{"id":"https://openalex.org/W2011041582","doi":"https://doi.org/10.1145/1980022.1980090","title":"Chaos based encryption technique for digital images","display_name":"Chaos based encryption technique for digital images","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2011041582","doi":"https://doi.org/10.1145/1980022.1980090","mag":"2011041582"},"language":"en","primary_location":{"id":"doi:10.1145/1980022.1980090","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076282046","display_name":"Sanjeev Ghosh","orcid":"https://orcid.org/0000-0002-2744-1434"},"institutions":[{"id":"https://openalex.org/I53508799","display_name":"Tumkur University","ror":"https://ror.org/02j63m808","country_code":"IN","type":"education","lineage":["https://openalex.org/I53508799"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"S. Ghosh","raw_affiliation_strings":["Thakur College of Engg. & Tech., Kandivali (E), Mumbai","Thakur college of Engg. & Tech., Kandivali (E), Mumbai#TAB#"],"affiliations":[{"raw_affiliation_string":"Thakur College of Engg. & Tech., Kandivali (E), Mumbai","institution_ids":["https://openalex.org/I53508799"]},{"raw_affiliation_string":"Thakur college of Engg. & Tech., Kandivali (E), Mumbai#TAB#","institution_ids":["https://openalex.org/I53508799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027723382","display_name":"Shailendra Mishra","orcid":"https://orcid.org/0000-0002-0227-7148"},"institutions":[{"id":"https://openalex.org/I53508799","display_name":"Tumkur University","ror":"https://ror.org/02j63m808","country_code":"IN","type":"education","lineage":["https://openalex.org/I53508799"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Mishra","raw_affiliation_strings":["Thakur College of Engg. & Tech., Kandivali (E), Mumbai","Thakur college of Engg. & Tech., Kandivali (E), Mumbai#TAB#"],"affiliations":[{"raw_affiliation_string":"Thakur College of Engg. & Tech., Kandivali (E), Mumbai","institution_ids":["https://openalex.org/I53508799"]},{"raw_affiliation_string":"Thakur college of Engg. & Tech., Kandivali (E), Mumbai#TAB#","institution_ids":["https://openalex.org/I53508799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033203259","display_name":"Punam K. Saha","orcid":"https://orcid.org/0000-0003-1576-118X"},"institutions":[{"id":"https://openalex.org/I53508799","display_name":"Tumkur University","ror":"https://ror.org/02j63m808","country_code":"IN","type":"education","lineage":["https://openalex.org/I53508799"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"P. Saha","raw_affiliation_strings":["Thakur College of Engg. & Tech., Kandivali (E), Mumbai","Thakur college of Engg. & Tech., Kandivali (E), Mumbai#TAB#"],"affiliations":[{"raw_affiliation_string":"Thakur College of Engg. & Tech., Kandivali (E), Mumbai","institution_ids":["https://openalex.org/I53508799"]},{"raw_affiliation_string":"Thakur college of Engg. & Tech., Kandivali (E), Mumbai#TAB#","institution_ids":["https://openalex.org/I53508799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076282046"],"corresponding_institution_ids":["https://openalex.org/I53508799"],"apc_list":null,"apc_paid":null,"fwci":0.5151,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.67235459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"300","last_page":"300"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10588","display_name":"Mathematical Dynamics and Fractals","score":0.9319000244140625,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9182999730110168,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.917039155960083},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7598484754562378},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.6827212572097778},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.5966895222663879},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5532269477844238},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.5225438475608826},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.5128231644630432},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.48516350984573364},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.4575369358062744},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.4498915374279022},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.43652772903442383},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.42865586280822754},{"id":"https://openalex.org/keywords/disk-encryption","display_name":"Disk encryption","score":0.4250923991203308},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.41657134890556335},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39320501685142517},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3861823081970215},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3723030686378479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31036749482154846},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.21894487738609314},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12547513842582703}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.917039155960083},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7598484754562378},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.6827212572097778},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.5966895222663879},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5532269477844238},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.5225438475608826},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.5128231644630432},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.48516350984573364},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.4575369358062744},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.4498915374279022},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.43652772903442383},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.42865586280822754},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.4250923991203308},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.41657134890556335},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39320501685142517},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3861823081970215},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3723030686378479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31036749482154846},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.21894487738609314},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12547513842582703}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1980022.1980090","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1980022.1980090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference &amp; Workshop on Emerging Trends in Technology - ICWET '11","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2101541109","https://openalex.org/W2101779172","https://openalex.org/W2107618930","https://openalex.org/W2152834677","https://openalex.org/W2171285933","https://openalex.org/W2379297019"],"related_works":["https://openalex.org/W2111426419","https://openalex.org/W1025240641","https://openalex.org/W4379801595","https://openalex.org/W2370942914","https://openalex.org/W2765754337","https://openalex.org/W4360994575","https://openalex.org/W2379631527","https://openalex.org/W4308992061","https://openalex.org/W222001389","https://openalex.org/W4206831129"],"abstract_inverted_index":{"With":[0],"the":[1,4,23,55,68,90,93],"development":[2],"of":[3,30,92],"Internet":[5],"and":[6,10,16,37,84],"multimedia":[7],"technology,":[8],"more":[9,11],"information":[12],"including":[13],"audio,":[14],"images,":[15,31],"other":[17],"multimedia,":[18],"are":[19,45,82],"being":[20],"transmitted":[21],"over":[22],"Internet.":[24],"Due":[25],"to":[26,66],"some":[27],"intrinsic":[28],"features":[29],"such":[32,79],"as":[33],"bulk":[34],"data":[35],"capacity":[36],"high":[38],"correlation":[39],"among":[40],"pixels,":[41],"traditional":[42,72],"encryption":[43,57,73,80],"algorithms":[44,81],"not":[46],"suitable":[47],"for":[48],"practical":[49],"image":[50,56],"encryption.":[51],"In":[52,75],"recent":[53],"years,":[54],"technologies":[58],"based":[59],"on":[60],"chaos":[61],"theory":[62],"have":[63],"been":[64,97],"developed":[65],"overcome":[67],"disadvantages":[69],"present":[70],"in":[71],"techniques.":[74],"this":[76],"paper":[77],"two":[78,94],"discussed":[83],"analyzed.":[85],"A":[86],"new":[87],"technique":[88],"combining":[89],"benefits":[91],"systems":[95],"has":[96],"proposed.":[98]},"counts_by_year":[{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
