{"id":"https://openalex.org/W2111250283","doi":"https://doi.org/10.1109/cec.2010.5586463","title":"A bio-inspired image encryption algorithm based on chaotic maps","display_name":"A bio-inspired image encryption algorithm based on chaotic maps","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2111250283","doi":"https://doi.org/10.1109/cec.2010.5586463","mag":"2111250283"},"language":"en","primary_location":{"id":"doi:10.1109/cec.2010.5586463","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cec.2010.5586463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Congress on Evolutionary Computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067154136","display_name":"Khaled A. Al-Utaibi","orcid":"https://orcid.org/0000-0002-3965-5018"},"institutions":[{"id":"https://openalex.org/I4210088963","display_name":"University of Ha'il","ror":"https://ror.org/013w98a82","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210088963"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Khaled A. Al-Utaibi","raw_affiliation_strings":["Information and Computer Science Department, University of Hail, Hail, Saudi Arabia","Information and Computer Science Department, University of Ha'il, Hail, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information and Computer Science Department, University of Hail, Hail, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]},{"raw_affiliation_string":"Information and Computer Science Department, University of Ha'il, Hail, Saudi Arabia","institution_ids":["https://openalex.org/I4210088963"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057893924","display_name":"El-Sayed M. El-Alfy","orcid":"https://orcid.org/0000-0001-6279-9776"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"El-Sayed M. El-Alfy","raw_affiliation_strings":["College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]},{"raw_affiliation_string":"College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067154136"],"corresponding_institution_ids":["https://openalex.org/I4210088963"],"apc_list":null,"apc_paid":null,"fwci":0.3187,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.62135841,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"16","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.960099995136261,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9409999847412109,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8682148456573486},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.7687313556671143},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.6767102479934692},{"id":"https://openalex.org/keywords/crossover","display_name":"Crossover","score":0.6633378267288208},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6334983706474304},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6160321235656738},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.5928832292556763},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5852013826370239},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5653873085975647},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5311801433563232},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.41300103068351746},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35555481910705566},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.3326541781425476},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.32769015431404114}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8682148456573486},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.7687313556671143},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.6767102479934692},{"id":"https://openalex.org/C122507166","wikidata":"https://www.wikidata.org/wiki/Q628906","display_name":"Crossover","level":2,"score":0.6633378267288208},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6334983706474304},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6160321235656738},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.5928832292556763},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5852013826370239},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5653873085975647},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5311801433563232},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.41300103068351746},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35555481910705566},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.3326541781425476},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.32769015431404114},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cec.2010.5586463","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cec.2010.5586463","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Congress on Evolutionary Computation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322323","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1964609971","https://openalex.org/W2010620862","https://openalex.org/W2055713607","https://openalex.org/W2099398190","https://openalex.org/W2102174595","https://openalex.org/W2106175996","https://openalex.org/W2114936730","https://openalex.org/W2115515583","https://openalex.org/W2143831358","https://openalex.org/W2159307643","https://openalex.org/W2167090479","https://openalex.org/W2168980452","https://openalex.org/W2172119956","https://openalex.org/W6675090360"],"related_works":["https://openalex.org/W2347477706","https://openalex.org/W1943663474","https://openalex.org/W4299389082","https://openalex.org/W2306830238","https://openalex.org/W2110294633","https://openalex.org/W1829715381","https://openalex.org/W2102514425","https://openalex.org/W2962747841","https://openalex.org/W2014162767","https://openalex.org/W2366200780"],"abstract_inverted_index":{"Recently,":[0],"several":[1],"image":[2,46],"cryptographic":[3],"algorithms":[4,13],"based":[5,49],"on":[6,50],"chaotic":[7,23,51],"maps":[8,24,52],"have":[9],"been":[10],"proposed.":[11,54],"These":[12],"differ":[14],"in":[15,101],"various":[16],"aspects":[17],"such":[18],"as":[19,37],"the":[20,69,82,102,109],"type":[21],"of":[22,74,81,91],"used,":[25],"methods":[26],"used":[27],"for":[28,117],"confusion":[29],"and":[30,34,63,86,94,114],"diffusion,":[31],"key":[32,104],"size,":[33],"manipulating":[35],"images":[36,77,119],"2D":[38],"or":[39],"3D.":[40],"In":[41],"this":[42],"paper,":[43],"a":[44],"new":[45],"encryption":[47],"algorithm":[48,56,71,111],"is":[53,57,72,95],"The":[55],"inspired":[58],"by":[59],"two":[60,121],"bio-operations:":[61],"crossover":[62],"mutation.":[64],"Experimental":[65],"results":[66],"show":[67],"that":[68],"proposed":[70,110],"capable":[73],"generating":[75],"encrypted":[76,118],"with":[78,120],"uniform":[79],"distribution":[80],"gray":[83],"scale":[84],"values":[85],"very":[87,96],"low":[88],"correlation":[89,115],"coefficients":[90,116],"adjacent":[92],"pixels,":[93],"sensitive":[97],"to":[98],"any":[99],"change":[100],"secret":[103],"values.":[105],"We":[106],"also":[107],"compared":[108],"run":[112],"time":[113],"other":[122],"approaches.":[123]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
