{"id":"https://openalex.org/W2030620082","doi":"https://doi.org/10.1109/dictap.2012.6215383","title":"A lossless digital encryption system for multimedia using orthogonal transforms","display_name":"A lossless digital encryption system for multimedia using orthogonal transforms","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2030620082","doi":"https://doi.org/10.1109/dictap.2012.6215383","mag":"2030620082"},"language":"en","primary_location":{"id":"doi:10.1109/dictap.2012.6215383","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dictap.2012.6215383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024201979","display_name":"Mohammad V. Malakooti","orcid":null},"institutions":[{"id":"https://openalex.org/I4210124555","display_name":"Islamic Azad University, UAE Branch","ror":"https://ror.org/02rxa1r38","country_code":"AE","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I4210124555"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Mohammad V. Malakooti","raw_affiliation_strings":["Faculty and Head of Department of Computer Engineering, Islamic Azad University, Dubai, UAE","Department of Computer Engineering Islamic Azad University, Dubai, UAE"],"affiliations":[{"raw_affiliation_string":"Faculty and Head of Department of Computer Engineering, Islamic Azad University, Dubai, UAE","institution_ids":["https://openalex.org/I4210124555"]},{"raw_affiliation_string":"Department of Computer Engineering Islamic Azad University, Dubai, UAE","institution_ids":["https://openalex.org/I4210124555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001225540","display_name":"Mojtaba Raeisi Nejad Dobuneh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210124555","display_name":"Islamic Azad University, UAE Branch","ror":"https://ror.org/02rxa1r38","country_code":"AE","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I4210124555"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mojtaba Raeisi Nejad Dobuneh","raw_affiliation_strings":["Graduate Student of Department of Computer Engineering, IAU, Dubai, UAE","Department of Computer Engineering, IAU, Dubai, UAE"],"affiliations":[{"raw_affiliation_string":"Graduate Student of Department of Computer Engineering, IAU, Dubai, UAE","institution_ids":["https://openalex.org/I4210124555"]},{"raw_affiliation_string":"Department of Computer Engineering, IAU, Dubai, UAE","institution_ids":["https://openalex.org/I4210124555"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024201979"],"corresponding_institution_ids":["https://openalex.org/I4210124555"],"apc_list":null,"apc_paid":null,"fwci":0.82955993,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.74629906,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3","issue":null,"first_page":"240","last_page":"244"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8528931140899658},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7394086122512817},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.6209345459938049},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.6083945631980896},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5167886018753052},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5136144161224365},{"id":"https://openalex.org/keywords/hadamard-transform","display_name":"Hadamard transform","score":0.4786425828933716},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4327913522720337},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3918737769126892},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.24932745099067688},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.22387278079986572},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.2213612198829651},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.17379853129386902},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16636180877685547},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09384647011756897}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8528931140899658},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7394086122512817},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.6209345459938049},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.6083945631980896},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5167886018753052},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5136144161224365},{"id":"https://openalex.org/C60292330","wikidata":"https://www.wikidata.org/wiki/Q1014065","display_name":"Hadamard transform","level":2,"score":0.4786425828933716},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4327913522720337},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3918737769126892},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.24932745099067688},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.22387278079986572},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2213612198829651},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17379853129386902},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16636180877685547},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09384647011756897},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dictap.2012.6215383","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dictap.2012.6215383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W24313355","https://openalex.org/W43974252","https://openalex.org/W131277626","https://openalex.org/W2018342351","https://openalex.org/W2133598069","https://openalex.org/W2145819439","https://openalex.org/W2481942527","https://openalex.org/W2763329769","https://openalex.org/W3149631979","https://openalex.org/W6601016909"],"related_works":["https://openalex.org/W2391717201","https://openalex.org/W2611530863","https://openalex.org/W2129143784","https://openalex.org/W2381438157","https://openalex.org/W2343531879","https://openalex.org/W1482571704","https://openalex.org/W2600380070","https://openalex.org/W2146530689","https://openalex.org/W2108429274","https://openalex.org/W2030620082"],"abstract_inverted_index":{"In":[0,30],"this":[1],"research":[2],"work,":[3],"we":[4,32],"have":[5,33,88,95,138,161],"developed":[6],"a":[7,97,166,193,197,208],"novel":[8],"lossless":[9],"digital":[10],"encryption":[11,21,71],"system":[12],"for":[13,19,183],"multimedia":[14],"using":[15,201],"the":[16,20,35,39,44,47,51,54,60,64,112,117,121,143,150,156,171,178,184],"orthogonal":[17,40,48,136],"transforms":[18,41,137],"of":[22,25,38,46,53,66,145,152,180,186,211],"all":[23],"types":[24],"image":[26,70,157],"and":[27,62,91,110,124,165,190,196,222],"audio":[28],"formats.":[29],"addition,":[31],"used":[34,107,140],"symmetric":[36],"properties":[37],"to":[42,57,108,141,176],"calculate":[43],"inverse":[45],"matrices":[49],"during":[50,155],"execution":[52],"decryption":[55],"process":[56],"speed":[58],"up":[59],"operations":[61],"reduce":[63],"cost":[65],"performance.":[67],"Several":[68],"classical":[69],"approaches":[72],"such":[73,213],"as":[74,82,84,147,149,214],"Discrete":[75],"Cosine":[76],"Transform":[77,80,86],"(DCT),":[78],"Hadamard":[79],"(HT)":[81],"well":[83,148],"Malakooti":[85],"(MT),":[87],"been":[89,139],"proposed":[90,129],"used.":[92],"We":[93,160],"also":[94],"proposed,":[96],"new":[98],"Malakooti-Raeisi":[99],"(MR)":[100],"Key":[101,125,130,173],"Gen":[102,126,131,174],"Algorithm":[103],"that":[104],"can":[105],"be":[106],"encrypt":[109],"decrypt":[111],"voice":[113,122,163,188,217,220],"signals":[114,123,164,189],"by":[115],"applying":[116],"XOR":[118],"operation":[119],"over":[120],"Sequences.":[127],"The":[128],"algorithm":[132,154,182,206],"along":[133],"with":[134,169,192],"above":[135],"increase":[142],"levels":[144],"security":[146,199],"robustness":[151],"our":[153,181],"encryption/decryption":[158,185],"process.":[159],"encrypted/decrypted":[162],"few":[167],"images":[168,191],"only":[170],"M-R":[172],"values":[175],"show":[177],"ability":[179],"both":[187],"high":[194],"accuracy":[195],"reasonable":[198],"without":[200],"any":[202],"other":[203],"transforms.":[204],"Our":[205],"has":[207],"wide":[209],"range":[210],"applications":[212],"real":[215],"time":[216],"transmission,":[218],"secure":[219,223],"chat,":[221],"video":[224],"encryption.":[225]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
