{"id":"https://openalex.org/W4312096775","doi":"https://doi.org/10.1109/cisp-bmei56279.2022.9980116","title":"An image encryption method based on random number matrix iterations","display_name":"An image encryption method based on random number matrix iterations","publication_year":2022,"publication_date":"2022-11-05","ids":{"openalex":"https://openalex.org/W4312096775","doi":"https://doi.org/10.1109/cisp-bmei56279.2022.9980116"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei56279.2022.9980116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei56279.2022.9980116","pdf_url":null,"source":{"id":"https://openalex.org/S4363605502","display_name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101554323","display_name":"Jialiang Luo","orcid":"https://orcid.org/0000-0001-6626-4103"},"institutions":[{"id":"https://openalex.org/I4210092944","display_name":"Dalian University","ror":"https://ror.org/00g2ypp58","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092944"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jialiang Luo","raw_affiliation_strings":["College of Information Engineering, Dalian University,Dalian,China","College of Information Engineering, Dalian University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Dalian University,Dalian,China","institution_ids":["https://openalex.org/I4210092944"]},{"raw_affiliation_string":"College of Information Engineering, Dalian University, Dalian, China","institution_ids":["https://openalex.org/I4210092944"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103901893","display_name":"Wanbo Yu","orcid":"https://orcid.org/0009-0001-0961-0898"},"institutions":[{"id":"https://openalex.org/I4210092944","display_name":"Dalian University","ror":"https://ror.org/00g2ypp58","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092944"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanbo Yu","raw_affiliation_strings":["College of Information Engineering, Dalian University,Dalian,China","College of Information Engineering, Dalian University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Dalian University,Dalian,China","institution_ids":["https://openalex.org/I4210092944"]},{"raw_affiliation_string":"College of Information Engineering, Dalian University, Dalian, China","institution_ids":["https://openalex.org/I4210092944"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101554323"],"corresponding_institution_ids":["https://openalex.org/I4210092944"],"apc_list":null,"apc_paid":null,"fwci":0.3596,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.67824041,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9495999813079834,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9463000297546387,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7909632921218872},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6146020889282227},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.5766886472702026},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5193341970443726},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5134264230728149},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.49265581369400024},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.46257972717285156},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.43459486961364746},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.4161706566810608},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40996986627578735}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7909632921218872},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6146020889282227},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.5766886472702026},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5193341970443726},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5134264230728149},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.49265581369400024},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.46257972717285156},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.43459486961364746},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.4161706566810608},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40996986627578735},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei56279.2022.9980116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisp-bmei56279.2022.9980116","pdf_url":null,"source":{"id":"https://openalex.org/S4363605502","display_name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1985186426","https://openalex.org/W2071764857","https://openalex.org/W2076883303","https://openalex.org/W2281113892","https://openalex.org/W2334036084","https://openalex.org/W2394765920","https://openalex.org/W2410239325","https://openalex.org/W2586671481","https://openalex.org/W2610378265","https://openalex.org/W2760188900","https://openalex.org/W2799634971","https://openalex.org/W2826986305","https://openalex.org/W2891021314","https://openalex.org/W2902871491","https://openalex.org/W2905741893","https://openalex.org/W2921055665","https://openalex.org/W2946776843","https://openalex.org/W2955259290","https://openalex.org/W2969555319","https://openalex.org/W2976809303","https://openalex.org/W4280589721","https://openalex.org/W4283712986","https://openalex.org/W4285587171","https://openalex.org/W6695102171","https://openalex.org/W6712201148"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W4310649982","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W2011667854","https://openalex.org/W2802117553","https://openalex.org/W2098392677","https://openalex.org/W1589129854","https://openalex.org/W2939324531","https://openalex.org/W4294104609"],"abstract_inverted_index":{"There":[0],"is":[1,30,146,172],"a":[2,19,92,157,179,195],"demand":[3],"for":[4],"more":[5],"image":[6,14,171],"encryption":[7,34,191],"techniques":[8],"due":[9],"to":[10,48,57,90,118,131,177,211],"the":[11,33,36,60,64,67,73,76,80,84,88,98,101,106,112,120,124,133,138,141,148,175,186],"safety":[12],"of":[13,21,66,79,87,100,123,137,143],"transmission":[15],"and":[16,96,128,160,190,202,205,208,216],"archiving.":[17],"so":[18],"means":[20],"encrypting":[22],"images":[23],"based":[24],"on":[25],"random":[26,40,150],"number":[27,41,151],"matrix":[28,108,152],"iterations":[29],"suggested.":[31],"In":[32],"process,":[35],"algorithm":[37],"uses":[38],"two":[39,55,89],"matrices":[42,56],"with":[43,174],"values":[44,86],"ranging":[45],"from":[46],"1":[47],"256,":[49],"which":[50],"are":[51,209],"randomly":[52],"generated.":[53],"Use":[54],"iterate.":[58],"During":[59],"iteration,":[61],"take":[62,71],"out":[63,72],"elements":[65,74,136,145],"first":[68,107,126,149],"matrix,":[69,82,127,159],"then":[70,129],"in":[75,105],"same":[77],"position":[78,94,103,135],"second":[81],"combining":[83],"element":[85,121],"form":[91],"new":[93,102,158],"index,":[95],"get":[97],"value":[99,113,122],"index":[104],"finally.":[109],"Iterate":[110],"over":[111],"multiple":[114],"times,":[115],"using":[116],"it":[117,161],"replace":[119],"current":[125],"continue":[130],"iterate":[132],"other":[134],"matrix.":[139],"After":[140],"iteration":[142],"all":[144],"completed,":[147],"will":[153,162],"be":[154,163],"converted":[155],"into":[156],"used":[164],"as":[165],"an":[166],"encrypted":[167],"sequence.":[168],"A":[169],"plaintext":[170],"XOR":[173],"sequence":[176],"generate":[178],"ciphertext":[180],"image.":[181],"The":[182],"testing":[183],"findings":[184],"demonstrate":[185],"algorithm's":[187],"superior":[188],"security":[189],"performance.":[192],"It":[193],"features":[194],"big":[196],"key":[197,200],"spacing,":[198],"strong":[199],"sensitivity,":[201],"good":[203],"diffusion":[204],"obfuscation":[206],"capabilities,":[207],"resistant":[210],"conventional":[212],"assaults":[213],"including":[214],"differential":[215],"brute":[217],"force":[218],"assaults.":[219]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
