{"id":"https://openalex.org/W2873491037","doi":"https://doi.org/10.1109/ivcnz.2017.8402486","title":"Image encryption based on double random phase encoding","display_name":"Image encryption based on double random phase encoding","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2873491037","doi":"https://doi.org/10.1109/ivcnz.2017.8402486","mag":"2873491037"},"language":"en","primary_location":{"id":"doi:10.1109/ivcnz.2017.8402486","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ivcnz.2017.8402486","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Image and Vision Computing New Zealand (IVCNZ)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://openrepository.aut.ac.nz/bitstreams/20a189ba-ca32-47f7-b620-f0a58ea41e09/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100462338","display_name":"Zhe Liu","orcid":"https://orcid.org/0000-0001-6753-0303"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Zhe Liu","raw_affiliation_strings":["Department of Computer Science, Auckland University of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015329525","display_name":"Mee Loong Yang","orcid":"https://orcid.org/0000-0001-9028-493X"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Mee Loong Yang","raw_affiliation_strings":["Department of Computer Science, Auckland University of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109048109","display_name":"Wei Qi Yan","orcid":"https://orcid.org/0000-0003-2573-0272"},"institutions":[{"id":"https://openalex.org/I39854758","display_name":"Auckland University of Technology","ror":"https://ror.org/01zvqw119","country_code":"NZ","type":"education","lineage":["https://openalex.org/I39854758"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Wei Qi Yan","raw_affiliation_strings":["Department of Computer Science, Auckland University of Technology, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Auckland University of Technology, Auckland, New Zealand","institution_ids":["https://openalex.org/I39854758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100462338"],"corresponding_institution_ids":["https://openalex.org/I39854758"],"apc_list":null,"apc_paid":null,"fwci":0.37,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.71287619,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"4","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.822923481464386},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.8119093179702759},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8032745122909546},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7072271704673767},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.6551110744476318},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5962928533554077},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5839259624481201},{"id":"https://openalex.org/keywords/discrete-fourier-transform","display_name":"Discrete Fourier transform (general)","score":0.4812576472759247},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.47567668557167053},{"id":"https://openalex.org/keywords/phase","display_name":"Phase (matter)","score":0.42440640926361084},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42242810130119324},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.4132741093635559},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4034525454044342},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3587898015975952},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32894212007522583},{"id":"https://openalex.org/keywords/fourier-transform","display_name":"Fourier transform","score":0.32888883352279663},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21807914972305298},{"id":"https://openalex.org/keywords/fractional-fourier-transform","display_name":"Fractional Fourier transform","score":0.18557459115982056},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1284348964691162}],"concepts":[{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.822923481464386},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.8119093179702759},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8032745122909546},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7072271704673767},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.6551110744476318},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5962928533554077},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5839259624481201},{"id":"https://openalex.org/C57733114","wikidata":"https://www.wikidata.org/wiki/Q1006032","display_name":"Discrete Fourier transform (general)","level":5,"score":0.4812576472759247},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.47567668557167053},{"id":"https://openalex.org/C44280652","wikidata":"https://www.wikidata.org/wiki/Q104837","display_name":"Phase (matter)","level":2,"score":0.42440640926361084},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42242810130119324},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.4132741093635559},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4034525454044342},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3587898015975952},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32894212007522583},{"id":"https://openalex.org/C102519508","wikidata":"https://www.wikidata.org/wiki/Q6520159","display_name":"Fourier transform","level":2,"score":0.32888883352279663},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21807914972305298},{"id":"https://openalex.org/C76563020","wikidata":"https://www.wikidata.org/wiki/Q4817582","display_name":"Fractional Fourier transform","level":4,"score":0.18557459115982056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1284348964691162},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C203024314","wikidata":"https://www.wikidata.org/wiki/Q1365258","display_name":"Fourier analysis","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ivcnz.2017.8402486","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ivcnz.2017.8402486","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Image and Vision Computing New Zealand (IVCNZ)","raw_type":"proceedings-article"},{"id":"pmh:oai:openrepository.aut.ac.nz:10292/12808","is_oa":true,"landing_page_url":"https://hdl.handle.net/10292/12808","pdf_url":"https://openrepository.aut.ac.nz/bitstreams/20a189ba-ca32-47f7-b620-f0a58ea41e09/download","source":{"id":"https://openalex.org/S4306401809","display_name":"Tuwhera (Auckland University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39854758","host_organization_name":"Auckland University of Technology","host_organization_lineage":["https://openalex.org/I39854758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Contribution"}],"best_oa_location":{"id":"pmh:oai:openrepository.aut.ac.nz:10292/12808","is_oa":true,"landing_page_url":"https://hdl.handle.net/10292/12808","pdf_url":"https://openrepository.aut.ac.nz/bitstreams/20a189ba-ca32-47f7-b620-f0a58ea41e09/download","source":{"id":"https://openalex.org/S4306401809","display_name":"Tuwhera (Auckland University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39854758","host_organization_name":"Auckland University of Technology","host_organization_lineage":["https://openalex.org/I39854758"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Contribution"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2873491037.pdf","grobid_xml":"https://content.openalex.org/works/W2873491037.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W1580389772","https://openalex.org/W1916685473","https://openalex.org/W1971205388","https://openalex.org/W1974911306","https://openalex.org/W1976386768","https://openalex.org/W2010306026","https://openalex.org/W2010620862","https://openalex.org/W2013503531","https://openalex.org/W2025970979","https://openalex.org/W2026503049","https://openalex.org/W2028154218","https://openalex.org/W2031614119","https://openalex.org/W2032037131","https://openalex.org/W2032901530","https://openalex.org/W2059340344","https://openalex.org/W2059538387","https://openalex.org/W2067341309","https://openalex.org/W2071656348","https://openalex.org/W2088694610","https://openalex.org/W2115605660","https://openalex.org/W2144649139","https://openalex.org/W2146360671","https://openalex.org/W2149323482","https://openalex.org/W2255558946","https://openalex.org/W2385640443","https://openalex.org/W2621784428","https://openalex.org/W2728099286","https://openalex.org/W2733875307","https://openalex.org/W4239883234","https://openalex.org/W6710294532"],"related_works":["https://openalex.org/W2388309748","https://openalex.org/W2150576912","https://openalex.org/W3017028162","https://openalex.org/W2108727544","https://openalex.org/W1997621773","https://openalex.org/W2112053570","https://openalex.org/W2963134360","https://openalex.org/W2947966936","https://openalex.org/W2145506072","https://openalex.org/W4229011731"],"abstract_inverted_index":{"In":[0],"this":[1,107],"paper,":[2],"we":[3],"propose":[4],"an":[5],"improved":[6,87],"image":[7],"encryption":[8],"algorithm":[9,25,76,88,108],"based":[10],"on":[11,43],"double":[12],"random":[13,53,57],"phase":[14,58],"encoding":[15],"(DRPE).":[16],"Our":[17],"contribution":[18],"is":[19,109,112],"the":[20,61,68,75,86,117],"design":[21],"of":[22,56,70,80,91,106],"a":[23,48],"new":[24],"which":[26],"uses":[27],"Discrete":[28,34],"Cosine":[29],"Transform":[30,36],"(DCT)":[31],"to":[32,40,51,66,114],"replace":[33],"Fourier":[35],"(DFT)":[37],"so":[38,64],"as":[39,65],"avoid":[41],"operations":[42],"complex":[44],"numbers.":[45],"We":[46,73],"use":[47],"logistic":[49],"map":[50],"generate":[52],"matrices":[54],"instead":[55],"masks":[59],"in":[60],"traditional":[62,92],"DRPE":[63],"decrease":[67],"number":[69],"secret":[71],"keys.":[72],"tested":[74],"using":[77],"five":[78],"types":[79],"attacks.":[81,103],"The":[82],"results":[83],"indicate":[84],"that":[85,110],"overcomes":[89],"weaknesses":[90],"scrambling":[93],"methods":[94],"and":[95],"it":[96,111],"has":[97],"shown":[98],"strong":[99],"resilience":[100],"against":[101],"statistical":[102],"An":[104],"advantage":[105],"convenient":[113],"verify":[115],"whether":[116],"encrypted":[118],"images":[119],"have":[120],"been":[121],"tampered":[122],"with.":[123]},"counts_by_year":[{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
