{"id":"https://openalex.org/W4404031447","doi":"https://doi.org/10.1109/icccnt61001.2024.10724426","title":"Securing Images: Cryptographic Approach in Big Data Scenario","display_name":"Securing Images: Cryptographic Approach in Big Data Scenario","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404031447","doi":"https://doi.org/10.1109/icccnt61001.2024.10724426"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724426","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114166086","display_name":"Kriti Priya Shah","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kriti Priya Shah","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department. of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department. of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109767039","display_name":"Subodh Narayan Sah","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Subodh Narayan Sah","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department. of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department. of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106529321","display_name":"Osho Kothari","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Osho Kothari","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department. of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department. of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038396034","display_name":"H. N. Vishwas","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"H.N. Vishwas","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department. of Computer Science and Engineering,Bengaluru,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Department. of Computer Science and Engineering,Bengaluru,India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5114166086"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":0.7895,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.74151117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9142000079154968,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7476109266281128},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6952171921730042},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4511989951133728},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43613487482070923},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4291987419128418},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4208410978317261},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.18929868936538696}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7476109266281128},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6952171921730042},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4511989951133728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43613487482070923},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4291987419128418},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4208410978317261},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.18929868936538696}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724426","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt61001.2024.10724426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2981785303","https://openalex.org/W3126432696","https://openalex.org/W3127303671","https://openalex.org/W3135602980","https://openalex.org/W3189143477","https://openalex.org/W3197233311","https://openalex.org/W3216092247","https://openalex.org/W4200196864","https://openalex.org/W4281774134","https://openalex.org/W4293087755","https://openalex.org/W4365788290","https://openalex.org/W4378569325","https://openalex.org/W4390450536","https://openalex.org/W4393066029"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"Digital":[0],"Image":[1,16,29],"as":[2],"a":[3,8,111],"form":[4],"of":[5,11,22,37,120,131,171],"data":[6,133],"is":[7,20,91,103],"critical":[9,124],"component":[10],"the":[12,23,38,47,62,128,159,163,169,180],"digital":[13,33],"age.":[14],"Therefore,":[15],"Encryption":[17,49,54],"and":[18,50,57,71,82,97,118,150,173,176],"Decryption":[19,51],"one":[21,36,89],"important":[24,39],"aspect":[25],"for":[26,31,65,80,85,93,105,108,157,179],"modern":[27],"communication.":[28],"security":[30,67,96,181],"such":[32],"images":[34],"remain":[35],"questions":[40],"to":[41,127],"be":[42],"answered":[43],"[14][15].":[44],"Among":[45],"all":[46],"advanced":[48,69],"algorithm,":[52],"Advanced":[53],"Standard":[55],"(AES)":[56],"Chaotic":[58,101],"Map":[59,102],"Algorithm":[60],"remains":[61],"prominent":[63],"approaches":[64,84],"image":[66,132],"through":[68],"encryption":[70,81,172],"decryption":[72,83,174],"approaches.":[73],"This":[74],"Study":[75],"undertakes":[76],"these":[77,121],"two":[78],"algorithm":[79],"image.":[86],"AES":[87],"on":[88,168],"hand":[90],"considered":[92,104,156],"its":[94,106],"strong":[95],"consistent":[98],"performance":[99,115],"whereas":[100],"dynamics":[107],"encryption.":[109],"In":[110],"Big":[112],"Data":[113],"scenario,":[114],"efficiency,":[116],"scalability,":[117],"robustness":[119],"algorithms":[122,164],"are":[123,155,165],"factors":[125],"due":[126],"large":[129],"volumes":[130],"involved.":[134],"Further":[135],"statistical":[136],"analysis":[137],"including":[138],"Entropy,":[139],"Mean":[140],"Squared":[141],"Error":[142],"(MSE),":[143],"Correlation":[144],"Coefficient,":[145],"Peak":[146],"Signal-to-Noise":[147],"Ratio":[148],"(PSNR),":[149],"Structural":[151],"Similarity":[152],"Index":[153],"(SSIM)":[154],"both":[158,162],"algorithms.":[160],"Additionally":[161],"further":[166],"evaluated":[167],"basis":[170],"time":[175],"key":[177],"sensitivity":[178],"reasons.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
