{"id":"https://openalex.org/W4411599588","doi":"https://doi.org/10.1109/access.2025.3582705","title":"A Robust Image Encryption Scheme Based on Quantum Walks and Dynamic DNA for Secure Cloud Applications","display_name":"A Robust Image Encryption Scheme Based on Quantum Walks and Dynamic DNA for Secure Cloud Applications","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4411599588","doi":"https://doi.org/10.1109/access.2025.3582705"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3582705","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3582705","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3582705","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051434121","display_name":"Ahmed A. Abd El\u2010Latif","orcid":"https://orcid.org/0000-0002-5068-2033"},"institutions":[{"id":"https://openalex.org/I142024983","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26","country_code":"SA","type":"education","lineage":["https://openalex.org/I142024983"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Ahmed A. Abd El-Latif","raw_affiliation_strings":["EIAS Data Science Laboratory, College of Computer and Information Sciences, Center of Excellence in Quantum and Intelligent Computing, Prince Sultan University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"EIAS Data Science Laboratory, College of Computer and Information Sciences, Center of Excellence in Quantum and Intelligent Computing, Prince Sultan University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I142024983"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014776130","display_name":"May Almousa","orcid":"https://orcid.org/0000-0003-3695-081X"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"May Almousa","raw_affiliation_strings":["Information Technology Department, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information Technology Department, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082949070","display_name":"Bassem Abd-El-Atty","orcid":"https://orcid.org/0000-0003-4739-0037"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bassem Abd-El-Atty","raw_affiliation_strings":["Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor, Egypt"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor, Egypt","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051434121"],"corresponding_institution_ids":["https://openalex.org/I142024983"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.2784,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81112358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"13","issue":null,"first_page":"119110","last_page":"119130"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9750999808311462,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7167317867279053},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.647127091884613},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6414335370063782},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5620100498199463},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40586698055267334},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3440585136413574},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3235092759132385},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10917213559150696},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06767654418945312}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7167317867279053},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.647127091884613},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6414335370063782},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5620100498199463},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40586698055267334},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3440585136413574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3235092759132385},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10917213559150696},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06767654418945312},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3582705","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3582705","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:6c93d59eb53843e4a2039e016007fb16","is_oa":true,"landing_page_url":"https://doaj.org/article/6c93d59eb53843e4a2039e016007fb16","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 119110-119130 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3582705","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3582705","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.41999998688697815}],"awards":[{"id":"https://openalex.org/G4547520902","display_name":null,"funder_award_id":"13325-psu-2023-PSNU-R-3-1-EF","funder_id":"https://openalex.org/F4320334802","funder_display_name":"Adelaide Research and Innovation, University of Adelaide"}],"funders":[{"id":"https://openalex.org/F4320327702","display_name":"Prince Sultan University","ror":"https://ror.org/053mqrf26"},{"id":"https://openalex.org/F4320334802","display_name":"Adelaide Research and Innovation, University of Adelaide","ror":"https://ror.org/00892tw58"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2077767282","https://openalex.org/W2336401120","https://openalex.org/W2887477933","https://openalex.org/W2969916032","https://openalex.org/W2982113164","https://openalex.org/W3003971281","https://openalex.org/W3021781350","https://openalex.org/W3100114739","https://openalex.org/W3103876468","https://openalex.org/W3193654764","https://openalex.org/W3207164168","https://openalex.org/W4200058614","https://openalex.org/W4200429023","https://openalex.org/W4225709784","https://openalex.org/W4288068082","https://openalex.org/W4296350759","https://openalex.org/W4297235651","https://openalex.org/W4312748513","https://openalex.org/W4328126618","https://openalex.org/W4378473059","https://openalex.org/W4381327710","https://openalex.org/W4381734689","https://openalex.org/W4385758924","https://openalex.org/W4388767889","https://openalex.org/W4395447286","https://openalex.org/W4396600828","https://openalex.org/W4398977367","https://openalex.org/W4399728095","https://openalex.org/W4399728471","https://openalex.org/W4400234150","https://openalex.org/W4401047036","https://openalex.org/W4401634206","https://openalex.org/W4402258140","https://openalex.org/W4402582127","https://openalex.org/W4403602957","https://openalex.org/W4405046198","https://openalex.org/W4407304478","https://openalex.org/W4407891964"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W3150465815","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W2802581102","https://openalex.org/W4205786897"],"abstract_inverted_index":{"With":[0],"the":[1,8,75,82,96,104,110,115,123,127,135,139,147,153,157,162,184,194,202],"rapid":[2],"development":[3],"of":[4,10,117,126,156,230,234,237,240,244,248,251,255,263],"cloud-based":[5,221],"services,":[6],"ensuring":[7],"confidentiality":[9],"image":[11,51,107,164],"data":[12],"in":[13,22,35],"cloud":[14,36],"environments":[15],"has":[16],"become":[17,41],"increasingly":[18],"critical.":[19],"Furthermore,":[20],"advances":[21],"quantum":[23,57,118,136,148],"computing":[24],"pose":[25],"a":[26,49,59,232],"significant":[27],"threat":[28],"to":[29,43,67,74,94,108,160,192,212],"traditional":[30],"cryptosystems,":[31],"including":[32],"those":[33],"used":[34,93],"systems,":[37],"as":[38],"they":[39],"may":[40],"vulnerable":[42],"quantum-based":[44],"attacks.":[45],"This":[46],"paper":[47],"presents":[48],"robust":[50,210],"encryption":[52,79,207,261],"approach":[53,204],"based":[54],"on":[55],"integrating":[56],"walks,":[58],"4-D":[60],"hyperchaotic":[61,83,128,140,158],"system,":[62],"and":[63,138,170,178,187,209,259],"dynamic":[64,167,172],"DNA":[65,168,173],"operations":[66],"ensure":[68],"high":[69,206],"security.":[70,180],"To":[71],"enhance":[72],"sensitivity":[73],"plain":[76,97],"image,":[77],"our":[78],"algorithm":[80],"initializes":[81],"system":[84,159],"with":[85,152],"key":[86,253],"parameters,":[87],"generating":[88],"chaotic":[89,154],"sequences":[90,155],"that":[91,113,201],"are":[92,190],"substitute":[95],"image.":[98,197],"It":[99],"then":[100],"extracts":[101],"information":[102],"from":[103],"initially":[105],"substituted":[106],"update":[109],"binary":[111],"message":[112],"controls":[114],"operation":[116],"walks":[119,137,149],"while":[120],"simultaneously":[121],"updating":[122],"initial":[124],"parameters":[125,132],"system.":[129,141],"These":[130],"updated":[131],"operate":[133],"both":[134],"The":[142,223],"probability":[143],"distribution":[144],"generated":[145],"by":[146],"is":[150],"integrated":[151],"permutate":[161],"DNA-encoded":[163],"sequence,":[165],"perform":[166],"operations,":[169],"execute":[171],"decoding,":[174,183],"thereby":[175],"increasing":[176],"complexity":[177],"enhancing":[179],"Finally,":[181],"after":[182],"pixel":[185],"permutation":[186],"substitution":[188],"processes":[189],"applied":[191],"produce":[193],"final":[195],"cipher":[196],"Experimental":[198],"analysis":[199],"demonstrates":[200],"proposed":[203],"achieves":[205],"quality":[208],"resistance":[211],"cryptographic":[213],"attacks,":[214],"which":[215],"makes":[216],"it":[217],"suitable":[218],"for":[219],"secure":[220],"services.":[222],"results":[224],"show":[225],"an":[226,260],"average":[227],"correlation":[228],"coefficient":[229],"-0.00007,":[231],"Chi-square":[233],"254.26013,":[235],"NPCR":[236],"99.61238%,":[238],"UACI":[239],"33.45688%,":[241],"global":[242],"entropy":[243,247],"7.99954,":[245],"local":[246],"7.90219,":[249],"PSNR":[250],"7.8537,":[252],"space":[254],"10<sup":[256],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[257],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">240</sup>,":[258],"speed":[262],"0.1426":[264],"megabits":[265],"per":[266],"second.":[267]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
