],"plays":[74],"crucial":[76],"role":[77],"enhancing":[79],"security":[81,128,163],"scheme.":[87],"Most":[88],"notably,":[89],"test":[90],"results":[91,131,160],"show":[92,132],"that":[93,133],"S-boxes":[95],"offer":[96],"significantly":[97],"stronger":[98],"confusion":[99],"key-sensitivity":[101],"than":[102,121],"their":[103],"8\u00d78":[104,123],"counterparts.":[105],"This":[106],"finding":[107],"enables":[108],"S-box-based":[112],"process":[115],"3.3":[118],"times":[119],"faster":[120],"an":[122],"S-box":[124],"while":[125],"passing":[126],"all":[127],"tests.":[129],"Experimental":[130],"can":[137],"encrypt":[138],"at":[141],"speeds":[142],"up":[143],"300MB/s.":[145],"Moreover,":[146],"has":[150],"also":[151],"been":[152],"shown":[153],"efficiently":[155],"handle":[156],"Comparative":[159],"highlight":[161],"advantages":[166],"over":[171],"existing":[172],"schemes.":[176]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":3}],"updated_date":"2026-05-14T08:36:36.166977","created_date":"2024-03-06T00:00:00"}
