{"id":"https://openalex.org/W7147156805","doi":"https://doi.org/10.1109/icvisp68610.2025.11451717","title":"Facial Image Encryption Using Coupled Sine-Gaussian Chaotic Map and Self-reversible Cellular Automaton Diffusion","display_name":"Facial Image Encryption Using Coupled Sine-Gaussian Chaotic Map and Self-reversible Cellular Automaton Diffusion","publication_year":2025,"publication_date":"2025-11-28","ids":{"openalex":"https://openalex.org/W7147156805","doi":"https://doi.org/10.1109/icvisp68610.2025.11451717"},"language":null,"primary_location":{"id":"doi:10.1109/icvisp68610.2025.11451717","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icvisp68610.2025.11451717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 9th International Conference on Vision, Image and Signal Processing (ICVISP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076732025","display_name":"Tingyu An","orcid":"https://orcid.org/0000-0003-3429-7482"},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tingyu An","raw_affiliation_strings":["Chang&#x2019;an University,School of Information Engineering,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Chang&#x2019;an University,School of Information Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I25355098"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132684769","display_name":"Tao Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao Gao","raw_affiliation_strings":["Chang&#x2019;an University,School of Data Science and Artificial Intelligence,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Chang&#x2019;an University,School of Data Science and Artificial Intelligence,Xi&#x2019;an,China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5132686872","display_name":"Ting Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I25355098","display_name":"Chang'an University","ror":"https://ror.org/05mxya461","country_code":"CN","type":"education","lineage":["https://openalex.org/I25355098"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Chen","raw_affiliation_strings":["Chang&#x2019;an University,School of Information Engineering,Xi&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"Chang&#x2019;an University,School of Information Engineering,Xi&#x2019;an,China","institution_ids":["https://openalex.org/I25355098"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076732025"],"corresponding_institution_ids":["https://openalex.org/I25355098"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74882441,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.8598999977111816,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.8598999977111816,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.04349999874830246,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11347","display_name":"Neural Networks Stability and Synchronization","score":0.01640000008046627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6578999757766724},{"id":"https://openalex.org/keywords/cellular-automaton","display_name":"Cellular automaton","score":0.6040999889373779},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.5914999842643738},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5679000020027161},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5206000208854675},{"id":"https://openalex.org/keywords/ergodicity","display_name":"Ergodicity","score":0.4449000060558319},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4302000105381012},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4025000035762787}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6578999757766724},{"id":"https://openalex.org/C35527583","wikidata":"https://www.wikidata.org/wiki/Q189156","display_name":"Cellular automaton","level":2,"score":0.6040999889373779},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.5914999842643738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5863000154495239},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5679000020027161},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5206000208854675},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5059000253677368},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4867999851703644},{"id":"https://openalex.org/C201779956","wikidata":"https://www.wikidata.org/wiki/Q5426803","display_name":"Ergodicity","level":2,"score":0.4449000060558319},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4302000105381012},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4025000035762787},{"id":"https://openalex.org/C131584629","wikidata":"https://www.wikidata.org/wiki/Q4308705","display_name":"Coupling (piping)","level":2,"score":0.367000013589859},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.3400000035762787},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.3382999897003174},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.3319999873638153},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.329800009727478},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.32679998874664307},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.322299987077713},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.31529998779296875},{"id":"https://openalex.org/C186661526","wikidata":"https://www.wikidata.org/wiki/Q13647261","display_name":"Sine","level":2,"score":0.29989999532699585},{"id":"https://openalex.org/C69357855","wikidata":"https://www.wikidata.org/wiki/Q163214","display_name":"Diffusion","level":2,"score":0.29899999499320984},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29660001397132874},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.29159998893737793},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.27079999446868896},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.25850000977516174}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icvisp68610.2025.11451717","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icvisp68610.2025.11451717","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 9th International Conference on Vision, Image and Signal Processing (ICVISP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5353280901908875,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2999435040","https://openalex.org/W3005237946","https://openalex.org/W3044259267","https://openalex.org/W3153874840","https://openalex.org/W4281889728","https://openalex.org/W4297825311","https://openalex.org/W4328103222","https://openalex.org/W4377030658","https://openalex.org/W4389702458","https://openalex.org/W4390547274","https://openalex.org/W4406052309","https://openalex.org/W4407026506","https://openalex.org/W4407693436","https://openalex.org/W4407736116","https://openalex.org/W4411016691","https://openalex.org/W4412458373"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,99,118],"rapid":[2],"advancement":[3],"of":[4,140],"network":[5],"communication":[6],"technologies,":[7],"facial":[8,91,141],"image":[9,19],"privacy":[10],"has":[11],"become":[12],"a":[13,25,40,58,70,90],"critical":[14],"concern.":[15],"However,":[16],"existing":[17],"chaos-based":[18],"encryption":[20,93],"schemes":[21],"often":[22],"suffer":[23],"from":[24],"limited":[26],"key":[27],"space":[28],"and":[29,50,63,108,113,125,138],"weak":[30],"chaotic":[31,43],"dynamics.":[32],"To":[33],"overcome":[34],"these":[35],"limitations,":[36],"this":[37],"paper":[38],"introduces":[39],"novel":[41],"two-dimensional":[42,101],"map,":[44],"termed":[45],"2D-CSGM,":[46,100],"by":[47,97],"coupling":[48],"sine":[49],"Gaussian":[51],"functions.":[52],"Experiments":[53],"show":[54],"that":[55,117],"2D-CSGM":[56],"provides":[57,122],"wide":[59],"effective":[60,133],"parameter":[61],"range":[62],"stronger":[64],"ergodicity":[65],"than":[66],"recent":[67],"baselines.":[68],"Furthermore,":[69],"diffusion":[71,87],"method":[72],"based":[73],"on":[74],"X-shaped":[75,104],"cellular":[76],"automaton":[77],"(CA)":[78],"evolution":[79],"is":[80,95],"proposed,":[81],"which":[82],"achieves":[83],"self-reversibility":[84],"through":[85],"complementary":[86],"rules.":[88],"Finally,":[89],"image-oriented":[92],"scheme":[94,121],"developed":[96],"integrating":[98],"compressive":[102],"sensing,":[103],"reversible":[105],"CA":[106],"evolution,":[107],"bidirectional":[109],"diffusion.":[110],"Security":[111],"analyses":[112],"experimental":[114],"evaluations":[115],"confirm":[116],"proposed":[119],"cryptographic":[120],"high":[123],"security":[124],"strong":[126],"resistance":[127],"against":[128],"common":[129],"attacks,":[130],"offering":[131],"an":[132],"solution":[134],"for":[135],"secure":[136],"transmission":[137],"storage":[139],"images.":[142]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-04-02T00:00:00"}
