{"id":"https://openalex.org/W4390493802","doi":"https://doi.org/10.1109/cisp-bmei60920.2023.10373275","title":"Robust Image Encryption Based on Improved Logistic Chaos and Cross Chaotic Diffusion","display_name":"Robust Image Encryption Based on Improved Logistic Chaos and Cross Chaotic Diffusion","publication_year":2023,"publication_date":"2023-10-28","ids":{"openalex":"https://openalex.org/W4390493802","doi":"https://doi.org/10.1109/cisp-bmei60920.2023.10373275"},"language":"en","primary_location":{"id":"doi:10.1109/cisp-bmei60920.2023.10373275","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cisp-bmei60920.2023.10373275","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 16th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112113236","display_name":"Guo Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I111971639","display_name":"Qiqihar University","ror":"https://ror.org/01khf5d59","country_code":"CN","type":"education","lineage":["https://openalex.org/I111971639"]},{"id":"https://openalex.org/I1300757298","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96","country_code":"CN","type":"education","lineage":["https://openalex.org/I1300757298"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guo Yuan","raw_affiliation_strings":["Heilongjiang University,Department of Computer Science and Technology,Harbin,China,150080","Department of Computer and Control Engineering, Qiqihar University, Qiqihar, China"],"affiliations":[{"raw_affiliation_string":"Heilongjiang University,Department of Computer Science and Technology,Harbin,China,150080","institution_ids":["https://openalex.org/I1300757298"]},{"raw_affiliation_string":"Department of Computer and Control Engineering, Qiqihar University, Qiqihar, China","institution_ids":["https://openalex.org/I111971639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101632617","display_name":"Zhai Ping","orcid":"https://orcid.org/0009-0003-9742-7683"},"institutions":[{"id":"https://openalex.org/I111971639","display_name":"Qiqihar University","ror":"https://ror.org/01khf5d59","country_code":"CN","type":"education","lineage":["https://openalex.org/I111971639"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhai Ping","raw_affiliation_strings":["Qiqihar University,Department of Computer and Control Engineering,Qiqihar,China,161006"],"affiliations":[{"raw_affiliation_string":"Qiqihar University,Department of Computer and Control Engineering,Qiqihar,China,161006","institution_ids":["https://openalex.org/I111971639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100329436","display_name":"Chong Wang","orcid":"https://orcid.org/0000-0002-0541-2210"},"institutions":[{"id":"https://openalex.org/I111971639","display_name":"Qiqihar University","ror":"https://ror.org/01khf5d59","country_code":"CN","type":"education","lineage":["https://openalex.org/I111971639"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Chong","raw_affiliation_strings":["Qiqihar University,Department of Computer and Control Engineering,Qiqihar,China,161006"],"affiliations":[{"raw_affiliation_string":"Qiqihar University,Department of Computer and Control Engineering,Qiqihar,China,161006","institution_ids":["https://openalex.org/I111971639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394092","display_name":"Haibo Li","orcid":"https://orcid.org/0000-0003-0437-7617"},"institutions":[{"id":"https://openalex.org/I1300757298","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96","country_code":"CN","type":"education","lineage":["https://openalex.org/I1300757298"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Haibo","raw_affiliation_strings":["Heilongjiang University,Department of Computer Science and Technology,Harbin,China,150080"],"affiliations":[{"raw_affiliation_string":"Heilongjiang University,Department of Computer Science and Technology,Harbin,China,150080","institution_ids":["https://openalex.org/I1300757298"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114860377","display_name":"Ziqi Liu","orcid":"https://orcid.org/0000-0002-4112-3504"},"institutions":[{"id":"https://openalex.org/I1300757298","display_name":"Heilongjiang University of Science and Technology","ror":"https://ror.org/030xwyx96","country_code":"CN","type":"education","lineage":["https://openalex.org/I1300757298"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liu Ziqi","raw_affiliation_strings":["Heilongjiang University,Department of Computer Science and Technology,Harbin,China,150080"],"affiliations":[{"raw_affiliation_string":"Heilongjiang University,Department of Computer Science and Technology,Harbin,China,150080","institution_ids":["https://openalex.org/I1300757298"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112113236"],"corresponding_institution_ids":["https://openalex.org/I111971639","https://openalex.org/I1300757298"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18299909,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"41","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9624999761581421,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9118000268936157,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.8180038928985596},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6701804399490356},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6289036273956299},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6258620023727417},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5895935893058777},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5830642580986023},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5192735195159912},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5133642554283142},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.4726152718067169},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4289492666721344},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4041190445423126},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.35925811529159546},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3504348397254944},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20066460967063904},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10695379972457886}],"concepts":[{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.8180038928985596},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6701804399490356},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6289036273956299},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6258620023727417},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5895935893058777},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5830642580986023},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5192735195159912},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5133642554283142},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.4726152718067169},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4289492666721344},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4041190445423126},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.35925811529159546},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3504348397254944},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20066460967063904},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10695379972457886},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisp-bmei60920.2023.10373275","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/cisp-bmei60920.2023.10373275","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 16th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.46000000834465027}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2809903862","https://openalex.org/W2888346471","https://openalex.org/W2969658688","https://openalex.org/W3004017191","https://openalex.org/W3004899494","https://openalex.org/W3005163853","https://openalex.org/W3014072049","https://openalex.org/W3048972734","https://openalex.org/W3080725181","https://openalex.org/W3094538635","https://openalex.org/W3119757999","https://openalex.org/W3135903680","https://openalex.org/W3137268960","https://openalex.org/W3155998116","https://openalex.org/W3176311753","https://openalex.org/W4307040954","https://openalex.org/W4311753809"],"related_works":["https://openalex.org/W2910586303","https://openalex.org/W2058244126","https://openalex.org/W2820843459","https://openalex.org/W2279322854","https://openalex.org/W2771827848","https://openalex.org/W4283656792","https://openalex.org/W1562526655","https://openalex.org/W3029907917","https://openalex.org/W2341723023","https://openalex.org/W3168414399"],"abstract_inverted_index":{"To":[0],"address":[1],"the":[2,40,47,54,83,89,101,109,137],"problem":[3],"of":[4,7,43,69,78,103],"weak":[5],"robustness":[6,152],"some":[8,104],"current":[9],"image":[10,168,176],"encryption":[11,19,128],"algorithms,":[12],"this":[13],"paper":[14],"proposes":[15],"a":[16,122],"strong":[17,95,151],"robust":[18],"algorithm.":[20],"The":[21,33,132],"Logistic":[22],"chaotic":[23,44,59,79],"system":[24,45],"is":[25,36,51,63,115,130,172],"improved":[26],"to":[27,38,99],"produce":[28],"more":[29],"random":[30],"sequence":[31,60],"distribution.":[32],"plaintext":[34,70,76,84,91,147],"hash":[35],"used":[37,52],"construct":[39],"initial":[41],"key":[42],"and":[46,73,93,145,153,171],"spiral":[48,111],"matrix":[49,112],"transformation":[50,77],"for":[53,167,175],"first":[55,110],"scrambling.":[56],"A":[57],"novel":[58],"cross-diffusion":[61],"method":[62],"constructed":[64],"by":[65],"introducing":[66],"two":[67],"values":[68],"correlation":[71],"val1":[72],"val2.":[74],"Through":[75],"sequences,":[80],"it":[81,157],"improves":[82],"sensitivity,":[85],"which":[86,164],"can":[87,140],"resist":[88,141],"selective":[90,146],"attack,":[92],"has":[94,150,158,165],"robustness.":[96],"In":[97],"order":[98],"avoid":[100],"position":[102],"pixels":[105],"not":[106],"changed":[107],"in":[108,161],"transformation,":[113],"cross-scrambling":[114],"carried":[116],"out":[117],"again":[118],"after":[119],"cross-diffusion.":[120],"Therefore":[121],"scrambling":[123,127],"\u2013":[124],"diffusing":[125],"-":[126],"framework":[129],"built.":[131],"experimental":[133],"results":[134],"show":[135],"that":[136],"proposed":[138],"algorithm":[139],"brute":[142],"force":[143],"attacks":[144],"attack.":[148],"It":[149],"high":[154],"security.":[155],"Especially":[156],"perfect":[159],"performance":[160],"anti-shear":[162],"attacks,":[163],"significance":[166],"security":[169],"transmission":[170],"very":[173],"suitable":[174],"encryption.":[177]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
