{"id":"https://openalex.org/W4317660897","doi":"https://doi.org/10.1142/s0219467824500104","title":"Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique","display_name":"Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique","publication_year":2023,"publication_date":"2023-01-20","ids":{"openalex":"https://openalex.org/W4317660897","doi":"https://doi.org/10.1142/s0219467824500104"},"language":"en","primary_location":{"id":"doi:10.1142/s0219467824500104","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219467824500104","pdf_url":null,"source":{"id":"https://openalex.org/S60080701","display_name":"International Journal of Image and Graphics","issn_l":"0219-4678","issn":["0219-4678","1793-6756"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Image and Graphics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037168517","display_name":"Swetha Gadde","orcid":"https://orcid.org/0000-0002-1999-3677"},"institutions":[{"id":"https://openalex.org/I1323219464","display_name":"Rajarajeswari Medical College and Hospital","ror":"https://ror.org/00gn6h668","country_code":"IN","type":"education","lineage":["https://openalex.org/I1323219464"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Swetha Gadde","raw_affiliation_strings":["Research Scholar, Department of Computer Science and Engineering, Rajarajeswari College of Engineering, Affiliated to VTU, Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Research Scholar, Department of Computer Science and Engineering, Rajarajeswari College of Engineering, Affiliated to VTU, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I1323219464"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112612853","display_name":"J. Amutharaj","orcid":null},"institutions":[{"id":"https://openalex.org/I1323219464","display_name":"Rajarajeswari Medical College and Hospital","ror":"https://ror.org/00gn6h668","country_code":"IN","type":"education","lineage":["https://openalex.org/I1323219464"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"J. Amutharaj","raw_affiliation_strings":["Department of Information Science and Engineering, Rajarajeswari College of Engineering, Affiliated to VTU, Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Engineering, Rajarajeswari College of Engineering, Affiliated to VTU, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I1323219464"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038530774","display_name":"S. Usha","orcid":"https://orcid.org/0000-0002-5168-9915"},"institutions":[{"id":"https://openalex.org/I1323219464","display_name":"Rajarajeswari Medical College and Hospital","ror":"https://ror.org/00gn6h668","country_code":"IN","type":"education","lineage":["https://openalex.org/I1323219464"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Usha","raw_affiliation_strings":["Department of Computer Science and Engineering, Rajarajeswari College of Engineering, Affiliated to VTU, Bengaluru, Karnataka, India","Research Scholar, Department of Computer Science and Engineering, Rajarajeswari College of Engineering, Affiliated to VTU, Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Rajarajeswari College of Engineering, Affiliated to VTU, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I1323219464"]},{"raw_affiliation_string":"Research Scholar, Department of Computer Science and Engineering, Rajarajeswari College of Engineering, Affiliated to VTU, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I1323219464"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037168517"],"corresponding_institution_ids":["https://openalex.org/I1323219464"],"apc_list":null,"apc_paid":null,"fwci":1.084,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.78592256,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"24","issue":"01","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9725000262260437,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9550999999046326,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9293000102043152,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8444672226905823},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7385079264640808},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6459107398986816},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6395619511604309},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6123114824295044},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5609423518180847},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.549139142036438},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5077889561653137},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.4672054648399353},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.43706101179122925},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4260247051715851},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3395377993583679},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1638200283050537},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.14440199732780457},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10438695549964905}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8444672226905823},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7385079264640808},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6459107398986816},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6395619511604309},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6123114824295044},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5609423518180847},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.549139142036438},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5077889561653137},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.4672054648399353},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.43706101179122925},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4260247051715851},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3395377993583679},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1638200283050537},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14440199732780457},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10438695549964905}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219467824500104","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219467824500104","pdf_url":null,"source":{"id":"https://openalex.org/S60080701","display_name":"International Journal of Image and Graphics","issn_l":"0219-4678","issn":["0219-4678","1793-6756"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Image and Graphics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4300000071525574}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W773504527","https://openalex.org/W2028345003","https://openalex.org/W2061438946","https://openalex.org/W2094689349","https://openalex.org/W2155336821","https://openalex.org/W2290883490","https://openalex.org/W2306115793","https://openalex.org/W2541451878","https://openalex.org/W2625891264","https://openalex.org/W2727931011","https://openalex.org/W2741730096","https://openalex.org/W2743436145","https://openalex.org/W2789845845","https://openalex.org/W2792587090","https://openalex.org/W2894022047","https://openalex.org/W2896120010","https://openalex.org/W2898367412","https://openalex.org/W2903568838","https://openalex.org/W2945748508","https://openalex.org/W2946517659","https://openalex.org/W2969540857","https://openalex.org/W2973549901","https://openalex.org/W2981455952","https://openalex.org/W2997522935","https://openalex.org/W2998748230","https://openalex.org/W2999279232","https://openalex.org/W3014099641","https://openalex.org/W3021572733","https://openalex.org/W3028719682","https://openalex.org/W3033899227","https://openalex.org/W3047643256","https://openalex.org/W3091484551","https://openalex.org/W3095453538","https://openalex.org/W4233857953","https://openalex.org/W4234713688"],"related_works":["https://openalex.org/W2391717201","https://openalex.org/W4362544759","https://openalex.org/W2800638116","https://openalex.org/W2076705113","https://openalex.org/W2342851483","https://openalex.org/W2167384606","https://openalex.org/W4286286248","https://openalex.org/W564025356","https://openalex.org/W2986084449","https://openalex.org/W2158504824"],"abstract_inverted_index":{"Currently,":[0],"the":[1,15,32,61,75,114,119,133,142,149,154,164,172,208,211],"size":[2],"of":[3,17,21,26,51,64,156,167,210],"multimedia":[4,110],"data":[5,28,63,77,85,111,135,161],"is":[6,29,124,139,148,163,181,203],"rising":[7],"gradually":[8],"from":[9],"gigabytes":[10],"to":[11,14,59,90,101,152,206],"petabytes,":[12],"due":[13],"progression":[16],"a":[18,49,83,92,177,185],"larger":[19],"quantity":[20],"realistic":[22],"data.":[23,81],"The":[24],"majority":[25],"big":[27],"conveyed":[30],"via":[31],"internet":[33],"and":[34,53,121,158],"they":[35,73],"were":[36,48],"accumulated":[37],"on":[38],"cloud":[39,42,137],"servers.":[40],"Since":[41],"computing":[43],"offers":[44],"internet-oriented":[45],"services,":[46],"there":[47],"lot":[50],"attackers":[52],"malevolent":[54],"users.":[55],"They":[56],"always":[57],"attempt":[58],"deploy":[60],"private":[62],"users":[65],"without":[66],"any":[67,79],"right":[68],"access.":[69],"At":[70],"certain":[71],"times,":[72],"substitute":[74],"real":[76],"by":[78,112,127,184],"counterfeit":[80],"As":[82],"result,":[84],"protection":[86],"has":[87],"turned":[88],"out":[89,126,205],"be":[91],"noteworthy":[93],"concern":[94],"in":[95,136],"recent":[96],"times.":[97],"This":[98],"paper":[99],"aims":[100],"establish":[102],"an":[103,201],"optimization-based":[104],"privacy":[105],"preservation":[106],"model":[107],"for":[108],"preserving":[109],"selecting":[113],"optimal":[115,143],"secret":[116],"key.":[117,144],"Here,":[118],"encryption":[120],"decryption":[122],"process":[123,166],"carried":[125,204],"Improved":[128],"Blowfish":[129],"cryptographic":[130],"technique,":[131],"where":[132],"sensitive":[134],"server":[138],"preserved":[140],"using":[141],"Optimal":[145],"key":[146,174],"generation":[147,175],"significant":[150],"procedure":[151],"ensure":[153],"objectives":[155],"integrity":[157],"confidentiality.":[159],"Likewise,":[160],"restoration":[162],"inverse":[165],"sanitization":[168],"(decryption).":[169],"In":[170],"both":[171],"cases,":[173],"remains":[176],"major":[178],"aspect,":[179],"which":[180],"optimally":[182],"chosen":[183],"novel":[186],"hybrid":[187],"algorithm":[188],"termed":[189],"as":[190],"\u201cClan":[191],"based":[192],"Crow":[193],"Search":[194],"with":[195],"Adaptive":[196],"Awareness":[197],"probability":[198],"(CCS-AAP).":[199],"Finally,":[200],"analysis":[202],"validate":[207],"improvement":[209],"proposed":[212],"method.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
