{"id":"https://openalex.org/W4293195440","doi":"https://doi.org/10.1109/tii.2022.3176054","title":"An Image Security Model Based on Chaos and DNA Cryptography for IIoT Images","display_name":"An Image Security Model Based on Chaos and DNA Cryptography for IIoT Images","publication_year":2022,"publication_date":"2022-05-20","ids":{"openalex":"https://openalex.org/W4293195440","doi":"https://doi.org/10.1109/tii.2022.3176054"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2022.3176054","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3176054","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005695709","display_name":"Anish Kumar Singh","orcid":"https://orcid.org/0000-0002-9749-7994"},"institutions":[{"id":"https://openalex.org/I11793825","display_name":"National Institute of Technology Patna","ror":"https://ror.org/056wyhh33","country_code":"IN","type":"education","lineage":["https://openalex.org/I11793825","https://openalex.org/I4210152752"]},{"id":"https://openalex.org/I67357951","display_name":"KIIT University","ror":"https://ror.org/00k8zt527","country_code":"IN","type":"education","lineage":["https://openalex.org/I67357951"]},{"id":"https://openalex.org/I99729588","display_name":"Indian Institute of Technology Bhubaneswar","ror":"https://ror.org/04gx72j20","country_code":"IN","type":"education","lineage":["https://openalex.org/I99729588"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Anish Kumar Singh","raw_affiliation_strings":["Computer Science and Engineering, National Institute of Technology Patna, Patna, India","School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, National Institute of Technology Patna, Patna, India","institution_ids":["https://openalex.org/I11793825"]},{"raw_affiliation_string":"School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, India","institution_ids":["https://openalex.org/I67357951","https://openalex.org/I99729588"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081891494","display_name":"Kakali Chatterjee","orcid":"https://orcid.org/0000-0003-3522-2044"},"institutions":[{"id":"https://openalex.org/I11793825","display_name":"National Institute of Technology Patna","ror":"https://ror.org/056wyhh33","country_code":"IN","type":"education","lineage":["https://openalex.org/I11793825","https://openalex.org/I4210152752"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kakali Chatterjee","raw_affiliation_strings":["Computer Science and Engineering, National Institute of Technology Patna, Patna, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, National Institute of Technology Patna, Patna, India","institution_ids":["https://openalex.org/I11793825"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083670534","display_name":"Ashish Singh","orcid":"https://orcid.org/0000-0001-5974-0415"},"institutions":[{"id":"https://openalex.org/I11793825","display_name":"National Institute of Technology Patna","ror":"https://ror.org/056wyhh33","country_code":"IN","type":"education","lineage":["https://openalex.org/I11793825","https://openalex.org/I4210152752"]},{"id":"https://openalex.org/I67357951","display_name":"KIIT University","ror":"https://ror.org/00k8zt527","country_code":"IN","type":"education","lineage":["https://openalex.org/I67357951"]},{"id":"https://openalex.org/I99729588","display_name":"Indian Institute of Technology Bhubaneswar","ror":"https://ror.org/04gx72j20","country_code":"IN","type":"education","lineage":["https://openalex.org/I99729588"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ashish Singh","raw_affiliation_strings":["Computer Science and Engineering, National Institute of Technology Patna, Patna, India","School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, India"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, National Institute of Technology Patna, Patna, India","institution_ids":["https://openalex.org/I11793825"]},{"raw_affiliation_string":"School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT), Bhubaneswar, India","institution_ids":["https://openalex.org/I67357951","https://openalex.org/I99729588"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005695709"],"corresponding_institution_ids":["https://openalex.org/I11793825","https://openalex.org/I67357951","https://openalex.org/I99729588"],"apc_list":null,"apc_paid":null,"fwci":8.1676,"has_fulltext":false,"cited_by_count":83,"citation_normalized_percentile":{"value":0.98432819,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"19","issue":"2","first_page":"1957","last_page":"1964"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.635465681552887},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5944992899894714},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5501547455787659},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.507448136806488},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48581814765930176},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45901599526405334},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.43711358308792114},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4297906756401062},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.428542822599411},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.423127681016922},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.40382054448127747},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3833276629447937},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.38108664751052856},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3246699571609497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28809940814971924},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.26026713848114014},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.21377763152122498}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.635465681552887},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5944992899894714},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5501547455787659},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.507448136806488},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48581814765930176},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45901599526405334},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.43711358308792114},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4297906756401062},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.428542822599411},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.423127681016922},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.40382054448127747},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3833276629447937},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.38108664751052856},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3246699571609497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28809940814971924},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.26026713848114014},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.21377763152122498}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2022.3176054","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2022.3176054","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1976474044","https://openalex.org/W2018789078","https://openalex.org/W2055916534","https://openalex.org/W2056666783","https://openalex.org/W2306979870","https://openalex.org/W2464492647","https://openalex.org/W2507650878","https://openalex.org/W2523079709","https://openalex.org/W2598248720","https://openalex.org/W2607256305","https://openalex.org/W2750385101","https://openalex.org/W2774571040","https://openalex.org/W2786395579","https://openalex.org/W2802611747","https://openalex.org/W2811266402","https://openalex.org/W2904282390","https://openalex.org/W2940942715","https://openalex.org/W2942457116","https://openalex.org/W2965070013","https://openalex.org/W2979742012","https://openalex.org/W2985824658","https://openalex.org/W3005115714","https://openalex.org/W3091781356","https://openalex.org/W3122279026","https://openalex.org/W3205064524","https://openalex.org/W3209398169","https://openalex.org/W4200256588","https://openalex.org/W4210322702"],"related_works":["https://openalex.org/W2375489546","https://openalex.org/W2558023823","https://openalex.org/W4248108675","https://openalex.org/W4360777937","https://openalex.org/W2384990459","https://openalex.org/W4367360442","https://openalex.org/W4385847340","https://openalex.org/W3189651157","https://openalex.org/W4323075943","https://openalex.org/W2129753112"],"abstract_inverted_index":{"The":[0,60,116],"images":[1],"generated":[2],"by":[3],"smart":[4],"cameras":[5],"and":[6,30,57,68,99,131,146],"sensors":[7],"in":[8,72],"an":[9,50],"Industrial":[10],"Internet":[11],"of":[12,33,87,134],"Things":[13],"(IIoT)":[14],"ecosystem":[15],"are":[16,82,140,147],"at":[17],"significant":[18],"risk":[19],"when":[20],"transmitted":[21],"over":[22],"a":[23,39,64,73,101],"public":[24],"network":[25],"due":[26],"to":[27,76,92,111,149],"the":[28,34,90,97,113,123,143],"dynamicity":[29],"open":[31],"nature":[32],"IIoT":[35,44],"environment.":[36],"Encryption":[37],"is":[38,109],"viable":[40],"method":[41],"for":[42,84],"safeguarding":[43],"digital":[45],"images.":[46],"This":[47],"article":[48],"addresses":[49],"image":[51,103],"security":[52],"framework":[53],"using":[54],"chaotic":[55],"maps":[56],"DNA":[58,94,106],"cryptography.":[59],"proposed":[61,117],"algorithm":[62],"uses":[63],"tent,":[65],"circle,":[66],"Chebyshev,":[67],"3-D":[69],"logistic":[70],"map":[71],"multilevel":[74],"fashion":[75],"generate":[77,100],"three":[78],"keys.":[79],"These":[80],"keys":[81],"used":[83],"row-column":[85],"rotation":[86],"subblocks,":[88,98],"determine":[89],"rule":[91],"perform":[93],"encoding\u2013decoding":[95],"on":[96,104],"key":[102],"which":[105],"XOR":[107],"operation":[108],"performed":[110],"get":[112],"encrypted":[114],"image.":[115],"scheme\u2019s":[118],"result":[119],"analysis":[120],"illustrates":[121],"that":[122],"average":[124],"NPCR":[125],"(99.6566%),":[126],"UACI":[127],"(33.4588%),":[128],"Entropy":[129],"(7.9971),":[130],"larger":[132],"key-space":[133],"<inline-formula":[135],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[136],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[137],"notation=\"LaTeX\">$":[138],"10^{195}$</tex-math></inline-formula>":[139],"better":[141],"than":[142],"existing":[144],"schemes":[145],"resistant":[148],"different":[150],"attacks.":[151]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":37},{"year":2024,"cited_by_count":30},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
