{"id":"https://openalex.org/W4416251764","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227573","title":"A Novel Feature-Aware Chaotic Image Encryption Scheme For Data Security and Privacy in IoT and Edge Networks","display_name":"A Novel Feature-Aware Chaotic Image Encryption Scheme For Data Security and Privacy in IoT and Edge Networks","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416251764","doi":"https://doi.org/10.1109/ijcnn64981.2025.11227573"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11227573","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227573","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005946268","display_name":"Muhammad Shahbaz Khan","orcid":"https://orcid.org/0000-0002-7166-6681"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Muhammad Shahbaz Khan","raw_affiliation_strings":["Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023246930","display_name":"Ahmed Al\u2010Dubai","orcid":"https://orcid.org/0000-0001-9758-5540"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ahmed Al-Dubai","raw_affiliation_strings":["Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113119142","display_name":"Jawad Ahmad","orcid":null},"institutions":[{"id":"https://openalex.org/I138564716","display_name":"Prince Mohammad bin Fahd University","ror":"https://ror.org/03d64na34","country_code":"SA","type":"education","lineage":["https://openalex.org/I138564716"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Jawad Ahmad","raw_affiliation_strings":["Prince Mohammad Bin Fahd University,Cyber Security Center,Al-Khobar,Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Prince Mohammad Bin Fahd University,Cyber Security Center,Al-Khobar,Saudi Arabia","institution_ids":["https://openalex.org/I138564716"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082150685","display_name":"Nikolaos Pitropakis","orcid":"https://orcid.org/0000-0002-3392-9970"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nikolaos Pitropakis","raw_affiliation_strings":["Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","institution_ids":["https://openalex.org/I251738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002269681","display_name":"Baraq Ghaleb","orcid":"https://orcid.org/0000-0002-8361-0634"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Baraq Ghaleb","raw_affiliation_strings":["Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University,School of Computing, Engineering and the Built Environment,Edinburgh,UK","institution_ids":["https://openalex.org/I251738"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005946268"],"corresponding_institution_ids":["https://openalex.org/I251738"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37513844,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9559000134468079,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9559000134468079,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.004800000227987766,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.004699999932199717,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7616999745368958},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5486999750137329},{"id":"https://openalex.org/keywords/bitwise-operation","display_name":"Bitwise operation","score":0.5257999897003174},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5196999907493591},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5052000284194946},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3970000147819519},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.3799000084400177},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.34619998931884766}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7616999745368958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6931999921798706},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5486999750137329},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.5257999897003174},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5196999907493591},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5052000284194946},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40059998631477356},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3970000147819519},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3831000030040741},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3799000084400177},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3619000017642975},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.34619998931884766},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.3456999957561493},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.33480000495910645},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32440000772476196},{"id":"https://openalex.org/C124504099","wikidata":"https://www.wikidata.org/wiki/Q56933","display_name":"Image segmentation","level":3,"score":0.32170000672340393},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3206000030040741},{"id":"https://openalex.org/C35898486","wikidata":"https://www.wikidata.org/wiki/Q498186","display_name":"Exclusive or","level":3,"score":0.3158000111579895},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.3107999861240387},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3003000020980835},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.2971999943256378},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28459998965263367},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.27000001072883606},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2531999945640564}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11227573","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11227573","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1638185289","https://openalex.org/W2003544295","https://openalex.org/W2939162399","https://openalex.org/W4212991603","https://openalex.org/W4213452758","https://openalex.org/W4220999534","https://openalex.org/W4225079894","https://openalex.org/W4289813026","https://openalex.org/W4385877748","https://openalex.org/W4389576022","https://openalex.org/W4393242436","https://openalex.org/W4397000166","https://openalex.org/W4399728471","https://openalex.org/W4401047036","https://openalex.org/W4401487129","https://openalex.org/W4405020303"],"related_works":[],"abstract_inverted_index":{"The":[0,89,176],"security":[1,85,149],"of":[2,8,21,93,179],"image":[3,46],"data":[4],"in":[5,51,189],"the":[6,18,155,180],"Internet":[7],"Things":[9],"(IoT)":[10],"and":[11,33,42,80,100,106,132,150,171],"edge":[12,108],"networks":[13],"is":[14],"crucial":[15],"due":[16],"to":[17,49,83,169],"increasing":[19],"deployment":[20,188],"intelligent":[22],"systems":[23],"for":[24,38,44,111,129,144,186],"real-time":[25,187],"decision-making.":[26],"Traditional":[27],"encryption":[28],"algorithms":[29],"such":[30],"as":[31],"AES":[32],"RSA":[34],"are":[35],"computationally":[36],"expensive":[37],"resource-constrained":[39,190],"IoT":[40],"devices":[41],"ineffective":[43],"large-volume":[45],"data,":[47],"leading":[48],"inefficiencies":[50],"privacy-preserving":[52],"distributed":[53],"learning":[54],"applications.":[55],"To":[56],"address":[57],"these":[58],"concerns,":[59],"this":[60],"paper":[61],"proposes":[62],"a":[63,120],"novel":[64],"Feature-Aware":[65,72],"Chaotic":[66,77,115,134],"Image":[67],"Encryption":[68],"scheme":[69,91,157,182],"that":[70,154],"integrates":[71],"Pixel":[73],"Segmentation":[74],"(FAPS)":[75],"with":[76,124],"Chain":[78,116],"Permutation":[79],"Confusion":[81],"mechanisms":[82],"enhance":[84],"while":[86],"maintaining":[87],"efficiency.":[88],"proposed":[90,156,181],"consists":[92],"three":[94],"stages:":[95],"(1)":[96],"FAPS,":[97],"which":[98,118,137],"extracts":[99],"reorganizes":[101],"pixels":[102],"based":[103],"on":[104],"high":[105,165],"low":[107],"intensity":[109],"features":[110],"correlation":[112],"disruption;":[113],"(2)":[114],"Permutation,":[117],"employs":[119],"logistic":[121],"chaotic":[122,141],"map":[123],"SHA256-based":[125],"dynamically":[126,139],"updated":[127],"keys":[128],"block-wise":[130],"permutation;":[131],"(3)":[133],"chain":[135],"Confusion,":[136],"utilises":[138],"generated":[140],"seed":[142],"matrices":[143],"bitwise":[145],"XOR":[146],"operations.":[147],"Extensive":[148],"performance":[151],"evaluations":[152],"demonstrate":[153],"significantly":[158],"reduces":[159],"pixel":[160],"correlation\u2014":[161],"almost":[162],"zero,":[163],"achieves":[164],"entropy":[166],"values":[167],"close":[168],"8,":[170],"resists":[172],"differential":[173],"cryptographic":[174],"attacks.":[175],"optimum":[177],"design":[178],"makes":[183],"it":[184],"suitable":[185],"environments.":[191]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
