{"id":"https://openalex.org/W2091712260","doi":"https://doi.org/10.1109/ictc.2012.6387119","title":"A new digital anti-counterfeiting scheme based on chaotic cryptography","display_name":"A new digital anti-counterfeiting scheme based on chaotic cryptography","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W2091712260","doi":"https://doi.org/10.1109/ictc.2012.6387119","mag":"2091712260"},"language":"en","primary_location":{"id":"doi:10.1109/ictc.2012.6387119","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2012.6387119","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on ICT Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000730148","display_name":"Suying Sheng","orcid":"https://orcid.org/0000-0002-3363-7775"},"institutions":[{"id":"https://openalex.org/I199305430","display_name":"Nantong University","ror":"https://ror.org/02afcvw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I199305430"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Suying Sheng","raw_affiliation_strings":["School of Electrical Engineering, Nantong University, Jiangsu, China","School of Electrical Engineering, Nantong University, Jiangsu, 226019, China"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Nantong University, Jiangsu, China","institution_ids":["https://openalex.org/I199305430"]},{"raw_affiliation_string":"School of Electrical Engineering, Nantong University, Jiangsu, 226019, China","institution_ids":["https://openalex.org/I199305430"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102730379","display_name":"Xinhua Wu","orcid":"https://orcid.org/0009-0007-7440-2175"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xinhua Wu","raw_affiliation_strings":["Modern Education Technology Center, Nantong Textile Vocational Technology College, Jiangsu, China","Modern Education Technology Center, Nantong Textile Vocational Technology College, Jiangsu, 226007, China"],"affiliations":[{"raw_affiliation_string":"Modern Education Technology Center, Nantong Textile Vocational Technology College, Jiangsu, China","institution_ids":[]},{"raw_affiliation_string":"Modern Education Technology Center, Nantong Textile Vocational Technology College, Jiangsu, 226007, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5000730148"],"corresponding_institution_ids":["https://openalex.org/I199305430"],"apc_list":null,"apc_paid":null,"fwci":0.2745,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.59385071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"687","last_page":"691"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7164784669876099},{"id":"https://openalex.org/keywords/counterfeit","display_name":"Counterfeit","score":0.7026488184928894},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7019369602203369},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6663706302642822},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.646355152130127},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6296000480651855},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.6197769641876221},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.616872251033783},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5703219771385193},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5325794219970703},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4807841181755066},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.4700329005718231},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.431867778301239},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.42080506682395935},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11427628993988037},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08322080969810486},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.07047519087791443}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7164784669876099},{"id":"https://openalex.org/C2779356469","wikidata":"https://www.wikidata.org/wiki/Q502918","display_name":"Counterfeit","level":2,"score":0.7026488184928894},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7019369602203369},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6663706302642822},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.646355152130127},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6296000480651855},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.6197769641876221},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.616872251033783},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5703219771385193},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5325794219970703},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4807841181755066},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.4700329005718231},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.431867778301239},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.42080506682395935},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11427628993988037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08322080969810486},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.07047519087791443},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc.2012.6387119","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2012.6387119","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 International Conference on ICT Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321605","display_name":"Government of Jiangsu Province","ror":"https://ror.org/004svx814"},{"id":"https://openalex.org/F4320323090","display_name":"Nantong University","ror":"https://ror.org/02afcvw97"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1549350919","https://openalex.org/W1971005568","https://openalex.org/W1973629908","https://openalex.org/W2006748171","https://openalex.org/W2022920978","https://openalex.org/W2043811010","https://openalex.org/W2056731742","https://openalex.org/W2057835419","https://openalex.org/W2059525010","https://openalex.org/W2062733354","https://openalex.org/W2075197357","https://openalex.org/W2119101106","https://openalex.org/W2143110586","https://openalex.org/W2539661523","https://openalex.org/W6632925716","https://openalex.org/W6680989438","https://openalex.org/W6728714893"],"related_works":["https://openalex.org/W191975850","https://openalex.org/W2923596684","https://openalex.org/W2598516359","https://openalex.org/W4283731382","https://openalex.org/W2048248500","https://openalex.org/W2085693316","https://openalex.org/W2520995581","https://openalex.org/W2342603380","https://openalex.org/W4285815356","https://openalex.org/W2057152612"],"abstract_inverted_index":{"Anti-counterfeit":[0],"has":[1,18],"becoming":[2],"a":[3,23,74,80,107],"worldwide":[4],"research":[5],"focus":[6],"with":[7],"the":[8,121],"proliferation":[9],"of":[10,28,83,101],"fake":[11],"and":[12,36,46,68,79,91,128],"inferior.":[13],"Existing":[14],"digital":[15,52,108],"anti-counterfeiting":[16,53,66,99,109,123],"technology":[17],"been":[19],"difficult":[20],"to":[21,96,113],"go":[22],"long":[24],"way,":[25],"mainly":[26],"because":[27],"its":[29],"low":[30],"code":[31,67,70],"security,":[32],"mutual":[33,104],"authentication":[34],"lacking,":[35],"long-term":[37],"faced":[38],"security":[39],"loopholes":[40],"such":[41],"as":[42,95],"recycling,":[43],"batch":[44],"copy":[45],"database":[47],"attack":[48],"fraud.":[49],"A":[50],"novel":[51],"scheme":[54,100,124],"is":[55,86,111,118,125],"proposed":[56,122],"based":[57],"on":[58],"chaotic":[59,76],"cryptography":[60],"in":[61],"this":[62],"paper.":[63],"The":[64],"commodity":[65],"verification":[69],"are":[71],"generated":[72],"using":[73],"new":[75,81],"encryption":[77],"algorithm,":[78],"type":[82],"checking":[84],"algorithm":[85],"presented":[87],"which":[88],"supports":[89],"multiple":[90],"repeat":[92],"query,":[93],"so":[94],"form":[97],"an":[98],"\u201ctwo":[102],"codes,":[103],"authentication\u201d.":[105],"Then":[106],"system":[110],"constructed":[112],"realize":[114],"intelligent":[115],"identification.":[116],"It":[117],"proved":[119],"that":[120],"effective,":[126],"practical":[127],"reliable.":[129]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
