{"id":"https://openalex.org/W4285298427","doi":"https://doi.org/10.1109/tcsi.2022.3172116","title":"Spiral-Transform-Based Fractal Sorting Matrix for Chaotic Image Encryption","display_name":"Spiral-Transform-Based Fractal Sorting Matrix for Chaotic Image Encryption","publication_year":2022,"publication_date":"2022-05-17","ids":{"openalex":"https://openalex.org/W4285298427","doi":"https://doi.org/10.1109/tcsi.2022.3172116"},"language":"en","primary_location":{"id":"doi:10.1109/tcsi.2022.3172116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsi.2022.3172116","pdf_url":null,"source":{"id":"https://openalex.org/S116977442","display_name":"IEEE Transactions on Circuits and Systems I Regular Papers","issn_l":"1549-8328","issn":["1549-8328","1558-0806"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems I: Regular Papers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019721979","display_name":"Yongjin Xian","orcid":"https://orcid.org/0000-0002-9307-6420"},"institutions":[{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yongjin Xian","raw_affiliation_strings":["School of Information Science and Technology, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100680476","display_name":"Xingyuan Wang","orcid":"https://orcid.org/0000-0002-3844-3195"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]},{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingyuan Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin, China","School of Information Science and Technology, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"School of Information Science and Technology, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100357616","display_name":"Xiaoyu Wang","orcid":"https://orcid.org/0000-0002-7030-4291"},"institutions":[{"id":"https://openalex.org/I29739308","display_name":"Guangxi Normal University","ror":"https://ror.org/02frt9q65","country_code":"CN","type":"education","lineage":["https://openalex.org/I29739308"]},{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin, China","School of Information Science and Technology, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Multi-Source Information Mining and Security, Guangxi Normal University, Guilin, China","institution_ids":["https://openalex.org/I29739308"]},{"raw_affiliation_string":"School of Information Science and Technology, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100350153","display_name":"Qi Li","orcid":"https://orcid.org/0000-0001-7729-1422"},"institutions":[{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Li","raw_affiliation_strings":["School of Information Science and Technology, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101550575","display_name":"Xiaopeng Yan","orcid":"https://orcid.org/0000-0003-1399-465X"},"institutions":[{"id":"https://openalex.org/I43313876","display_name":"Dalian Maritime University","ror":"https://ror.org/002b7nr53","country_code":"CN","type":"education","lineage":["https://openalex.org/I43313876"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaopeng Yan","raw_affiliation_strings":["School of Information Science and Technology, Dalian Maritime University, Dalian, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Dalian Maritime University, Dalian, China","institution_ids":["https://openalex.org/I43313876"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5019721979"],"corresponding_institution_ids":["https://openalex.org/I43313876"],"apc_list":null,"apc_paid":null,"fwci":6.636,"has_fulltext":false,"cited_by_count":66,"citation_normalized_percentile":{"value":0.97782608,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"69","issue":"8","first_page":"3320","last_page":"3327"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7898544073104858},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.7102755904197693},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6394670009613037},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5666474103927612},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.537717342376709},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4452105760574341},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.43818292021751404},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.42571574449539185},{"id":"https://openalex.org/keywords/iterative-method","display_name":"Iterative method","score":0.41759270429611206},{"id":"https://openalex.org/keywords/sorting","display_name":"Sorting","score":0.416413277387619},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3839394748210907},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3837394118309021},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23977988958358765}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7898544073104858},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.7102755904197693},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6394670009613037},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5666474103927612},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.537717342376709},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4452105760574341},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.43818292021751404},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.42571574449539185},{"id":"https://openalex.org/C159694833","wikidata":"https://www.wikidata.org/wiki/Q2321565","display_name":"Iterative method","level":2,"score":0.41759270429611206},{"id":"https://openalex.org/C111696304","wikidata":"https://www.wikidata.org/wiki/Q2303697","display_name":"Sorting","level":2,"score":0.416413277387619},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3839394748210907},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3837394118309021},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23977988958358765},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsi.2022.3172116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsi.2022.3172116","pdf_url":null,"source":{"id":"https://openalex.org/S116977442","display_name":"IEEE Transactions on Circuits and Systems I Regular Papers","issn_l":"1549-8328","issn":["1549-8328","1558-0806"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems I: Regular Papers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2559660839","display_name":null,"funder_award_id":"MIMS20-M-02","funder_id":"https://openalex.org/F4320336248","funder_display_name":"Guangxi Key Laboratory of Multi-Source Information Mining and Security"},{"id":"https://openalex.org/G521762806","display_name":null,"funder_award_id":"61672124","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320336248","display_name":"Guangxi Key Laboratory of Multi-Source Information Mining and Security","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1750292977","https://openalex.org/W1913074635","https://openalex.org/W2001529179","https://openalex.org/W2010668061","https://openalex.org/W2035069444","https://openalex.org/W2068142860","https://openalex.org/W2109948199","https://openalex.org/W2154474291","https://openalex.org/W2175079020","https://openalex.org/W2183964636","https://openalex.org/W2211874113","https://openalex.org/W2217927510","https://openalex.org/W2239443241","https://openalex.org/W2323473128","https://openalex.org/W2523137896","https://openalex.org/W2531935690","https://openalex.org/W2726720000","https://openalex.org/W2742440882","https://openalex.org/W2757051818","https://openalex.org/W2804853849","https://openalex.org/W2805123356","https://openalex.org/W2892525927","https://openalex.org/W2898251349","https://openalex.org/W2901404669","https://openalex.org/W2905741893","https://openalex.org/W2940705568","https://openalex.org/W2950464638","https://openalex.org/W2951676679","https://openalex.org/W2980156420","https://openalex.org/W2994719874","https://openalex.org/W3026892975","https://openalex.org/W3033181913","https://openalex.org/W3037758685","https://openalex.org/W3044286781","https://openalex.org/W3092259722","https://openalex.org/W3092974640","https://openalex.org/W3099892037","https://openalex.org/W3118753459","https://openalex.org/W3161577134","https://openalex.org/W3170674368","https://openalex.org/W3197812980","https://openalex.org/W4206197292"],"related_works":["https://openalex.org/W69312893","https://openalex.org/W2349686135","https://openalex.org/W84934912","https://openalex.org/W936781193","https://openalex.org/W2353936545","https://openalex.org/W2153933599","https://openalex.org/W4297633779","https://openalex.org/W2287132719","https://openalex.org/W2384550941","https://openalex.org/W2075203706"],"abstract_inverted_index":{"Chaotic":[0],"image":[1,18,73,86,97],"encryption":[2,19,98,142],"is":[3,38,91],"widely":[4],"used":[5,60,127],"in":[6,153],"the":[7,30,47,62,70,77,102,105,129,137,149,161],"field":[8],"of":[9,28,32,53,64,72,104],"information":[10],"security.":[11],"This":[12],"paper":[13,155],"proposes":[14],"a":[15,84,95,140],"novel":[16],"chaotic":[17,85],"method":[20],"with":[21,34],"spiral-transform-based":[22],"fractal":[23],"sorting":[24],"matrix":[25],"(STFSM).":[26],"First":[27],"all,":[29],"theory":[31,80],"STFSM":[33,54,57,79,90],"good":[35,42,96],"scrambling":[36],"effect":[37],"introduced,":[39],"which":[40],"has":[41,139],"irregularity":[43],"and":[44,50,81,110,123,156],"iterative.":[45],"Then,":[46],"iterative":[48,82],"algorithm":[49,138],"calculation":[51],"example":[52],"are":[55,126],"introduced.":[56],"can":[58,157],"be":[59],"as":[61,113],"map":[63],"spatial":[65],"location":[66],"transformations":[67],"to":[68,93,119],"implement":[69],"design":[71],"encryption.":[74],"Based":[75],"on":[76,89],"complete":[78],"algorithm,":[83,107],"cryptosystem":[87],"based":[88],"proposed":[92,106,130],"achieve":[94],"process.":[99],"To":[100],"test":[101],"security":[103,108],"tests":[109,147],"analyses":[111],"such":[112],"entropy":[114],"analysis,":[115,117,122],"correlation":[116],"resistance":[118],"differential":[120],"attacks":[121,150],"robustness":[124],"analysis":[125,134],"for":[128],"algorithm.":[131],"The":[132],"experimental":[133],"illustrates":[135],"that":[136],"better":[141],"effect,":[143],"whether":[144],"using":[145],"conventional":[146],"or":[148],"simulations":[151],"described":[152],"this":[154],"also":[158],"effectively":[159],"resist":[160],"attacks.":[162]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":24},{"year":2022,"cited_by_count":6}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
