{"id":"https://openalex.org/W3094562617","doi":"https://doi.org/10.1109/icccnt49239.2020.9225335","title":"Image encryption using a new 2D bit reversed logistic map","display_name":"Image encryption using a new 2D bit reversed logistic map","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3094562617","doi":"https://doi.org/10.1109/icccnt49239.2020.9225335","mag":"3094562617"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225335","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013281134","display_name":"Madhu Sharma","orcid":"https://orcid.org/0000-0002-3303-5651"},"institutions":[{"id":"https://openalex.org/I933318745","display_name":"Dehradun Institute of Technology University","ror":"https://ror.org/01v5k4d73","country_code":"IN","type":"education","lineage":["https://openalex.org/I933318745"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Madhu Sharma","raw_affiliation_strings":["Computer Science and Engineering, DIT University, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, DIT University, Dehradun, India","institution_ids":["https://openalex.org/I933318745"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053275252","display_name":"Vishal Bharti","orcid":"https://orcid.org/0000-0002-7806-9169"},"institutions":[{"id":"https://openalex.org/I933318745","display_name":"Dehradun Institute of Technology University","ror":"https://ror.org/01v5k4d73","country_code":"IN","type":"education","lineage":["https://openalex.org/I933318745"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vishal Bharti","raw_affiliation_strings":["Computer Science and Engineering, DIT University, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, DIT University, Dehradun, India","institution_ids":["https://openalex.org/I933318745"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013281134"],"corresponding_institution_ids":["https://openalex.org/I933318745"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.11682463,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"38","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9682000279426575,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9652000069618225,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.9038800001144409},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7494994401931763},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6678167581558228},{"id":"https://openalex.org/keywords/chaotic-map","display_name":"Chaotic map","score":0.5979903340339661},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.575173020362854},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5654838681221008},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5033206343650818},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.4940376877784729},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.4781683087348938},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.45364901423454285},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4293861389160156},{"id":"https://openalex.org/keywords/tent-map","display_name":"Tent map","score":0.4286869466304779},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3287777304649353},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3238080143928528},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.08332866430282593},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.06725922226905823}],"concepts":[{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.9038800001144409},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7494994401931763},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6678167581558228},{"id":"https://openalex.org/C2983793180","wikidata":"https://www.wikidata.org/wiki/Q166314","display_name":"Chaotic map","level":3,"score":0.5979903340339661},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.575173020362854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5654838681221008},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5033206343650818},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.4940376877784729},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.4781683087348938},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.45364901423454285},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4293861389160156},{"id":"https://openalex.org/C15998118","wikidata":"https://www.wikidata.org/wiki/Q11319849","display_name":"Tent map","level":3,"score":0.4286869466304779},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3287777304649353},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3238080143928528},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.08332866430282593},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.06725922226905823},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225335","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225335","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1884551976","https://openalex.org/W1964090637","https://openalex.org/W1977973619","https://openalex.org/W2035302801","https://openalex.org/W2053111047","https://openalex.org/W2062158193","https://openalex.org/W2063215317","https://openalex.org/W2079631812","https://openalex.org/W2079777023","https://openalex.org/W2139381829","https://openalex.org/W2163216853","https://openalex.org/W2169879853","https://openalex.org/W2239443241","https://openalex.org/W2293929197","https://openalex.org/W2559181737","https://openalex.org/W2627122219","https://openalex.org/W2782097619","https://openalex.org/W2969529202","https://openalex.org/W2980452906","https://openalex.org/W2985012163"],"related_works":["https://openalex.org/W2018914863","https://openalex.org/W2366283660","https://openalex.org/W2393587766","https://openalex.org/W2587616480","https://openalex.org/W2538527336","https://openalex.org/W2182116519","https://openalex.org/W2360233907","https://openalex.org/W3103400228","https://openalex.org/W2219576803","https://openalex.org/W2383498754"],"abstract_inverted_index":{"A":[0,78],"new":[1],"2D":[2,41,67],"chaotic":[3],"map":[4,43,68],"is":[5,23,44],"proposed":[6,10],"using":[7],"a":[8,48,51,57],"recently":[9],"bit":[11,39],"reversal":[12],"operation":[13],"to":[14,25,31,46,72,86,101,106],"enhance":[15],"the":[16,61,88,93],"classic":[17],"1D":[18],"logistic":[19,42,63],"map.":[20],"The":[21,38,66],"map's":[22,64],"subjected":[24],"some":[26],"standard":[27],"tests":[28],"so":[29],"as":[30],"validate":[32],"it's":[33],"pseudo-random":[34],"number":[35],"generation":[36],"capabilities.":[37],"reversed":[40],"used":[45,71],"generate":[47],"sequence":[49,79],"of":[50,53,60,80,92,97],"pair":[52],"random":[54],"numbers":[55],"with":[56,111],"continuous":[58],"variation":[59],"enhanced":[62],"parameter.":[65],"s":[69],"then":[70],"implement":[73],"an":[74],"image":[75],"encryption":[76],"schema.":[77],"simulation":[81],"runs":[82],"are":[83,116],"carried":[84],"out":[85],"verify":[87],"over":[89],"all":[90],"effectiveness":[91],"method":[94],"in":[95],"terms":[96],"parameters":[98],"like":[99],"sensitivity":[100,105],"initial":[102],"key":[103],"and":[104],"input":[107],"plain":[108],"image.":[109],"Comparisons":[110],"previously":[112],"reported":[113],"related":[114],"algorithms":[115],"also":[117],"shown.":[118]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
