{"id":"https://openalex.org/W2771029432","doi":"https://doi.org/10.1109/iceee.2017.8108905","title":"Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain","display_name":"Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2771029432","doi":"https://doi.org/10.1109/iceee.2017.8108905","mag":"2771029432"},"language":"en","primary_location":{"id":"doi:10.1109/iceee.2017.8108905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceee.2017.8108905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101519387","display_name":"Zhengmao Ye","orcid":"https://orcid.org/0000-0001-8897-574X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Zhengmao Ye","raw_affiliation_strings":["College of Engineering, Southern University, Baton Rouge, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Southern University, Baton Rouge, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101875247","display_name":"Hang Yin","orcid":"https://orcid.org/0000-0003-4605-8008"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hang Yin","raw_affiliation_strings":["Liaoning Radio and Television Station, ShenYang, Liaoning, China"],"affiliations":[{"raw_affiliation_string":"Liaoning Radio and Television Station, ShenYang, Liaoning, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039853112","display_name":"Yongmao Ye","orcid":"https://orcid.org/0000-0002-0925-4678"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yongmao Ye","raw_affiliation_strings":["College of Engineering, Southern University, Baton Rouge, USA"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Southern University, Baton Rouge, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101519387"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3641,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.69841516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"6","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9781000018119812,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8094744682312012},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.7572949528694153},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6846401691436768},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.6831330060958862},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.6654653549194336},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.6387799978256226},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.6362849473953247},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.6026687622070312},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.5658011436462402},{"id":"https://openalex.org/keywords/link-encryption","display_name":"Link encryption","score":0.5530402064323425},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.5411545038223267},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.5127735733985901},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4285809099674225},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.4176397919654846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4166450500488281},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1836353838443756}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8094744682312012},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.7572949528694153},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6846401691436768},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.6831330060958862},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.6654653549194336},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.6387799978256226},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.6362849473953247},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.6026687622070312},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.5658011436462402},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.5530402064323425},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.5411545038223267},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.5127735733985901},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4285809099674225},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.4176397919654846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4166450500488281},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1836353838443756}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iceee.2017.8108905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceee.2017.8108905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1966878729","https://openalex.org/W1993489498","https://openalex.org/W2013503531","https://openalex.org/W2017860895","https://openalex.org/W2057697429","https://openalex.org/W2064161181","https://openalex.org/W2085220963","https://openalex.org/W2190925335","https://openalex.org/W2387069894","https://openalex.org/W6654835090"],"related_works":["https://openalex.org/W2389178160","https://openalex.org/W2545514196","https://openalex.org/W4294015800","https://openalex.org/W1993945719","https://openalex.org/W4242647006","https://openalex.org/W2771029432","https://openalex.org/W2175086517","https://openalex.org/W2144246620","https://openalex.org/W3211136635","https://openalex.org/W3042963418"],"abstract_inverted_index":{"Information":[0],"security":[1,53],"is":[2,10],"crucial":[3],"to":[4,12,25,42],"data":[5],"storage":[6],"and":[7,31,37,47,65,69,91,118],"transmission,":[8],"which":[9],"necessary":[11],"protect":[13],"information":[14,32,132],"under":[15],"various":[16],"hostile":[17],"environments.":[18],"Cryptography":[19],"serves":[20],"as":[21,128,130],"a":[22],"major":[23],"element":[24],"ensure":[26,82],"confidentiality":[27],"in":[28,74,115,121,126],"both":[29],"communication":[30],"technology,":[33],"where":[34,100],"the":[35,44,49,104,131],"encryption":[36,61,64,96,109,114,120],"decryption":[38,70],"schemes":[39,97],"are":[40,56,98,110,124],"implemented":[41],"scramble":[43],"pure":[45],"plaintext":[46],"descramble":[48],"secret":[50],"ciphertext":[51],"using":[52],"keys.":[54],"There":[55],"two":[57,94],"dominating":[58],"types":[59],"of":[60,85,93],"schemes:":[62],"deterministic":[63,113],"chaotic":[66,119],"encryption.":[67],"Encryption":[68],"can":[71],"be":[72],"conducted":[73],"either":[75],"spatial":[76,116],"domain":[77,117,123],"or":[78],"frequency":[79,122],"domain.":[80],"To":[81],"secure":[83],"transmission":[84],"digital":[86,107],"information,":[87],"comparisons":[88],"on":[89,103],"merits":[90],"drawbacks":[92],"practical":[95],"conducted,":[99],"case":[101],"studies":[102],"true":[105],"color":[106],"image":[108],"presented.":[111],"Both":[112],"analyzed":[125],"context,":[127],"well":[129],"integrity":[133],"after":[134],"decryption.":[135]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
