{"id":"https://openalex.org/W3001107281","doi":"https://doi.org/10.1109/cisp-bmei48845.2019.8965778","title":"Research on an Image High Intensive Encryption Way Based on the Chaos Theory and DNA Coding","display_name":"Research on an Image High Intensive Encryption Way Based on the Chaos Theory and DNA Coding","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3001107281","doi":"https://doi.org/10.1109/cisp-bmei48845.2019.8965778","mag":"3001107281"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei48845.2019.8965778","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei48845.2019.8965778","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051425092","display_name":"Kaishi Li","orcid":null},"institutions":[{"id":"https://openalex.org/I75689368","display_name":"Communication University of China","ror":"https://ror.org/04facbs33","country_code":"CN","type":"education","lineage":["https://openalex.org/I75689368"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaishi Li","raw_affiliation_strings":["School of Information and Communication Engineering Communication, University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering Communication, University of China, Beijing, China","institution_ids":["https://openalex.org/I75689368"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043938197","display_name":"Zhen Su","orcid":"https://orcid.org/0000-0002-1585-8187"},"institutions":[{"id":"https://openalex.org/I75689368","display_name":"Communication University of China","ror":"https://ror.org/04facbs33","country_code":"CN","type":"education","lineage":["https://openalex.org/I75689368"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Su","raw_affiliation_strings":["School of Information and Communication Engineering Communication, University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering Communication, University of China, Beijing, China","institution_ids":["https://openalex.org/I75689368"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051425092"],"corresponding_institution_ids":["https://openalex.org/I75689368"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16778213,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"377","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7749448418617249},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6107457280158997},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.5155994296073914},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4945239722728729},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.4851175546646118},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4597475826740265},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4551345109939575},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4375176727771759},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.43443647027015686},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.43362587690353394},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22771593928337097}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7749448418617249},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6107457280158997},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.5155994296073914},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4945239722728729},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.4851175546646118},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4597475826740265},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4551345109939575},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4375176727771759},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.43443647027015686},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.43362587690353394},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22771593928337097},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei48845.2019.8965778","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei48845.2019.8965778","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 12th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2377754149"],"related_works":["https://openalex.org/W3174629658","https://openalex.org/W3056927252","https://openalex.org/W3170657892","https://openalex.org/W3084222268","https://openalex.org/W2082589311","https://openalex.org/W2901178628","https://openalex.org/W3122039345","https://openalex.org/W3155884576","https://openalex.org/W2987884598","https://openalex.org/W2927481576","https://openalex.org/W3203862647","https://openalex.org/W2980947500","https://openalex.org/W3081655872","https://openalex.org/W2988882060","https://openalex.org/W2887477933","https://openalex.org/W3020750635","https://openalex.org/W2886734157","https://openalex.org/W2942701275","https://openalex.org/W3128030072","https://openalex.org/W1134248015"],"abstract_inverted_index":{"With":[0],"the":[1,24,35,73,81,103,133,145,154,163,168,173,177,180,183,205,216,224],"development":[2],"of":[3,9,84,113,116,123,137,188,226],"Internet":[4],"information":[5,194],"technology,":[6],"reliable":[7],"transmission":[8],"multimedia":[10],"data":[11,26],"such":[12],"as":[13],"images":[14],"and":[15,20,52,55,70,80,106,109,120,129,132,144,159,191,199,222,232],"videos":[16],"is":[17,63,99,149,220],"becoming":[18],"more":[19,21],"important.":[22],"For":[23],"traditional":[25],"encryption":[27,45,184,218],"technology":[28],"can":[29,212],"not":[30],"be":[31,213],"effectively":[32],"used":[33,100,150],"in":[34,142],"current":[36],"image":[37,44,62,86,118,217],"encryption,":[38],"this":[39],"paper":[40,181],"proposes":[41],"a":[42,60],"color":[43,61],"algorithm":[46],"based":[47],"on":[48,162],"two":[49],"hyperchaotic":[50,97],"systems":[51],"DNA":[53,104,110,127,134],"coding":[54],"studies":[56],"its":[57],"performance.":[58,235],"Firstly,":[59],"divided":[64],"into":[65,89],"three":[66],"channels:":[67],"R,":[68,189],"G,":[69],"B.":[71],"Then,":[72],"random":[74,92,124],"matrix":[75,83],"generated":[76,94],"by":[77,95,186],"Logistic":[78,146],"mapping":[79],"three-channel":[82],"plaintext":[85,117],"are":[87,140],"partitioned":[88],"blocks.":[90],"The":[91,126],"sequence":[93,155],"Chen":[96],"system":[98,148],"to":[101,151,156,171],"determine":[102],"encoding":[105,128],"decoding":[107,130],"mode":[108,112,131,136],"operation":[111,135],"each":[114,121,138],"channel":[115],"RGB":[119],"sub-block":[122,139],"matrix.":[125],"performed":[141],"parallel":[143],"chaotic":[147],"map":[152],"out":[153],"perform":[157],"row":[158],"column":[160],"replacement":[161],"ciphertext":[164],"image.":[165,175],"Finally":[166],"merge":[167],"encrypted":[169,174],"sub-blocks":[170],"get":[172],"At":[176],"same":[178],"time,":[179],"analyzes":[182],"effect":[185,219],"histograms":[187],"G":[190],"B":[192],"channels,":[193],"entropy,":[195],"adjacent":[196],"pixel":[197],"correlation":[198],"key":[200,230],"sensitivity":[201],"simulation.":[202],"By":[203],"comparing":[204],"simulation":[206],"results":[207],"with":[208],"other":[209],"algorithms,":[210],"it":[211],"concluded":[214],"that":[215],"objective":[221],"has":[223],"characteristics":[225],"high":[227],"security,":[228],"large":[229],"space":[231],"strong":[233],"anti-attack":[234]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
