{"id":"https://openalex.org/W2119686205","doi":"https://doi.org/10.1145/1027527.1027609","title":"Security of human video objects by incorporating a chaos-based feedback cryptographic scheme","display_name":"Security of human video objects by incorporating a chaos-based feedback cryptographic scheme","publication_year":2004,"publication_date":"2004-10-10","ids":{"openalex":"https://openalex.org/W2119686205","doi":"https://doi.org/10.1145/1027527.1027609","mag":"2119686205"},"language":"en","primary_location":{"id":"doi:10.1145/1027527.1027609","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1027527.1027609","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th annual ACM international conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://doi.org/10.1145/1027527.1027609","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071610360","display_name":"Tzouveli Paraskevi","orcid":null},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Tzouveli Paraskevi","raw_affiliation_strings":["National Technical University of Athens, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009287834","display_name":"Ntalianis Klimis","orcid":null},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Ntalianis Klimis","raw_affiliation_strings":["National Technical University of Athens, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102714051","display_name":"Stefanos Kollias","orcid":"https://orcid.org/0000-0002-2879-9286"},"institutions":[{"id":"https://openalex.org/I174458059","display_name":"National Technical University of Athens","ror":"https://ror.org/03cx6bg69","country_code":"GR","type":"education","lineage":["https://openalex.org/I174458059"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Kollias Stefanos","raw_affiliation_strings":["National Technical University of Athens, Athens, Greece"],"affiliations":[{"raw_affiliation_string":"National Technical University of Athens, Athens, Greece","institution_ids":["https://openalex.org/I174458059"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071610360"],"corresponding_institution_ids":["https://openalex.org/I174458059"],"apc_list":null,"apc_paid":null,"fwci":0.5552,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.70602216,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"352","last_page":"355"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8376309871673584},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8315005302429199},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6538563966751099},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5999690890312195},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4110797047615051},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39550647139549255},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3721626400947571},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3275220990180969},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.296877384185791}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8376309871673584},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8315005302429199},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6538563966751099},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5999690890312195},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4110797047615051},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39550647139549255},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3721626400947571},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3275220990180969},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.296877384185791},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1027527.1027609","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1027527.1027609","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th annual ACM international conference on Multimedia","raw_type":"proceedings-article"},{"id":"pmh:oai:dspace.lib.ntua.gr:123456789/34685","is_oa":true,"landing_page_url":"http://doi.org/10.1145/1027527.1027609","pdf_url":null,"source":{"id":"https://openalex.org/S4377196837","display_name":"DSpace - NTUA (National Technical University of Athens)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I174458059","host_organization_name":"National Technical University of Athens","host_organization_lineage":["https://openalex.org/I174458059"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM Multimedia Conference","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:dspace.lib.ntua.gr:123456789/34685","is_oa":true,"landing_page_url":"http://doi.org/10.1145/1027527.1027609","pdf_url":null,"source":{"id":"https://openalex.org/S4377196837","display_name":"DSpace - NTUA (National Technical University of Athens)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I174458059","host_organization_name":"National Technical University of Athens","host_organization_lineage":["https://openalex.org/I174458059"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ACM Multimedia Conference","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1514889335","https://openalex.org/W1531522605","https://openalex.org/W1603307892","https://openalex.org/W1667165204","https://openalex.org/W1979684610","https://openalex.org/W2036488048","https://openalex.org/W2053111047","https://openalex.org/W2115605660","https://openalex.org/W2116331921","https://openalex.org/W2120706888","https://openalex.org/W2170926081","https://openalex.org/W2486074288","https://openalex.org/W2600578627","https://openalex.org/W2942228371","https://openalex.org/W6630764392","https://openalex.org/W6685531302","https://openalex.org/W6807716365","https://openalex.org/W7024001005"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2004708907","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2770593030","https://openalex.org/W2376048186","https://openalex.org/W4307248189","https://openalex.org/W3093954335","https://openalex.org/W4205482204"],"abstract_inverted_index":{"Security":[0],"of":[1,35,93,96,102,131,150,161],"multimedia":[2,24,163],"files":[3,25],"attracts":[4],"more":[5,7],"and":[6,9,84,143,153],"attention":[8],"many":[10],"encryption":[11,70,126],"methods":[12],"have":[13],"been":[14],"proposed":[15],"in":[16,61],"literature.":[17],"However":[18],"most":[19],"cryptographic":[20],"systems":[21],"deal":[22],"with":[23,128],"as":[26],"binary":[27],"large":[28],"objects,":[29],"without":[30],"taking":[31],"into":[32],"consideration":[33],"regions":[34,39,49,80,87],"semantic":[36],"information.":[37],"These":[38],"may":[40],"need":[41,51],"better":[42],"protection":[43],"or":[44],"can":[45,144],"be":[46],"the":[47,55,74,94,100,124,132,158],"only":[48],"that":[50],"protection,":[52],"depending":[53],"on":[54,73,117],"specific":[56],"application.":[57],"Towards":[58],"this":[59,62],"direction,":[60],"paper":[63],"we":[64],"propose":[65],"a":[66,118,147,162],"human":[67,104],"video":[68,105],"object":[69],"system":[71,136],"based":[72,116],"chaotic":[75],"logistic":[76],"map.":[77],"Initially":[78],"face":[79,97],"are":[81,88,107],"efficiently":[82],"detected":[83],"afterwards":[85],"body":[86],"extracted,":[89],"using":[90,109],"geometric":[91],"information":[92,130],"location":[95],"regions.":[98],"Next":[99],"pixels":[101],"extracted":[103],"objects":[106],"encrypted":[108,129],"an":[110],"iterative":[111],"cipher":[112],"module,":[113],"which":[114],"is":[115],"feedback":[119],"mechanism":[120],"responsible":[121],"for":[122,156],"mixing":[123],"current":[125],"parameters":[127],"previous":[133],"step.":[134],"The":[135],"presents":[137],"robustness":[138],"against":[139],"known":[140],"cryptanalytic":[141],"attacks,":[142],"save":[145],"us":[146],"great":[148],"amount":[149],"computational":[151],"resources":[152],"time":[154],"devoted":[155],"encrypting":[157],"whole":[159],"contents":[160],"file.":[164]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
