{"id":"https://openalex.org/W4408460748","doi":"https://doi.org/10.1117/1.jei.34.2.023017","title":"Verifiable and visually meaningful image encryption scheme based on two-stage data fusion in the encrypted domain","display_name":"Verifiable and visually meaningful image encryption scheme based on two-stage data fusion in the encrypted domain","publication_year":2025,"publication_date":"2025-03-14","ids":{"openalex":"https://openalex.org/W4408460748","doi":"https://doi.org/10.1117/1.jei.34.2.023017"},"language":"en","primary_location":{"id":"doi:10.1117/1.jei.34.2.023017","is_oa":false,"landing_page_url":"https://doi.org/10.1117/1.jei.34.2.023017","pdf_url":null,"source":{"id":"https://openalex.org/S158511090","display_name":"Journal of Electronic Imaging","issn_l":"1017-9909","issn":["1017-9909","1560-229X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electronic Imaging","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100616471","display_name":"Haojie Li","orcid":"https://orcid.org/0000-0003-3882-2205"},"institutions":[{"id":"https://openalex.org/I145581781","display_name":"Chongqing Technology and Business University","ror":"https://ror.org/05hqf1284","country_code":"CN","type":"education","lineage":["https://openalex.org/I145581781"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haojie Li","raw_affiliation_strings":["Chongqing Technology and Business University, School of Mathematics and Statistics, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Chongqing Technology and Business University, School of Mathematics and Statistics, Chongqing, China","institution_ids":["https://openalex.org/I145581781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100457571","display_name":"Meng Li","orcid":"https://orcid.org/0000-0003-3553-0813"},"institutions":[{"id":"https://openalex.org/I145581781","display_name":"Chongqing Technology and Business University","ror":"https://ror.org/05hqf1284","country_code":"CN","type":"education","lineage":["https://openalex.org/I145581781"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Li","raw_affiliation_strings":["Chongqing Technology and Business University, School of Mathematics and Statistics, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"Chongqing Technology and Business University, School of Mathematics and Statistics, Chongqing, China","institution_ids":["https://openalex.org/I145581781"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100457571"],"corresponding_institution_ids":["https://openalex.org/I145581781"],"apc_list":null,"apc_paid":null,"fwci":2.6381,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.88459898,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"34","issue":"02","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.876800000667572,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.876800000667572,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7735742330551147},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7085732817649841},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6535170078277588},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5830804705619812},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5552079677581787},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5164947509765625},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4476812481880188},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.4449446499347687},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4358013868331909},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3459230661392212},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3254334330558777},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2253408432006836},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21455109119415283},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13316082954406738}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7735742330551147},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7085732817649841},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6535170078277588},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5830804705619812},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5552079677581787},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5164947509765625},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4476812481880188},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.4449446499347687},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4358013868331909},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3459230661392212},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3254334330558777},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2253408432006836},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21455109119415283},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13316082954406738},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1117/1.jei.34.2.023017","is_oa":false,"landing_page_url":"https://doi.org/10.1117/1.jei.34.2.023017","pdf_url":null,"source":{"id":"https://openalex.org/S158511090","display_name":"Journal of Electronic Imaging","issn_l":"1017-9909","issn":["1017-9909","1560-229X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310315543","host_organization_name":"SPIE","host_organization_lineage":["https://openalex.org/P4310315543"],"host_organization_lineage_names":["SPIE"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Electronic Imaging","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W844411675","https://openalex.org/W1828309477","https://openalex.org/W1968840538","https://openalex.org/W1989772484","https://openalex.org/W2001792341","https://openalex.org/W2020220687","https://openalex.org/W2098732852","https://openalex.org/W2111543721","https://openalex.org/W2126856211","https://openalex.org/W2153809950","https://openalex.org/W2608592531","https://openalex.org/W2784071846","https://openalex.org/W2791274315","https://openalex.org/W2902386756","https://openalex.org/W2946776843","https://openalex.org/W2951676679","https://openalex.org/W2969815465","https://openalex.org/W3006346345","https://openalex.org/W3037758685","https://openalex.org/W3105683660","https://openalex.org/W3123361482","https://openalex.org/W3160947934","https://openalex.org/W3167657925","https://openalex.org/W3168083935","https://openalex.org/W3176844538","https://openalex.org/W3181762346","https://openalex.org/W3194458288","https://openalex.org/W3197903522","https://openalex.org/W3216591671","https://openalex.org/W4206197292","https://openalex.org/W4210661959","https://openalex.org/W4225399289","https://openalex.org/W4281571458","https://openalex.org/W4289444087","https://openalex.org/W4290958908","https://openalex.org/W4293195440","https://openalex.org/W4294608556","https://openalex.org/W4295259530","https://openalex.org/W4311904230","https://openalex.org/W4312249533","https://openalex.org/W4313406801","https://openalex.org/W4315642170","https://openalex.org/W4327905235","https://openalex.org/W4328007224","https://openalex.org/W4376851356","https://openalex.org/W4386580382","https://openalex.org/W4386643028","https://openalex.org/W4389152311","https://openalex.org/W4390221460","https://openalex.org/W4392979703","https://openalex.org/W4405506919","https://openalex.org/W6650265405","https://openalex.org/W6668420908","https://openalex.org/W6754984054","https://openalex.org/W6762764622","https://openalex.org/W6771586581"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2364126283","https://openalex.org/W4383721755"],"abstract_inverted_index":{"Visually":[0],"meaningful":[1],"image":[2,9,142,152,221,234,269],"encryption":[3],"(VMIE)":[4],"schemes":[5,22,73,169],"disguise":[6],"the":[7,28,38,43,79,97,110,128,135,150,157,163,176,185,190,195,201,219,228,232,236,239,243,262,267,280,283],"secret":[8,25,114,138,202,224,240,268,296],"as":[10],"another":[11],"common":[12],"image,":[13,115,139],"effectively":[14,108],"avoiding":[15],"hackers\u2019":[16],"notice":[17],"and":[18,56,116,140,203,211,235,270,294],"suspicion.":[19],"Most":[20],"existing":[21,72],"embed":[23,172],"pre-encrypted":[24],"images":[26,55,65,174,193,205,293],"into":[27,175],"plaintext":[29,177],"domain":[30,130,197],"of":[31,46,53,123,160,192,231,238,245,291],"host":[32,117,141,204,220],"images.":[33,297],"This":[34],"may":[35],"lead":[36],"to":[37,107,133,162,189,198,218],"following":[39],"security":[40,237],"risks:":[41],"(1)":[42],"easy":[44],"accessibility":[45],"embedded":[47],"data":[48,94,125,147,180],"through":[49],"direct":[50,63],"statistical":[51],"analysis":[52],"ciphertext":[54,151,196,233,292],"(2)":[57],"visual":[58,229,289],"quality":[59,230,290],"degradation":[60],"caused":[61,222],"by":[62,83,143,155,223],"embedding":[64,121],"with":[66,279],"different":[67],"distribution":[68,210],"features.":[69,213],"In":[70],"addition,":[71],"rarely":[74],"consider":[75],"identity":[76,257],"verification":[77],"for":[78,256],"data-sharing":[80],"party.":[81],"Motivated":[82],"these":[84],"shortcomings,":[85],"we":[86],"develop":[87],"a":[88,251,287],"verifiable":[89],"VMIE":[90],"framework":[91],"based":[92],"on":[93],"fusion":[95,126,164,181],"in":[96,127,184,194],"encrypted":[98,129,186],"domain.":[99,187],"First,":[100],"an":[101,120],"improved":[102],"chaos":[103],"system":[104],"is":[105,131,153,182],"designed":[106],"pre-encrypt":[109],"digitalized":[111,246],"handwritten":[112,136,247,271],"signature,":[113,137],"image.":[118],"Then,":[119],"strategy":[122],"two-stage":[124],"proposed":[132,263,284],"integrate":[134],"least":[144],"significant":[145],"bit-based":[146],"hiding.":[148],"Finally,":[149],"reconstructed":[154],"applying":[156],"reverse":[158],"operation":[159],"pre-encryption":[161,207],"result.":[165],"Different":[166],"from":[167],"general":[168],"that":[170,261],"directly":[171],"noise-like":[173],"domain,":[178],"our":[179],"completed":[183],"Due":[188],"similarity":[191],"noise":[199],"images,":[200],"after":[206,274],"have":[208],"close":[209],"texture":[212],"Thus,":[214],"it":[215],"reduces":[216],"disturbance":[217],"embedding,":[225],"thereby":[226],"improving":[227],"data.":[241],"Moreover,":[242],"introduction":[244],"signatures":[248],"has":[249,286],"brought":[250],"more":[252],"convenient":[253],"user":[254],"experience":[255],"verification.":[258],"Experiments":[259],"show":[260],"scheme":[264,285],"can":[265],"recover":[266],"signature":[272],"even":[273],"undertaking":[275],"various":[276],"attacks.":[277],"Compared":[278],"state-of-the-art":[281],"algorithms,":[282],"higher":[288],"recovered":[295]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
