{"id":"https://openalex.org/W4206197292","doi":"https://doi.org/10.1109/tcsi.2021.3133318","title":"A New Full Chaos Coupled Mapping Lattice and Its Application in Privacy Image Encryption","display_name":"A New Full Chaos Coupled Mapping Lattice and Its Application in Privacy Image Encryption","publication_year":2021,"publication_date":"2021-12-28","ids":{"openalex":"https://openalex.org/W4206197292","doi":"https://doi.org/10.1109/tcsi.2021.3133318"},"language":"en","primary_location":{"id":"doi:10.1109/tcsi.2021.3133318","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsi.2021.3133318","pdf_url":null,"source":{"id":"https://openalex.org/S116977442","display_name":"IEEE Transactions on Circuits and Systems I Regular Papers","issn_l":"1549-8328","issn":["1549-8328","1558-0806"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems I: Regular Papers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100680476","display_name":"Xingyuan Wang","orcid":"https://orcid.org/0000-0002-3844-3195"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]},{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xingyuan Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin, China","School of Information Science and Technology, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"School of Information Science and Technology, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016214915","display_name":"Pengbo Liu","orcid":"https://orcid.org/0000-0003-2344-2584"},"institutions":[{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengbo Liu","raw_affiliation_strings":["School of Information Science and Technology, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100680476"],"corresponding_institution_ids":["https://openalex.org/I29739308","https://openalex.org/I43313876"],"apc_list":null,"apc_paid":null,"fwci":17.0438,"has_fulltext":false,"cited_by_count":215,"citation_normalized_percentile":{"value":0.99503674,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"69","issue":"3","first_page":"1291","last_page":"1301"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9685999751091003,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7947667837142944},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.7306959629058838},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6813555955886841},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5941120982170105},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5539844036102295},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5449357032775879},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4670279026031494},{"id":"https://openalex.org/keywords/dynamic-range","display_name":"Dynamic range","score":0.4476972818374634},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.4215371608734131},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3381761908531189},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.24120336771011353},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23246309161186218}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7947667837142944},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.7306959629058838},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6813555955886841},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5941120982170105},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5539844036102295},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5449357032775879},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4670279026031494},{"id":"https://openalex.org/C87133666","wikidata":"https://www.wikidata.org/wiki/Q1161699","display_name":"Dynamic range","level":2,"score":0.4476972818374634},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.4215371608734131},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3381761908531189},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.24120336771011353},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23246309161186218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsi.2021.3133318","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsi.2021.3133318","pdf_url":null,"source":{"id":"https://openalex.org/S116977442","display_name":"IEEE Transactions on Circuits and Systems I Regular Papers","issn_l":"1549-8328","issn":["1549-8328","1558-0806"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems I: Regular Papers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2559660839","display_name":null,"funder_award_id":"MIMS20-M-02","funder_id":"https://openalex.org/F4320336248","funder_display_name":"Guangxi Key Laboratory of Multi-Source Information Mining and Security"},{"id":"https://openalex.org/G521762806","display_name":null,"funder_award_id":"61672124","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5882245122","display_name":null,"funder_award_id":"2019020105-JH2/103","funder_id":"https://openalex.org/F4320336742","funder_display_name":"Key Research and Development Program of Liaoning Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336248","display_name":"Guangxi Key Laboratory of Multi-Source Information Mining and Security","ror":null},{"id":"https://openalex.org/F4320336742","display_name":"Key Research and Development Program of Liaoning Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1995725546","https://openalex.org/W2035069444","https://openalex.org/W2060791695","https://openalex.org/W2105145864","https://openalex.org/W2161327982","https://openalex.org/W2211874113","https://openalex.org/W2249740901","https://openalex.org/W2252815310","https://openalex.org/W2425286230","https://openalex.org/W2521458040","https://openalex.org/W2738748671","https://openalex.org/W2758328613","https://openalex.org/W2767289158","https://openalex.org/W2792283919","https://openalex.org/W2811350001","https://openalex.org/W2892525927","https://openalex.org/W2898574434","https://openalex.org/W2905420870","https://openalex.org/W2912217246","https://openalex.org/W2930326836","https://openalex.org/W2930840217","https://openalex.org/W2949464293","https://openalex.org/W2952469659","https://openalex.org/W2968927372","https://openalex.org/W2989629898","https://openalex.org/W3003027562","https://openalex.org/W3004754619","https://openalex.org/W3005341457","https://openalex.org/W3005464042","https://openalex.org/W3005779010","https://openalex.org/W3026490091","https://openalex.org/W3033768243","https://openalex.org/W3035934015","https://openalex.org/W3036812293","https://openalex.org/W3080302823","https://openalex.org/W3092259722","https://openalex.org/W3092628836","https://openalex.org/W3092747493","https://openalex.org/W3099556301","https://openalex.org/W3118401597","https://openalex.org/W3131964039","https://openalex.org/W3156484751","https://openalex.org/W3197239062","https://openalex.org/W6717539790"],"related_works":["https://openalex.org/W115686965","https://openalex.org/W2768918307","https://openalex.org/W2110031805","https://openalex.org/W2040020606","https://openalex.org/W4362659915","https://openalex.org/W2050926897","https://openalex.org/W2113071088","https://openalex.org/W2776913024","https://openalex.org/W2954599081","https://openalex.org/W2290993309"],"abstract_inverted_index":{"Since":[0],"chaotic":[1,15,73],"cryptography":[2],"has":[3,51],"a":[4,27,32,174],"long-term":[5],"problem":[6],"of":[7,45,54,72,80,96,102,111,153,167],"dynamic":[8,18,143],"degradation,":[9],"this":[10,25],"paper":[11],"presents":[12],"proof":[13],"that":[14,48,164],"systems":[16],"resist":[17],"degradation":[19],"through":[20],"theoretical":[21],"analysis.":[22],"Based":[23,75],"on":[24,76],"proof,":[26],"novel":[28],"one-dimensional":[29],"two-parameter":[30],"with":[31],"wide-range":[33],"system":[34,50],"mixed":[35],"coupled":[36,130],"map":[37],"lattice":[38],"model":[39],"(TWMCML)":[40],"is":[41,83,114,124,137],"given.":[42],"The":[43,91,147],"evaluation":[44],"TWMCML":[46,168],"shows":[47],"the":[49,52,70,77,86,100,108,112,121,127,134,142,151,154,165,170],"characteristics":[53],"strong":[55],"chaos,":[56],"high":[57],"sensitivity,":[58],"broader":[59],"parameter":[60],"ranges":[61],"and":[62,105,158],"wider":[63],"chaos":[64],"range,":[65],"which":[66],"helps":[67],"to":[68,85,177],"enhance":[69],"security":[71],"sequences.":[74],"excellent":[78],"performance":[79],"TWMCML,":[81],"it":[82],"applied":[84],"newly":[87],"proposed":[88],"encryption":[89,171],"algorithm.":[90],"algorithm":[92,155,172],"realizes":[93],"double":[94],"protection":[95],"private":[97],"images":[98],"under":[99],"premise":[101],"ensuring":[103],"efficiency":[104],"safety.":[106],"First,":[107],"important":[109,122],"information":[110],"image":[113,136],"extracted":[115],"by":[116,126,141],"edge":[117],"detection":[118],"technology.":[119],"Then":[120],"area":[123],"scrambled":[125],"three-dimensional":[128],"bit-level":[129],"XOR":[131],"method.":[132],"Finally,":[133],"global":[135],"more":[138],"fully":[139],"confused":[140],"index":[144],"diffusion":[145],"formula.":[146],"simulation":[148],"experiment":[149],"verified":[150],"effectiveness":[152],"for":[156],"grayscale":[157],"color":[159],"images.":[160],"Security":[161],"tests":[162],"show":[163],"application":[166],"makes":[169],"have":[173],"better":[175],"ability":[176],"overcome":[178],"conventional":[179],"attacks.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":33},{"year":2024,"cited_by_count":61},{"year":2023,"cited_by_count":67},{"year":2022,"cited_by_count":48}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
