{"id":"https://openalex.org/W3036849365","doi":"https://doi.org/10.1109/mce.2020.3003127","title":"P-MEC: Polynomial Congruence-Based Multimedia Encryption Technique Over Cloud","display_name":"P-MEC: Polynomial Congruence-Based Multimedia Encryption Technique Over Cloud","publication_year":2020,"publication_date":"2020-06-19","ids":{"openalex":"https://openalex.org/W3036849365","doi":"https://doi.org/10.1109/mce.2020.3003127","mag":"3036849365"},"language":"en","primary_location":{"id":"doi:10.1109/mce.2020.3003127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mce.2020.3003127","pdf_url":null,"source":{"id":"https://openalex.org/S2483040032","display_name":"IEEE Consumer Electronics Magazine","issn_l":"2162-2248","issn":["2162-2248","2162-2256"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Consumer Electronics Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067996251","display_name":"Rama Krishna Koppanati","orcid":null},"institutions":[{"id":"https://openalex.org/I154851008","display_name":"Indian Institute of Technology Roorkee","ror":"https://ror.org/00582g326","country_code":"IN","type":"education","lineage":["https://openalex.org/I154851008"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rama Krishna Koppanati","raw_affiliation_strings":["Indian Institute of Technology Roorkee, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Roorkee, India","institution_ids":["https://openalex.org/I154851008"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108053908","display_name":"Krishan Kumar","orcid":"https://orcid.org/0000-0002-9296-1655"},"institutions":[{"id":"https://openalex.org/I91277730","display_name":"Maulana Azad National Institute of Technology","ror":"https://ror.org/026vtd268","country_code":"IN","type":"education","lineage":["https://openalex.org/I91277730"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Krishan Kumar","raw_affiliation_strings":["National Institute of Technology, Uttarakahnd, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Technology, Uttarakahnd, India","institution_ids":["https://openalex.org/I91277730"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5067996251"],"corresponding_institution_ids":["https://openalex.org/I154851008"],"apc_list":null,"apc_paid":null,"fwci":2.7355,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.9197923,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"10","issue":"5","first_page":"41","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7287188768386841},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6076003909111023},{"id":"https://openalex.org/keywords/congruence","display_name":"Congruence (geometry)","score":0.5849738121032715},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5654515027999878},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5415937900543213},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.4558618366718292},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.446713924407959},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44542235136032104},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4426631033420563},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3604479432106018},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20732614398002625},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.14419707655906677},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0886099636554718}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7287188768386841},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6076003909111023},{"id":"https://openalex.org/C132074034","wikidata":"https://www.wikidata.org/wiki/Q154210","display_name":"Congruence (geometry)","level":2,"score":0.5849738121032715},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5654515027999878},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5415937900543213},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.4558618366718292},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.446713924407959},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44542235136032104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4426631033420563},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3604479432106018},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20732614398002625},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.14419707655906677},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0886099636554718},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mce.2020.3003127","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mce.2020.3003127","pdf_url":null,"source":{"id":"https://openalex.org/S2483040032","display_name":"IEEE Consumer Electronics Magazine","issn_l":"2162-2248","issn":["2162-2248","2162-2256"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Consumer Electronics Magazine","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2009381528","https://openalex.org/W2059044097","https://openalex.org/W2129034264","https://openalex.org/W2308730378","https://openalex.org/W2626037032","https://openalex.org/W2807517678","https://openalex.org/W2884478609","https://openalex.org/W2896685021","https://openalex.org/W2901111372","https://openalex.org/W2911413844","https://openalex.org/W3004899494","https://openalex.org/W6652643248"],"related_works":["https://openalex.org/W2765817767","https://openalex.org/W1576393384","https://openalex.org/W4289744063","https://openalex.org/W2084042463","https://openalex.org/W2559360015","https://openalex.org/W2078780635","https://openalex.org/W2991484241","https://openalex.org/W2349772833","https://openalex.org/W1973539811","https://openalex.org/W2585771879"],"abstract_inverted_index":{"In":[0],"this":[1,128],"multimedia":[2,7,59,74,152],"era,":[3],"the":[4,10,26,29,38,51,56,62,81,85,108,115,135,151,156,167,174,185],"security":[5,57,178],"of":[6,21,58,73,96,110,113],"content":[8,75],"over":[9,28,61,76],"Cloud":[11,30,63,77],"becomes":[12,64],"a":[13,65,91],"crucial":[14],"research":[15],"area.":[16],"There":[17],"are":[18,43],"several":[19],"modes":[20],"communication":[22,41],"available":[23],"for":[24,117,137],"transmitting":[25],"information":[27,86],"from":[31],"one":[32],"place":[33,36],"to":[34,45,80,149],"another":[35],"around":[37],"globe.":[39],"Such":[40],"networks":[42],"open":[44],"all":[46],"where":[47,84],"anyone":[48],"can":[49,163],"access":[50],"data":[52,60],"very":[53],"easily.":[54],"Therefore,":[55],"major":[66],"challenge.":[67],"This":[68],"study":[69,129],"highlights":[70],"better":[71],"protection":[72],"in":[78,90],"comparison":[79],"existing":[82],"approaches,":[83],"cannot":[87],"be":[88,164],"unwrapped":[89],"reasonable":[92],"time.":[93],"The":[94,142,177],"Strength":[95],"RSA,":[97],"ElGamal,":[98],"Diffie":[99],"Hellman,":[100],"and":[101,119,139,158,180,196],"many":[102],"more":[103],"Cryptographic":[104],"algorithms":[105],"depend":[106],"on":[107,155],"concept":[109,145],"congruence.":[111,141],"As":[112],"now,":[114],"solution":[116,136],"linear":[118],"quadratic":[120],"congruence":[121,144],"had":[122,130],"made":[123],"its":[124],"use":[125],"limited,":[126],"but":[127],"changed":[131],"it":[132,162],"by":[133],"introducing":[134],"Cubic":[138],"Polynomial":[140],"polynomial":[143],"has":[146,188],"been":[147],"used":[148],"encrypt":[150],"content.":[153],"Based":[154],"qualitative":[157],"quantitative":[159],"experimental":[160,181],"analysis,":[161],"concluded":[165],"that":[166,184],"P-MEC":[168],"model":[169],"stands":[170],"firm":[171],"compared":[172],"with":[173],"state-of-the-art":[175],"models.":[176],"analysis":[179],"results":[182],"display":[183],"proposed":[186],"scheme":[187],"strong":[189],"robustness":[190],"against":[191],"statistical":[192],"attack,":[193,195],"vulnerability":[194],"other":[197],"comprehensive":[198],"attacks.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
