{"id":"https://openalex.org/W1965375015","doi":"https://doi.org/10.1109/icumt.2009.5345645","title":"Images encryption via Discrete Fractional Fourier Transform and Jigsaw transform. Case study: Fingerprints","display_name":"Images encryption via Discrete Fractional Fourier Transform and Jigsaw transform. Case study: Fingerprints","publication_year":2009,"publication_date":"2009-10-01","ids":{"openalex":"https://openalex.org/W1965375015","doi":"https://doi.org/10.1109/icumt.2009.5345645","mag":"1965375015"},"language":"en","primary_location":{"id":"doi:10.1109/icumt.2009.5345645","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt.2009.5345645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Ultra Modern Telecommunications &amp; Workshops","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057874522","display_name":"Juan M. Vilardy","orcid":"https://orcid.org/0000-0003-2180-2822"},"institutions":[{"id":"https://openalex.org/I3129345357","display_name":"Popular University of Cesar","ror":"https://ror.org/05pzmdf74","country_code":"CO","type":"education","lineage":["https://openalex.org/I3129345357"]}],"countries":["CO"],"is_corresponding":true,"raw_author_name":"Juan M. Vilardy O","raw_affiliation_strings":["Sede balneario Hurtado, Universidad Popular del Cesar, Valledupar, Colombia","Laboratorio de \u00d3ptica e Inform\u00e1tica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Colombia, USA"],"affiliations":[{"raw_affiliation_string":"Sede balneario Hurtado, Universidad Popular del Cesar, Valledupar, Colombia","institution_ids":["https://openalex.org/I3129345357"]},{"raw_affiliation_string":"Laboratorio de \u00d3ptica e Inform\u00e1tica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Colombia, USA","institution_ids":["https://openalex.org/I3129345357"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023324367","display_name":"C\u00e9sar O. Torres","orcid":"https://orcid.org/0000-0001-5779-2115"},"institutions":[{"id":"https://openalex.org/I3129345357","display_name":"Popular University of Cesar","ror":"https://ror.org/05pzmdf74","country_code":"CO","type":"education","lineage":["https://openalex.org/I3129345357"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Cesar O. Torres M","raw_affiliation_strings":["Sede balneario Hurtado, Universidad Popular del Cesar, Valledupar, Colombia","Laboratorio de \u00d3ptica e Inform\u00e1tica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Colombia, USA"],"affiliations":[{"raw_affiliation_string":"Sede balneario Hurtado, Universidad Popular del Cesar, Valledupar, Colombia","institution_ids":["https://openalex.org/I3129345357"]},{"raw_affiliation_string":"Laboratorio de \u00d3ptica e Inform\u00e1tica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Colombia, USA","institution_ids":["https://openalex.org/I3129345357"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110312481","display_name":"Lorenzo Mattos","orcid":null},"institutions":[{"id":"https://openalex.org/I3129345357","display_name":"Popular University of Cesar","ror":"https://ror.org/05pzmdf74","country_code":"CO","type":"education","lineage":["https://openalex.org/I3129345357"]}],"countries":["CO"],"is_corresponding":false,"raw_author_name":"Lorenzo Mattos V","raw_affiliation_strings":["Sede balneario Hurtado, Universidad Popular del Cesar, Valledupar, Colombia","Laboratorio de \u00d3ptica e Inform\u00e1tica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Colombia, USA"],"affiliations":[{"raw_affiliation_string":"Sede balneario Hurtado, Universidad Popular del Cesar, Valledupar, Colombia","institution_ids":["https://openalex.org/I3129345357"]},{"raw_affiliation_string":"Laboratorio de \u00d3ptica e Inform\u00e1tica, Universidad Popular del Cesar, Sede balneario Hurtado, Valledupar, Colombia, USA","institution_ids":["https://openalex.org/I3129345357"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057874522"],"corresponding_institution_ids":["https://openalex.org/I3129345357"],"apc_list":null,"apc_paid":null,"fwci":0.8097,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66685838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11210","display_name":"Mathematical Analysis and Transform Methods","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2604","display_name":"Applied Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11210","display_name":"Mathematical Analysis and Transform Methods","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2604","display_name":"Applied Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9708999991416931,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fractional-fourier-transform","display_name":"Fractional Fourier transform","score":0.83865886926651},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8385642766952515},{"id":"https://openalex.org/keywords/hartley-transform","display_name":"Hartley transform","score":0.5979300737380981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5895525217056274},{"id":"https://openalex.org/keywords/jigsaw","display_name":"Jigsaw","score":0.5417388677597046},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5397629737854004},{"id":"https://openalex.org/keywords/discrete-fourier-transform","display_name":"Discrete Fourier transform (general)","score":0.5234317779541016},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5169369578361511},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5049381852149963},{"id":"https://openalex.org/keywords/fourier-transform","display_name":"Fourier transform","score":0.48352503776550293},{"id":"https://openalex.org/keywords/discrete-hartley-transform","display_name":"Discrete Hartley transform","score":0.44686877727508545},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.43026095628738403},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4259759783744812},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4029541015625},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.35358625650405884},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.30913737416267395},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29102909564971924},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09754425287246704},{"id":"https://openalex.org/keywords/fourier-analysis","display_name":"Fourier analysis","score":0.08479097485542297}],"concepts":[{"id":"https://openalex.org/C76563020","wikidata":"https://www.wikidata.org/wiki/Q4817582","display_name":"Fractional Fourier transform","level":4,"score":0.83865886926651},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8385642766952515},{"id":"https://openalex.org/C67757890","wikidata":"https://www.wikidata.org/wiki/Q1567607","display_name":"Hartley transform","level":5,"score":0.5979300737380981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5895525217056274},{"id":"https://openalex.org/C2779405079","wikidata":"https://www.wikidata.org/wiki/Q356040","display_name":"Jigsaw","level":2,"score":0.5417388677597046},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5397629737854004},{"id":"https://openalex.org/C57733114","wikidata":"https://www.wikidata.org/wiki/Q1006032","display_name":"Discrete Fourier transform (general)","level":5,"score":0.5234317779541016},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5169369578361511},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5049381852149963},{"id":"https://openalex.org/C102519508","wikidata":"https://www.wikidata.org/wiki/Q6520159","display_name":"Fourier transform","level":2,"score":0.48352503776550293},{"id":"https://openalex.org/C192853989","wikidata":"https://www.wikidata.org/wiki/Q1006531","display_name":"Discrete Hartley transform","level":5,"score":0.44686877727508545},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.43026095628738403},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4259759783744812},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4029541015625},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.35358625650405884},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.30913737416267395},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29102909564971924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09754425287246704},{"id":"https://openalex.org/C203024314","wikidata":"https://www.wikidata.org/wiki/Q1365258","display_name":"Fourier analysis","level":3,"score":0.08479097485542297},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C145420912","wikidata":"https://www.wikidata.org/wiki/Q853077","display_name":"Mathematics education","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icumt.2009.5345645","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icumt.2009.5345645","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 International Conference on Ultra Modern Telecommunications &amp; Workshops","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1974911306","https://openalex.org/W2057875231","https://openalex.org/W2090697566","https://openalex.org/W2108710836","https://openalex.org/W2130207750","https://openalex.org/W2146360671","https://openalex.org/W2149669954","https://openalex.org/W2155023014"],"related_works":["https://openalex.org/W2006724675","https://openalex.org/W4234987225","https://openalex.org/W2161459641","https://openalex.org/W2057012375","https://openalex.org/W1908181305","https://openalex.org/W4238370364","https://openalex.org/W1507457523","https://openalex.org/W2079532927","https://openalex.org/W3197029778","https://openalex.org/W1966131088"],"abstract_inverted_index":{"A":[0],"new":[1,92],"images":[2,79],"encryption":[3,23,94,98],"method":[4],"using":[5],"The":[6,18],"discrete":[7],"fractional":[8,83,120],"Fourier":[9,84],"transform":[10,15,62,85],"(DFrFT)":[11],"and":[12,32,71,122],"the":[13,27,34,38,60,63,66,72,91,109,117,123],"Jigsaw":[14,61,129],"is":[16,25,30,69],"proposed.":[17],"main":[19],"feature":[20],"of":[21,65],"this":[22,42],"scheme":[24],"that":[26],"encrypted":[28,43,67],"image":[29,44,68],"real":[31],"has":[33],"same":[35],"size":[36],"as":[37],"original":[39],"one,":[40],"being":[41],"much":[45],"more":[46],"convenient":[47],"for":[48,90,136,148],"either":[49],"its":[50,53],"storage":[51],"or":[52],"transmission":[54],"on":[55,82],"digital":[56,99],"communication":[57],"networks.":[58],"Using":[59],"security":[64,144],"increased":[70],"random":[73,125],"phase":[74],"masks":[75],"used":[76,107,127],"in":[77,108,128,145],"many":[78],"cryptosystems":[80],"based":[81],"(FrFT)":[86],"are":[87,104,114,134],"eliminated.":[88],"Finally,":[89],"proposed":[93],"method,":[95],"a":[96,137,141,149],"fingerprint":[97],"algorithm":[100,111],"was":[101],"developed.":[102],"There":[103],"twelve":[105],"keys":[106,133],"cryptographic":[110],"implemented,":[112],"which":[113],"constituted":[115],"by":[116],"six":[118,124],"DFrFTs":[119],"orders":[121],"permutations":[126],"transform;":[130],"all":[131],"these":[132],"necessary":[135],"correct":[138],"decryption,":[139],"obtaining":[140],"high":[142],"level":[143],"protecting":[146],"fingerprints":[147],"particular":[150],"application.":[151]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
