{"id":"https://openalex.org/W2152248218","doi":"https://doi.org/10.1109/hpcsim.2011.5999916","title":"Image encryption using stream cipher algorithm with nonlinear filtering function","display_name":"Image encryption using stream cipher algorithm with nonlinear filtering function","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2152248218","doi":"https://doi.org/10.1109/hpcsim.2011.5999916","mag":"2152248218"},"language":"en","primary_location":{"id":"doi:10.1109/hpcsim.2011.5999916","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2011.5999916","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on High Performance Computing &amp; Simulation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015872480","display_name":"A\u00efssa Belmeguena\u00ef","orcid":"https://orcid.org/0009-0000-0538-9324"},"institutions":[{"id":"https://openalex.org/I98962006","display_name":"University of Skikda","ror":"https://ror.org/02571vj15","country_code":"DZ","type":"education","lineage":["https://openalex.org/I98962006"]}],"countries":["DZ"],"is_corresponding":true,"raw_author_name":"Belmeguenai Aissa","raw_affiliation_strings":["Laboratoire de Recherche en Electronique de Skikda, Universit\u00e9 du 20 Ao\u00fbt 1955-Skikda, Algeria"],"affiliations":[{"raw_affiliation_string":"Laboratoire de Recherche en Electronique de Skikda, Universit\u00e9 du 20 Ao\u00fbt 1955-Skikda, Algeria","institution_ids":["https://openalex.org/I98962006"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005843516","display_name":"Nadir Derouiche","orcid":"https://orcid.org/0000-0001-8323-5179"},"institutions":[{"id":"https://openalex.org/I98962006","display_name":"University of Skikda","ror":"https://ror.org/02571vj15","country_code":"DZ","type":"education","lineage":["https://openalex.org/I98962006"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Derouiche Nadir","raw_affiliation_strings":["Laboratoire de Recherche en Electronique de Skikda, Universit\u00e9 du 20 Ao\u00fbt 1955-Skikda, Algeria"],"affiliations":[{"raw_affiliation_string":"Laboratoire de Recherche en Electronique de Skikda, Universit\u00e9 du 20 Ao\u00fbt 1955-Skikda, Algeria","institution_ids":["https://openalex.org/I98962006"]}]},{"author_position":"last","author":{"id":null,"display_name":"Redjimi Mohamed","orcid":null},"institutions":[{"id":"https://openalex.org/I98962006","display_name":"University of Skikda","ror":"https://ror.org/02571vj15","country_code":"DZ","type":"education","lineage":["https://openalex.org/I98962006"]}],"countries":["DZ"],"is_corresponding":false,"raw_author_name":"Redjimi Mohamed","raw_affiliation_strings":["Laboratoire de Recherche en Electronique de Skikda, Universit\u00e9 du 20 Ao\u00fbt 1955-Skikda, Algeria"],"affiliations":[{"raw_affiliation_string":"Laboratoire de Recherche en Electronique de Skikda, Universit\u00e9 du 20 Ao\u00fbt 1955-Skikda, Algeria","institution_ids":["https://openalex.org/I98962006"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015872480"],"corresponding_institution_ids":["https://openalex.org/I98962006"],"apc_list":null,"apc_paid":null,"fwci":0.7848,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.77241237,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"830","last_page":"835"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.8621482253074646},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6724207401275635},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6008424162864685},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5918480753898621},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5786486268043518},{"id":"https://openalex.org/keywords/decipher","display_name":"DECIPHER","score":0.5464039444923401},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5179916620254517},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.5031277537345886},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.48701268434524536},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4603095054626465},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41879069805145264},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.41599828004837036},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.3439113199710846},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13231822848320007},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06633123755455017}],"concepts":[{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.8621482253074646},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6724207401275635},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6008424162864685},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5918480753898621},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5786486268043518},{"id":"https://openalex.org/C164614171","wikidata":"https://www.wikidata.org/wiki/Q5204775","display_name":"DECIPHER","level":2,"score":0.5464039444923401},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5179916620254517},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.5031277537345886},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.48701268434524536},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4603095054626465},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41879069805145264},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.41599828004837036},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.3439113199710846},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13231822848320007},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06633123755455017},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hpcsim.2011.5999916","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hpcsim.2011.5999916","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on High Performance Computing &amp; Simulation","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1699105","https://openalex.org/W1571317543","https://openalex.org/W1660562555","https://openalex.org/W1835612111","https://openalex.org/W2095027936","https://openalex.org/W2130972067","https://openalex.org/W2161517294","https://openalex.org/W4236509984","https://openalex.org/W4243044619","https://openalex.org/W6600068609","https://openalex.org/W6638688666","https://openalex.org/W6818108484"],"related_works":["https://openalex.org/W1784733384","https://openalex.org/W2950447949","https://openalex.org/W2615464719","https://openalex.org/W2777885722","https://openalex.org/W2296485668","https://openalex.org/W2144996145","https://openalex.org/W2132652565","https://openalex.org/W2391648142","https://openalex.org/W2483202600","https://openalex.org/W2391794278"],"abstract_inverted_index":{"In":[0],"this":[1,43,64],"work":[2],"a":[3,23],"new":[4],"algorithm":[5,12,27,44],"for":[6],"encryption":[7],"image":[8],"is":[9,29,45],"introduced.":[10],"This":[11],"makes":[13],"it":[14],"possible":[15,58],"to":[16],"cipher":[17,33],"and":[18],"decipher":[19],"images":[20],"by":[21],"guaranteeing":[22],"maximum":[24],"security.":[25],"The":[26,38],"introduced":[28],"based":[30],"on":[31],"stream":[32],"with":[34],"nonlinear":[35],"filtering":[36],"function.":[37],"Boolean":[39],"function":[40,47],"used":[41],"in":[42,63],"resilient":[46],"satisfying":[48],"all":[49],"the":[50,56],"cryptographic":[51],"criteria":[52],"necessary":[53],"carrying":[54],"out":[55],"best":[57],"compromises.":[59],"Results":[60],"are":[61],"given":[62],"paper.":[65]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
