{"id":"https://openalex.org/W4416148754","doi":"https://doi.org/10.1109/tgcn.2025.3632067","title":"Image Privacy Protection for Green Industrial IoT: Application of Dynamic Collaborative Encryption and Adaptive Embedding Algorithm","display_name":"Image Privacy Protection for Green Industrial IoT: Application of Dynamic Collaborative Encryption and Adaptive Embedding Algorithm","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W4416148754","doi":"https://doi.org/10.1109/tgcn.2025.3632067"},"language":null,"primary_location":{"id":"doi:10.1109/tgcn.2025.3632067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tgcn.2025.3632067","pdf_url":null,"source":{"id":"https://openalex.org/S4210192662","display_name":"IEEE Transactions on Green Communications and Networking","issn_l":"2473-2400","issn":["2473-2400"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Green Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089450858","display_name":"Zhenlong Man","orcid":"https://orcid.org/0000-0003-1974-9890"},"institutions":[{"id":"https://openalex.org/I176808543","display_name":"Liaoning Technical University","ror":"https://ror.org/01n2bd587","country_code":"CN","type":"education","lineage":["https://openalex.org/I176808543"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenlong Man","raw_affiliation_strings":["College of Electronic and Information Engineering and Liaoning Key Laboratory of Radio Frequency and Big Data for Intelligent Applications, Liaoning Technical University, Huludao, China","college of Electronic and Information Engineering, Liaoning Technical University, Huludao, China"],"raw_orcid":"https://orcid.org/0000-0003-1974-9890","affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering and Liaoning Key Laboratory of Radio Frequency and Big Data for Intelligent Applications, Liaoning Technical University, Huludao, China","institution_ids":["https://openalex.org/I176808543"]},{"raw_affiliation_string":"college of Electronic and Information Engineering, Liaoning Technical University, Huludao, China","institution_ids":["https://openalex.org/I176808543"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020514348","display_name":"Shuping Li","orcid":"https://orcid.org/0009-0006-3403-5473"},"institutions":[{"id":"https://openalex.org/I176808543","display_name":"Liaoning Technical University","ror":"https://ror.org/01n2bd587","country_code":"CN","type":"education","lineage":["https://openalex.org/I176808543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuping Li","raw_affiliation_strings":["College of Electronic and Information Engineering, Liaoning Technical University, Huludao, China","college of Electronic and Information Engineering, Liaoning Technical University, Huludao, China"],"raw_orcid":"https://orcid.org/0009-0006-3403-5473","affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering, Liaoning Technical University, Huludao, China","institution_ids":["https://openalex.org/I176808543"]},{"raw_affiliation_string":"college of Electronic and Information Engineering, Liaoning Technical University, Huludao, China","institution_ids":["https://openalex.org/I176808543"]}]},{"author_position":"last","author":{"id":null,"display_name":"Fan Zhang","orcid":"https://orcid.org/0009-0002-4881-3986"},"institutions":[{"id":"https://openalex.org/I176808543","display_name":"Liaoning Technical University","ror":"https://ror.org/01n2bd587","country_code":"CN","type":"education","lineage":["https://openalex.org/I176808543"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["College of Electronic and Information Engineering, Liaoning Technical University, Huludao, China","college of Electronic and Information Engineering, Liaoning Technical University, Huludao, China"],"raw_orcid":"https://orcid.org/0009-0002-4881-3986","affiliations":[{"raw_affiliation_string":"College of Electronic and Information Engineering, Liaoning Technical University, Huludao, China","institution_ids":["https://openalex.org/I176808543"]},{"raw_affiliation_string":"college of Electronic and Information Engineering, Liaoning Technical University, Huludao, China","institution_ids":["https://openalex.org/I176808543"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089450858"],"corresponding_institution_ids":["https://openalex.org/I176808543"],"apc_list":null,"apc_paid":null,"fwci":2.1303,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.89795979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"10","issue":null,"first_page":"1391","last_page":"1403"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.3580000102519989,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.3580000102519989,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.06920000165700912,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.04899999871850014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7437000274658203},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.6025000214576721},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.46869999170303345},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.42890000343322754},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.424699991941452},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.38510000705718994},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.382999986410141},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.37689998745918274},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3675000071525574},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.36230000853538513}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7437000274658203},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7369999885559082},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.6025000214576721},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.46869999170303345},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.42890000343322754},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.424699991941452},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39730000495910645},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.38510000705718994},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.382999986410141},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3804999887943268},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.37959998846054077},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.37689998745918274},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3675000071525574},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.364300012588501},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3635999858379364},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.36230000853538513},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.3391999900341034},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3319999873638153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.323199987411499},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3231000006198883},{"id":"https://openalex.org/C134765980","wikidata":"https://www.wikidata.org/wiki/Q879126","display_name":"Bitwise operation","level":2,"score":0.31929999589920044},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.30640000104904175},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2856000065803528},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.2815999984741211},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.27730000019073486},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.27730000019073486},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2750999927520752},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2703999876976013},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.266400009393692},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.26499998569488525},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tgcn.2025.3632067","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tgcn.2025.3632067","pdf_url":null,"source":{"id":"https://openalex.org/S4210192662","display_name":"IEEE Transactions on Green Communications and Networking","issn_l":"2473-2400","issn":["2473-2400"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Green Communications and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2443147376","display_name":null,"funder_award_id":"JYTQN2023208","funder_id":"https://openalex.org/F4320335467","funder_display_name":"Natural Science Foundation of Shaanxi Provincial Department of Education"}],"funders":[{"id":"https://openalex.org/F4320335467","display_name":"Natural Science Foundation of Shaanxi Provincial Department of Education","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":69,"referenced_works":["https://openalex.org/W2046770359","https://openalex.org/W2074886859","https://openalex.org/W2109394932","https://openalex.org/W2142884912","https://openalex.org/W2966239583","https://openalex.org/W3010137098","https://openalex.org/W3010834404","https://openalex.org/W3031436417","https://openalex.org/W3048752794","https://openalex.org/W3082200717","https://openalex.org/W3120587672","https://openalex.org/W3134260321","https://openalex.org/W3134369321","https://openalex.org/W3138917762","https://openalex.org/W3157340262","https://openalex.org/W3164088468","https://openalex.org/W3176844538","https://openalex.org/W3179208556","https://openalex.org/W3181264283","https://openalex.org/W3192896178","https://openalex.org/W3194458288","https://openalex.org/W3200254765","https://openalex.org/W3202801741","https://openalex.org/W3210645421","https://openalex.org/W3211136635","https://openalex.org/W3212714718","https://openalex.org/W4205148863","https://openalex.org/W4206714669","https://openalex.org/W4213172197","https://openalex.org/W4220685868","https://openalex.org/W4235214762","https://openalex.org/W4280630273","https://openalex.org/W4281571458","https://openalex.org/W4285079173","https://openalex.org/W4285168973","https://openalex.org/W4285244221","https://openalex.org/W4289126832","https://openalex.org/W4290958908","https://openalex.org/W4292622351","https://openalex.org/W4308518090","https://openalex.org/W4310677105","https://openalex.org/W4312419528","https://openalex.org/W4313897450","https://openalex.org/W4323315282","https://openalex.org/W4361223342","https://openalex.org/W4385062369","https://openalex.org/W4385155222","https://openalex.org/W4387747073","https://openalex.org/W4387885647","https://openalex.org/W4388415553","https://openalex.org/W4388524046","https://openalex.org/W4390399248","https://openalex.org/W4390547274","https://openalex.org/W4390938953","https://openalex.org/W4391621245","https://openalex.org/W4392309155","https://openalex.org/W4392775656","https://openalex.org/W4393086443","https://openalex.org/W4394684782","https://openalex.org/W4396852837","https://openalex.org/W4399431846","https://openalex.org/W4400224283","https://openalex.org/W4401328674","https://openalex.org/W4401643595","https://openalex.org/W4402205672","https://openalex.org/W4402731765","https://openalex.org/W4404223758","https://openalex.org/W4408699641","https://openalex.org/W4409129668"],"related_works":[],"abstract_inverted_index":{"In":[0,70],"the":[1,12,62,71,76,101,107,115,125,138,146,150,153,159,173,186,195],"Industrial":[2,64],"Internet":[3,65],"of":[4,66,78,117,129,149],"Things":[5,67],"(IIoT),":[6],"numerous":[7],"devices":[8],"are":[9],"connected":[10],"to":[11,84,91,100,162],"Internet,":[13],"forming":[14],"a":[15,79,86],"huge":[16],"data":[17,35,73],"interaction":[18],"network":[19],"that":[20,172],"can":[21],"monitor":[22],"industrial":[23],"production":[24],"processes":[25],"in":[26,158,194],"real":[27],"time":[28],"and":[29,42,45,106,133,152,168,181,190],"achieve":[30],"precise":[31],"energy":[32],"control.":[33],"However,":[34],"transmission":[36],"faces":[37],"challenges":[38],"such":[39],"as":[40],"privacy":[41],"security":[43,57],"threats":[44],"communication":[46,183,193],"overhead.":[47],"For":[48],"this":[49,51],"reason,":[50],"paper":[52],"puts":[53],"forward":[54],"an":[55],"image":[56,72,161],"protection":[58],"framework":[59],"built":[60],"on":[61,145],"Green":[63],"(GIIoT)":[68],"communication.":[69],"encryption":[74],"stage,":[75],"non-determinism":[77],"chaotic":[80,108],"system":[81],"is":[82,97,112,141,155],"utilized":[83],"design":[85],"dynamic":[87],"spiral":[88],"scrambling":[89],"method":[90,128],"rearrange":[92],"pixels.":[93],"The":[94],"orthogonal":[95],"matrix":[96],"permuted":[98],"according":[99],"singular":[102],"value":[103],"decomposition":[104],"theory,":[105],"sequence":[109],"generation":[110],"mechanism":[111],"introduced":[113],"for":[114,188],"purpose":[116],"performing":[118],"random":[119,134],"bit":[120,135],"XOR":[121],"operations.":[122],"Subsequently,":[123],"through":[124],"collaborative":[126],"embedding":[127,139],"adaptive":[130],"histogram":[131],"shift":[132],"mapping":[136],"transformation,":[137],"strategy":[140],"dynamically":[142],"adjusted":[143],"based":[144],"statistical":[147],"characteristics":[148],"image,":[151],"cipher-image":[154],"covertly":[156],"embedded":[157],"carrier":[160],"ensure":[163],"secure":[164,189],"transmission.":[165],"Security":[166],"analysis":[167],"performance":[169],"assessments":[170],"demonstrate":[171],"proposed":[174],"scheme":[175],"achieves":[176],"strong":[177],"security,":[178],"high":[179],"efficiency,":[180],"low":[182],"overhead,":[184],"meeting":[185],"needs":[187],"sustainable":[191],"green":[192],"IIoT.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-11-12T00:00:00"}
