{"id":"https://openalex.org/W2044514312","doi":"https://doi.org/10.1109/icacci.2013.6637214","title":"Towards the growth of image encryption and authentication schemes","display_name":"Towards the growth of image encryption and authentication schemes","publication_year":2013,"publication_date":"2013-08-01","ids":{"openalex":"https://openalex.org/W2044514312","doi":"https://doi.org/10.1109/icacci.2013.6637214","mag":"2044514312"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2013.6637214","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2013.6637214","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091776129","display_name":"Amitesh Singh Rajput","orcid":"https://orcid.org/0000-0003-3318-9658"},"institutions":[{"id":"https://openalex.org/I196622127","display_name":"Rajiv Gandhi Technical University","ror":"https://ror.org/03xmje391","country_code":"IN","type":"education","lineage":["https://openalex.org/I196622127"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amitesh Singh Rajput","raw_affiliation_strings":["School of Information Technology, R.G.P.V., Bhopal, Madhya Pradesh, India","Sch. of Inf. Technol., R.G.P.V., Bhopal, India"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, R.G.P.V., Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I196622127"]},{"raw_affiliation_string":"Sch. of Inf. Technol., R.G.P.V., Bhopal, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072183993","display_name":"Nishchol Mishra","orcid":null},"institutions":[{"id":"https://openalex.org/I196622127","display_name":"Rajiv Gandhi Technical University","ror":"https://ror.org/03xmje391","country_code":"IN","type":"education","lineage":["https://openalex.org/I196622127"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nishchol Mishra","raw_affiliation_strings":["School of Information Technology, R.G.P.V., Bhopal, Madhya Pradesh, India","Sch. of Inf. Technol., R.G.P.V., Bhopal, India"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, R.G.P.V., Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I196622127"]},{"raw_affiliation_string":"Sch. of Inf. Technol., R.G.P.V., Bhopal, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076508718","display_name":"Sanjeev Sharma","orcid":"https://orcid.org/0000-0001-6654-5642"},"institutions":[{"id":"https://openalex.org/I196622127","display_name":"Rajiv Gandhi Technical University","ror":"https://ror.org/03xmje391","country_code":"IN","type":"education","lineage":["https://openalex.org/I196622127"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjeev Sharma","raw_affiliation_strings":["School of Information Technology, R.G.P.V., Bhopal, Madhya Pradesh, India","Sch. of Inf. Technol., R.G.P.V., Bhopal, India"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, R.G.P.V., Bhopal, Madhya Pradesh, India","institution_ids":["https://openalex.org/I196622127"]},{"raw_affiliation_string":"Sch. of Inf. Technol., R.G.P.V., Bhopal, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5091776129"],"corresponding_institution_ids":["https://openalex.org/I196622127"],"apc_list":null,"apc_paid":null,"fwci":2.85925357,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.92664296,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"454","last_page":"459"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.949400007724762,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8731176853179932},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6562530994415283},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5191037654876709},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.5023324489593506},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48412665724754333},{"id":"https://openalex.org/keywords/link-encryption","display_name":"Link encryption","score":0.47419363260269165},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.43179407715797424},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.42595288157463074},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.4105681777000427},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4000920355319977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39768072962760925},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.35350751876831055}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8731176853179932},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6562530994415283},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5191037654876709},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.5023324489593506},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48412665724754333},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.47419363260269165},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.43179407715797424},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.42595288157463074},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.4105681777000427},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4000920355319977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39768072962760925},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.35350751876831055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2013.6637214","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2013.6637214","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1585665690","https://openalex.org/W1660562555","https://openalex.org/W1978868455","https://openalex.org/W1998782704","https://openalex.org/W2010620862","https://openalex.org/W2013503531","https://openalex.org/W2020039621","https://openalex.org/W2032820503","https://openalex.org/W2046022665","https://openalex.org/W2046549384","https://openalex.org/W2058590675","https://openalex.org/W2063693948","https://openalex.org/W2064950075","https://openalex.org/W2071379504","https://openalex.org/W2073059321","https://openalex.org/W2074882608","https://openalex.org/W2094051246","https://openalex.org/W2094237742","https://openalex.org/W2094797348","https://openalex.org/W2116615952","https://openalex.org/W2129753112","https://openalex.org/W2134755853"],"related_works":["https://openalex.org/W2144246620","https://openalex.org/W3004922236","https://openalex.org/W4250199380","https://openalex.org/W2231057570","https://openalex.org/W2370942914","https://openalex.org/W4315815885","https://openalex.org/W1983408639","https://openalex.org/W2382883955","https://openalex.org/W2915067502","https://openalex.org/W2311845038"],"abstract_inverted_index":{"This":[0,121],"paper":[1,122,138,161],"is":[2,104],"simply":[3],"the":[4,10,20,25,51,67,70,74,77,81,105,118,134,149,157,160,176],"gathering":[5],"of":[6,12,29,43,69,108,126,178],"recent":[7],"developments":[8],"in":[9,19,35,117,133,175],"field":[11,177],"image":[13,44,46,55,71,83,129,142,158,167,179],"security":[14,180],"and":[15,48,57,72,144,147,151,169],"presents":[16,123,140],"further":[17,173],"improvements":[18],"same":[21],"field.":[22],"Images":[23],"are":[24,33,39],"most":[26],"important":[27],"utility":[28],"our":[30],"life.":[31],"They":[32],"used":[34],"many":[36],"applications.":[37],"There":[38],"two":[40],"main":[41],"goals":[42],"security:":[45],"encryption":[47,56,64,91,102,112,130,143,168],"authentication.":[49],"During":[50],"past":[52],"years,":[53],"several":[54],"authentication":[58,145],"algorithms":[59],"have":[60,114],"been":[61,115],"proposed.":[62],"Image":[63],"techniques":[65],"scramble":[66],"pixels":[68],"decrease":[73],"correlation":[75],"among":[76],"pixels,":[78],"such":[79,171],"that":[80,172],"encrypted":[82],"cannot":[84],"be":[85,95,182],"accessed":[86],"by":[87,99],"unauthorized":[88],"user.":[89],"Chaotic":[90,101],"method":[92],"seems":[93],"to":[94],"much":[96],"better":[97],"day":[98],"day.":[100],"technique":[103],"new":[106],"way":[107],"cryptography.":[109],"Many":[110],"chaos-based":[111],"methods":[113],"proposed":[116,132],"last":[119,135],"decade.":[120,136],"a":[124,163],"survey":[125],"different":[127,141],"chaotic":[128],"schemes":[131,146],"The":[137],"also":[139],"discusses":[148,162],"problems":[150],"resolution":[152],"associated":[153],"with":[154],"them.":[155],"Emphasizing":[156],"security,":[159],"hybrid":[164],"scheme":[165],"for":[166],"authentication,":[170],"advances":[174],"can":[181],"enhanced.":[183]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
