{"id":"https://openalex.org/W4388953048","doi":"https://doi.org/10.1109/tmm.2023.3336236","title":"JPEG Image Encryption With DC Rotation and Undivided RSV-Based AC Group Permutation","display_name":"JPEG Image Encryption With DC Rotation and Undivided RSV-Based AC Group Permutation","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4388953048","doi":"https://doi.org/10.1109/tmm.2023.3336236"},"language":"en","primary_location":{"id":"doi:10.1109/tmm.2023.3336236","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2023.3336236","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048326216","display_name":"Yuan Yuan","orcid":"https://orcid.org/0000-0002-6621-9983"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Yuan","raw_affiliation_strings":["School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101735957","display_name":"Hongjie He","orcid":"https://orcid.org/0000-0003-2683-0419"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongjie He","raw_affiliation_strings":["School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012383986","display_name":"Yaolin Yang","orcid":"https://orcid.org/0000-0003-4250-3805"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaolin Yang","raw_affiliation_strings":["School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063653867","display_name":"Hadi Amirpour","orcid":"https://orcid.org/0000-0001-9853-1720"},"institutions":[{"id":"https://openalex.org/I4210166741","display_name":"University of Klagenfurt","ror":"https://ror.org/05q9m0937","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210166741"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Hadi Amirpour","raw_affiliation_strings":["Christian Doppler Laboratory ATHENA, Institute of Information Technology (ITEC), University of Klagenfurt, Klagenfurt, Austria"],"affiliations":[{"raw_affiliation_string":"Christian Doppler Laboratory ATHENA, Institute of Information Technology (ITEC), University of Klagenfurt, Klagenfurt, Austria","institution_ids":["https://openalex.org/I4210166741"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057862649","display_name":"Christian Timmerer","orcid":"https://orcid.org/0000-0002-0031-5243"},"institutions":[{"id":"https://openalex.org/I4210166741","display_name":"University of Klagenfurt","ror":"https://ror.org/05q9m0937","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210166741"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Christian Timmerer","raw_affiliation_strings":["Christian Doppler Laboratory ATHENA, Institute of Information Technology (ITEC), University of Klagenfurt, Klagenfurt, Austria"],"affiliations":[{"raw_affiliation_string":"Christian Doppler Laboratory ATHENA, Institute of Information Technology (ITEC), University of Klagenfurt, Klagenfurt, Austria","institution_ids":["https://openalex.org/I4210166741"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100766720","display_name":"Fan Chen","orcid":"https://orcid.org/0000-0002-2909-0295"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fan Chen","raw_affiliation_strings":["School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5048326216"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":null,"apc_paid":null,"fwci":0.7369,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.73572176,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"27","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7680646777153015},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.7217203974723816},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6719248294830322},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6181985139846802},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4839935302734375},{"id":"https://openalex.org/keywords/file-size","display_name":"File size","score":0.4432516098022461},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36629748344421387},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3488723635673523},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.2500106394290924},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14553609490394592},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07228812575340271}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7680646777153015},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.7217203974723816},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6719248294830322},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6181985139846802},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4839935302734375},{"id":"https://openalex.org/C2776029614","wikidata":"https://www.wikidata.org/wiki/Q1146367","display_name":"File size","level":2,"score":0.4432516098022461},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36629748344421387},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3488723635673523},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.2500106394290924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14553609490394592},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07228812575340271},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmm.2023.3336236","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2023.3336236","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G665036607","display_name":null,"funder_award_id":"61872303","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7382438988","display_name":null,"funder_award_id":"202307000089","funder_id":"https://openalex.org/F4320322725","funder_display_name":"China Scholarship Council"},{"id":"https://openalex.org/G8921981762","display_name":null,"funder_award_id":"U1936113","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320311813","display_name":"\u00d6sterreichische Nationalstiftung f\u00fcr Forschung, Technologie und Entwicklung","ror":"https://ror.org/04hb33h70"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320323591","display_name":"Christian Doppler Forschungsgesellschaft","ror":"https://ror.org/00mv8h305"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W2007326055","https://openalex.org/W2008329498","https://openalex.org/W2008604527","https://openalex.org/W2011134637","https://openalex.org/W2034064249","https://openalex.org/W2036067009","https://openalex.org/W2040903332","https://openalex.org/W2063045808","https://openalex.org/W2067154776","https://openalex.org/W2105145864","https://openalex.org/W2157498268","https://openalex.org/W2158807150","https://openalex.org/W2159615412","https://openalex.org/W2243712200","https://openalex.org/W2475121515","https://openalex.org/W2489592103","https://openalex.org/W2547871092","https://openalex.org/W2558527387","https://openalex.org/W2572666595","https://openalex.org/W2759097583","https://openalex.org/W2781255632","https://openalex.org/W2790928171","https://openalex.org/W2791288201","https://openalex.org/W2901404669","https://openalex.org/W2901908388","https://openalex.org/W2911948730","https://openalex.org/W3044173375","https://openalex.org/W3083465696","https://openalex.org/W3147162255","https://openalex.org/W3155907124","https://openalex.org/W3175406864","https://openalex.org/W3186005414","https://openalex.org/W4205594186","https://openalex.org/W4210828215","https://openalex.org/W4237773508","https://openalex.org/W4296501358","https://openalex.org/W4311768025","https://openalex.org/W4312339871"],"related_works":["https://openalex.org/W2033451842","https://openalex.org/W2098392677","https://openalex.org/W2362689357","https://openalex.org/W1983591447","https://openalex.org/W2365982350","https://openalex.org/W2508016950","https://openalex.org/W2235910444","https://openalex.org/W3047160107","https://openalex.org/W2362105210","https://openalex.org/W2040892974"],"abstract_inverted_index":{"Existing":[0],"JPEG":[1,34,164],"encryption":[2,36,166],"approaches":[3],"pose":[4],"a":[5,32,58],"security":[6,40],"risk":[7],"due":[8],"to":[9,65,74,83,127,162],"the":[10,39,51,67,79,92,99,104,108,115,122,135,149,153],"difficulty":[11],"in":[12,78,103,114,130],"changing":[13],"all":[14],"block-feature":[15,55,80,140],"values":[16,141],"while":[17,88],"considering":[18],"format":[19,90],"compatibility":[20],"and":[21,107],"file":[22,85,154],"size":[23,86,155],"expansion.":[24],"To":[25],"address":[26],"these":[27],"concerns,":[28],"this":[29],"paper":[30],"introduces":[31],"novel":[33],"image":[35,165],"scheme.":[37],"First,":[38],"of":[41,54,132,139,159],"sketch":[42],"information":[43],"against":[44],"chosen-plaintext":[45],"attacks":[46],"is":[47,63,125,142],"improved":[48],"by":[49,144,156],"increasing":[50],"change":[52,137],"rate":[53,138],"values.":[56,81],"Second,":[57],"classification":[59],"global":[60],"permutation":[61],"approach":[62],"designed":[64],"encrypt":[66],"undivided":[68],"run/size,":[69],"value":[70],"(RSV)-based":[71],"AC":[72,110],"groups":[73],"achieve":[75],"larger":[76],"changes":[77],"Third,":[82],"reduce":[84],"expansion":[87],"maintaining":[89],"compatibility,":[91],"DC":[93,101],"coefficients":[94,111],"are":[95,112],"rotated":[96],"based":[97],"on":[98],"mapped":[100,113],"differences":[102],"same":[105,116],"category,":[106],"nonzero":[109],"category.":[117],"Extensive":[118],"experiments":[119],"demonstrate":[120],"that":[121],"proposed":[123,150],"algorithm":[124],"superior":[126],"existing":[128,163],"schemes":[129],"terms":[131],"security.":[133],"Notably,":[134],"average":[136,158],"increased":[143],"at":[145],"least":[146],"20%.":[147],"Furthermore,":[148],"scheme":[151],"reduces":[152],"an":[157],"2.036%":[160],"compared":[161],"methods.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
