{"id":"https://openalex.org/W1964558686","doi":"https://doi.org/10.1109/gcce.2013.6664828","title":"Dynamic encryption protocol for secure multimedia communication","display_name":"Dynamic encryption protocol for secure multimedia communication","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W1964558686","doi":"https://doi.org/10.1109/gcce.2013.6664828","mag":"1964558686"},"language":"en","primary_location":{"id":"doi:10.1109/gcce.2013.6664828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcce.2013.6664828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103929304","display_name":"Ricky Yuen-Tan Hou","orcid":null},"institutions":[{"id":"https://openalex.org/I12615008","display_name":"Beijing Normal University - Hong Kong Baptist University United International College","ror":"https://ror.org/04snvc712","country_code":"CN","type":"education","lineage":["https://openalex.org/I12615008"]},{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Ricky Yuen-Tan Hou","raw_affiliation_strings":["United International College, Hong Kong Baptist University, Kowloon Tong, Hong Kong","United Int. Coll., Hong Kong Baptist Univ., Kowloon Tong, Taiwan"],"affiliations":[{"raw_affiliation_string":"United International College, Hong Kong Baptist University, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I141568987","https://openalex.org/I12615008"]},{"raw_affiliation_string":"United Int. Coll., Hong Kong Baptist Univ., Kowloon Tong, Taiwan","institution_ids":["https://openalex.org/I141568987"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101615841","display_name":"Yiu-Wing Leung","orcid":"https://orcid.org/0000-0002-8338-231X"},"institutions":[{"id":"https://openalex.org/I12615008","display_name":"Beijing Normal University - Hong Kong Baptist University United International College","ror":"https://ror.org/04snvc712","country_code":"CN","type":"education","lineage":["https://openalex.org/I12615008"]},{"id":"https://openalex.org/I141568987","display_name":"Hong Kong Baptist University","ror":"https://ror.org/0145fw131","country_code":"HK","type":"education","lineage":["https://openalex.org/I141568987"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Yiu-Wing Leung","raw_affiliation_strings":["United International College, Hong Kong Baptist University, Kowloon Tong, Hong Kong","Dept. of Comput. Sci., Hong Kong Baptist Univ., Kowloon Tong, Taiwan"],"affiliations":[{"raw_affiliation_string":"United International College, Hong Kong Baptist University, Kowloon Tong, Hong Kong","institution_ids":["https://openalex.org/I141568987","https://openalex.org/I12615008"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Hong Kong Baptist Univ., Kowloon Tong, Taiwan","institution_ids":["https://openalex.org/I141568987"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103929304"],"corresponding_institution_ids":["https://openalex.org/I12615008","https://openalex.org/I141568987"],"apc_list":null,"apc_paid":null,"fwci":0.2722,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.561163,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"284","last_page":"285"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.85579514503479},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.831821084022522},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5915980935096741},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5283991694450378},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4906870126724243},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.44938933849334717},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.43306830525398254},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.42749008536338806},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39702141284942627},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3769814670085907},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3120642900466919}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.85579514503479},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.831821084022522},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5915980935096741},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5283991694450378},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4906870126724243},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.44938933849334717},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.43306830525398254},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.42749008536338806},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39702141284942627},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3769814670085907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3120642900466919},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcce.2013.6664828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcce.2013.6664828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.8399999737739563,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1604404221","https://openalex.org/W1974760326","https://openalex.org/W2006261520","https://openalex.org/W2039229148","https://openalex.org/W2079164587","https://openalex.org/W2130299665","https://openalex.org/W2130516235","https://openalex.org/W2158447652","https://openalex.org/W2168319769","https://openalex.org/W6643910945"],"related_works":["https://openalex.org/W2372014581","https://openalex.org/W2091359829","https://openalex.org/W2379631527","https://openalex.org/W2490080356","https://openalex.org/W222001389","https://openalex.org/W2350287915","https://openalex.org/W3214026606","https://openalex.org/W2330695007","https://openalex.org/W2184640972","https://openalex.org/W4380589718"],"abstract_inverted_index":{"Portable":[0],"devices":[1,31],"can":[2],"support":[3],"many":[4],"multimedia":[5,68],"communication":[6],"applications":[7],"(e.g.,":[8],"voice":[9],"&":[10],"video":[11],"calls,":[12],"movie-on-demand,":[13],"etc.).":[14],"For":[15],"some":[16,85],"applications,":[17],"the":[18,81],"media":[19,82,133],"should":[20],"be":[21,88,99],"encrypted":[22],"for":[23,66,91,102],"confidentiality,":[24],"privacy":[25],"or":[26],"access":[27],"control.":[28],"Since":[29],"portable":[30],"are":[32],"equipped":[33],"with":[34],"low-end":[35],"CPUs":[36],"and":[37,46,54,95,105,118,123,126,134],"powered":[38],"by":[39],"batteries,":[40],"it":[41,115,128],"is":[42,129],"desirable":[43,112,117],"that":[44],"encryption":[45,64],"decryption":[47],"would":[48],"not":[49],"use":[50],"significant":[51],"CPU":[52,104],"time":[53],"battery":[55],"energy.":[56],"In":[57],"this":[58],"paper,":[59],"we":[60],"propose":[61],"a":[62],"dynamic":[63],"protocol":[65,109],"secure":[67],"communication.":[69],"It":[70],"dynamically":[71],"applies":[72],"multiple":[73],"cryptographic":[74],"algorithms":[75,86,97],"to":[76,131],"encrypt":[77],"different":[78],"parts":[79],"of":[80],"contents,":[83],"where":[84],"may":[87,98],"computation-intensive":[89],"ones":[90,101],"stronger":[92],"security":[93,122],"protection":[94],"other":[96],"lightweight":[100],"smaller":[103],"energy":[106],"usage.":[107],"This":[108],"has":[110],"two":[111],"features:":[113],"i)":[114],"provides":[116],"adjustable":[119],"tradeoff":[120],"between":[121],"CPU/energy":[124],"usage,":[125],"ii)":[127],"applicable":[130],"any":[132],"encoding":[135],"methods.":[136]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
