{"id":"https://openalex.org/W2782520763","doi":"https://doi.org/10.1142/s0219691318500248","title":"A cryptosystem for lossless/lossy grayscale images in IWT domain using chaotic map-based generated key matrices","display_name":"A cryptosystem for lossless/lossy grayscale images in IWT domain using chaotic map-based generated key matrices","publication_year":2018,"publication_date":"2018-01-04","ids":{"openalex":"https://openalex.org/W2782520763","doi":"https://doi.org/10.1142/s0219691318500248","mag":"2782520763"},"language":"en","primary_location":{"id":"doi:10.1142/s0219691318500248","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219691318500248","pdf_url":null,"source":{"id":"https://openalex.org/S56986848","display_name":"International Journal of Wavelets Multiresolution and Information Processing","issn_l":"0219-6913","issn":["0219-6913","1793-690X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wavelets, Multiresolution and Information Processing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023704551","display_name":"Kshiramani Naik","orcid":null},"institutions":[{"id":"https://openalex.org/I189109744","display_name":"Indian Institute of Technology Dhanbad","ror":"https://ror.org/013v3cc28","country_code":"IN","type":"education","lineage":["https://openalex.org/I189109744"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kshiramani Naik","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology (ISM), Dhanbad, Jharkhand-826004, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology (ISM), Dhanbad, Jharkhand-826004, India","institution_ids":["https://openalex.org/I189109744"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078569384","display_name":"Arup Kumar Pal","orcid":"https://orcid.org/0000-0003-4229-0715"},"institutions":[{"id":"https://openalex.org/I189109744","display_name":"Indian Institute of Technology Dhanbad","ror":"https://ror.org/013v3cc28","country_code":"IN","type":"education","lineage":["https://openalex.org/I189109744"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Arup Kumar Pal","raw_affiliation_strings":["Department of Computer Science and Engineering, Indian Institute of Technology (ISM), Dhanbad, Jharkhand-826004, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Indian Institute of Technology (ISM), Dhanbad, Jharkhand-826004, India","institution_ids":["https://openalex.org/I189109744"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023704551"],"corresponding_institution_ids":["https://openalex.org/I189109744"],"apc_list":null,"apc_paid":null,"fwci":0.3134,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.59590167,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"16","issue":"04","first_page":"1850024","last_page":"1850024"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9527999758720398,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.7513383030891418},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.7160062789916992},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5767465829849243},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5572543144226074},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5271598696708679},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5251604914665222},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5181723833084106},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.49364981055259705},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.4832668900489807},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.43914759159088135},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4013630747795105},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3787548243999481},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36982259154319763},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3656783103942871},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3443850874900818},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33573633432388306},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.22236517071723938}],"concepts":[{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.7513383030891418},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.7160062789916992},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5767465829849243},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5572543144226074},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5271598696708679},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5251604914665222},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5181723833084106},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.49364981055259705},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.4832668900489807},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.43914759159088135},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4013630747795105},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3787548243999481},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36982259154319763},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3656783103942871},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3443850874900818},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33573633432388306},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.22236517071723938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0219691318500248","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0219691318500248","pdf_url":null,"source":{"id":"https://openalex.org/S56986848","display_name":"International Journal of Wavelets Multiresolution and Information Processing","issn_l":"0219-6913","issn":["0219-6913","1793-690X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wavelets, Multiresolution and Information Processing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W405007189","https://openalex.org/W1977520231","https://openalex.org/W1978801065","https://openalex.org/W1982626236","https://openalex.org/W1985103235","https://openalex.org/W1986300250","https://openalex.org/W2006831356","https://openalex.org/W2007742532","https://openalex.org/W2013503531","https://openalex.org/W2046770359","https://openalex.org/W2049484058","https://openalex.org/W2049763394","https://openalex.org/W2057644840","https://openalex.org/W2058988619","https://openalex.org/W2071902337","https://openalex.org/W2072291861","https://openalex.org/W2094371111","https://openalex.org/W2094540909","https://openalex.org/W2122791109","https://openalex.org/W2134397503","https://openalex.org/W2143539509","https://openalex.org/W2295015475","https://openalex.org/W4205318349"],"related_works":["https://openalex.org/W2978432024","https://openalex.org/W2118338613","https://openalex.org/W1995805316","https://openalex.org/W3180760233","https://openalex.org/W2071387875","https://openalex.org/W1568381040","https://openalex.org/W1970394887","https://openalex.org/W2132019419","https://openalex.org/W4205915047","https://openalex.org/W2148203918"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"an":[3],"image":[4,42,52,161,217],"encryption":[5],"scheme":[6,173,211],"based":[7],"on":[8,121,177],"reversible":[9],"integer":[10],"wavelet":[11],"transform":[12],"(IWT)":[13],"with":[14,45,72,91],"chaotic":[15,74,99],"logistic":[16,75,100,148],"map":[17,76,149],"is":[18,23,43,55,129,139,166,195,212],"designed.":[19],"The":[20,67,102,134,172,204],"proposed":[21,103,210],"cryptosystem":[22],"applicable":[24],"to":[25,197],"encipher":[26],"both":[27],"the":[28,40,46,51,73,79,84,122,126,147,151,155,159,185,199,209,216],"medical":[29,180],"and":[30,35,62,181,184],"natural":[31,182],"images":[32,183,202],"in":[33],"lossless":[34],"lossy":[36],"manners,":[37],"respectively.":[38],"Initially,":[39],"original":[41,170],"transformed":[44],"multilevel":[47],"of":[48,110,118,124,153,193,201],"IWT,":[49],"then":[50],"data":[53,218],"set":[54],"divided":[56],"into":[57],"low":[58],"sub-band":[59],"(approximation":[60],"part)":[61],"high":[63],"sub-bands":[64],"(detail":[65],"part).":[66],"approximation":[68],"part":[69,128,138],"gets":[70],"confused":[71],"followed":[77],"by":[78],"bit":[80,86],"plane":[81],"decomposition.":[82],"Next,":[83],"individual":[85],"planes":[87],"are":[88],"further":[89,140],"diffused":[90],"several":[92,107,178],"binary":[93,111],"key":[94,104,112,194],"metrics,":[95],"generated":[96],"using":[97,146],"a":[98,115,190],"map.":[101],"schedule":[105],"derives":[106],"large":[108],"size":[109,117,192],"metrics":[113],"from":[114],"small":[116,191],"key.":[119],"Based":[120],"type":[123],"applications,":[125],"detail":[127,137],"considered":[130,141],"for":[131,143,150,214],"lossless/lossy":[132,135],"compression.":[133],"compressed":[136],"only":[142],"confusion":[144],"process":[145],"sake":[152],"enhancing":[154],"security":[156,205],"level.":[157],"Finally,":[158],"cipher":[160],"obtained":[162],"after":[163],"inverse":[164],"IWT":[165],"significantly":[167],"dissimilar":[168],"than":[169],"image.":[171],"has":[174],"been":[175],"tested":[176],"standard":[179],"experimental":[186],"results":[187],"substantiate":[188],"that":[189,208],"enough":[196],"protect":[198],"content":[200],"completely.":[203],"analysis":[206],"reveals":[207],"suitable":[213],"protecting":[215],"effectively.":[219]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
