{"id":"https://openalex.org/W1642037483","doi":"https://doi.org/10.1109/icacci.2015.7275755","title":"Securing the contents of document images using knight moves and genetic approach","display_name":"Securing the contents of document images using knight moves and genetic approach","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1642037483","doi":"https://doi.org/10.1109/icacci.2015.7275755","mag":"1642037483"},"language":"en","primary_location":{"id":"doi:10.1109/icacci.2015.7275755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5104079893","display_name":"Jalesh Kumar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jalesh Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, J. N. N. College of Engineering Shivamogga, KARNATAKA, INDIA","Department of Computer Science and Engineering, J.N.N. College of Engineering, Shivamogga, KARNATAKA, INDIA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, J. N. N. College of Engineering Shivamogga, KARNATAKA, INDIA","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science and Engineering, J.N.N. College of Engineering, Shivamogga, KARNATAKA, INDIA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058497633","display_name":"S. Jaya Nirmala","orcid":"https://orcid.org/0000-0001-5432-4156"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Nirmala","raw_affiliation_strings":["Department of Computer Science and Engineering, J. N. N. College of Engineering Shivamogga, KARNATAKA, INDIA","Department of Computer Science and Engineering, J.N.N. College of Engineering, Shivamogga, KARNATAKA, INDIA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, J. N. N. College of Engineering Shivamogga, KARNATAKA, INDIA","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science and Engineering, J.N.N. College of Engineering, Shivamogga, KARNATAKA, INDIA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5104079893"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3682,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.66617534,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9732000231742859,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/knight","display_name":"Knight","score":0.8806869387626648},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7217719554901123},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6540950536727905},{"id":"https://openalex.org/keywords/crossover","display_name":"Crossover","score":0.5348369479179382},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5286144614219666},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4939418435096741},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.40377140045166016},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.38974523544311523},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.32903581857681274},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16080915927886963},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07672232389450073}],"concepts":[{"id":"https://openalex.org/C71140485","wikidata":"https://www.wikidata.org/wiki/Q2943226","display_name":"Knight","level":2,"score":0.8806869387626648},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7217719554901123},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6540950536727905},{"id":"https://openalex.org/C122507166","wikidata":"https://www.wikidata.org/wiki/Q628906","display_name":"Crossover","level":2,"score":0.5348369479179382},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5286144614219666},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4939418435096741},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40377140045166016},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38974523544311523},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.32903581857681274},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16080915927886963},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07672232389450073},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icacci.2015.7275755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icacci.2015.7275755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1987679967","https://openalex.org/W2034464518","https://openalex.org/W2046812432","https://openalex.org/W2097915107","https://openalex.org/W2145160357","https://openalex.org/W2155730035","https://openalex.org/W2164574684","https://openalex.org/W2185717940","https://openalex.org/W2298489777","https://openalex.org/W2553675779","https://openalex.org/W6659116016","https://openalex.org/W6681443946","https://openalex.org/W6686690750","https://openalex.org/W6729527283","https://openalex.org/W6876984995"],"related_works":["https://openalex.org/W2262571936","https://openalex.org/W410773176","https://openalex.org/W38323782","https://openalex.org/W2371678957","https://openalex.org/W1992314259","https://openalex.org/W4385705346","https://openalex.org/W2375981391","https://openalex.org/W45120566","https://openalex.org/W2767997441","https://openalex.org/W2361408597"],"abstract_inverted_index":{"In":[0,15,52],"this":[1],"paper,":[2],"a":[3,55,71],"novel":[4],"approach":[5,48,130,147],"is":[6,22,28,76,88,131,148],"proposed":[7,17,47,146,162],"to":[8,101,142],"secure":[9],"the":[10,16,103,113,129,136,151,161,165,168],"contents":[11,170],"of":[12,32,43,57,67,74,95,115,120,122,128,135,167],"document":[13,20,173],"images.":[14,174],"approach,":[18],"input":[19,172],"image":[21],"simulated":[23],"as":[24],"chessboard.":[25],"Encryption":[26],"process":[27],"based":[29],"on":[30,90],"moves":[31,121],"knight":[33,58,68,96,116,123],"pawn":[34],"used":[35],"in":[36,98,133,154,171],"chess":[37],"board":[38],"and":[39,118,139],"cross":[40],"over":[41],"operation":[42,87],"genetic":[44],"algorithm.":[45],"The":[46,125,145,156],"comprises":[49],"two":[50,93],"stages.":[51],"first":[53],"stage,":[54],"number":[56,73,114,119],"pawns":[59,69,79,97,117],"with":[60,150],"initial":[61],"positions":[62,82,94],"are":[63,108],"selected.":[64],"Legal":[65],"movement":[66],"for":[70],"specific":[72],"times":[75],"performed.":[77],"Knight":[78],"acquire":[80],"new":[81],"after":[83],"each":[84],"move.":[85],"Crossover":[86],"applied":[89],"randomly":[91],"selected":[92],"second":[99],"stage":[100],"generate":[102],"encrypted":[104],"image.":[105],"Exhaustive":[106],"experiments":[107],"carried":[109],"out":[110],"by":[111],"varying":[112],"pawns.":[124],"performance":[126],"evaluation":[127],"measured":[132],"terms":[134],"parameters":[137],"entropy":[138],"Peak":[140],"Signal":[141],"Noise":[143],"Ratio.":[144],"compared":[149],"encryption":[152],"method":[153],"[12].":[155],"comparative":[157],"analysis":[158],"reveals":[159],"that":[160],"algorithm":[163],"enhances":[164],"security":[166],"information":[169]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
