{"id":"https://openalex.org/W2078880528","doi":"https://doi.org/10.1145/2659651.2659677","title":"Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution","display_name":"Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution","publication_year":2014,"publication_date":"2014-09-09","ids":{"openalex":"https://openalex.org/W2078880528","doi":"https://doi.org/10.1145/2659651.2659677","mag":"2078880528"},"language":"en","primary_location":{"id":"doi:10.1145/2659651.2659677","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2659651.2659677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103329119","display_name":"Alwyn Goh","orcid":null},"institutions":[{"id":"https://openalex.org/I891303086","display_name":"MIMOS (Malaysia)","ror":"https://ror.org/01k94e681","country_code":"MY","type":"company","lineage":["https://openalex.org/I891303086"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Alwyn Goh","raw_affiliation_strings":["Information Security Lab, MIMOS Berhad","Information Security Lab, MIMOS Berhad#TAB#"],"affiliations":[{"raw_affiliation_string":"Information Security Lab, MIMOS Berhad","institution_ids":["https://openalex.org/I891303086"]},{"raw_affiliation_string":"Information Security Lab, MIMOS Berhad#TAB#","institution_ids":["https://openalex.org/I891303086"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082048245","display_name":"Geong Sen Poh","orcid":"https://orcid.org/0000-0002-2905-688X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Geong Sen Poh","raw_affiliation_strings":["University Malaysia of Computer Science &amp; Engineering"],"affiliations":[{"raw_affiliation_string":"University Malaysia of Computer Science &amp; Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111494162","display_name":"Voon-Yee Vee","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Voon-Yee Vee","raw_affiliation_strings":["University Malaysia of Computer Science &amp; Engineering"],"affiliations":[{"raw_affiliation_string":"University Malaysia of Computer Science &amp; Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112765320","display_name":"Kok Boon Chong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kok Boon Chong","raw_affiliation_strings":["University Malaysia of Computer Science &amp; Engineering"],"affiliations":[{"raw_affiliation_string":"University Malaysia of Computer Science &amp; Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013210527","display_name":"Xin Zhe Khooi","orcid":"https://orcid.org/0009-0005-8048-8556"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xin Zhe Khooi","raw_affiliation_strings":["University Malaysia of Computer Science &amp; Engineering"],"affiliations":[{"raw_affiliation_string":"University Malaysia of Computer Science &amp; Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013246258","display_name":"Chanan Zhuo Ern Loh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chanan Zhuo Ern Loh","raw_affiliation_strings":["University Malaysia of Computer Science &amp; Engineering"],"affiliations":[{"raw_affiliation_string":"University Malaysia of Computer Science &amp; Engineering","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082604639","display_name":"Zhi Yuan Eng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhi Yuan Eng","raw_affiliation_strings":["University Malaysia of Computer Science &amp; Engineering"],"affiliations":[{"raw_affiliation_string":"University Malaysia of Computer Science &amp; Engineering","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5103329119"],"corresponding_institution_ids":["https://openalex.org/I891303086"],"apc_list":null,"apc_paid":null,"fwci":0.7889,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82328156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"170","last_page":"175"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7987251281738281},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.7690736055374146},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6021013259887695},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5907526612281799},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5730763077735901},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5064660310745239},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.46237751841545105},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.45671549439430237},{"id":"https://openalex.org/keywords/human-visual-system-model","display_name":"Human visual system model","score":0.4478404223918915},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.4352893531322479},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4252530038356781},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.42322078347206116},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3500715494155884},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2556302547454834},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.18011415004730225},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1650913953781128}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7987251281738281},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.7690736055374146},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6021013259887695},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5907526612281799},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5730763077735901},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5064660310745239},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.46237751841545105},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.45671549439430237},{"id":"https://openalex.org/C160086991","wikidata":"https://www.wikidata.org/wiki/Q5939193","display_name":"Human visual system model","level":3,"score":0.4478404223918915},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.4352893531322479},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4252530038356781},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.42322078347206116},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3500715494155884},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2556302547454834},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.18011415004730225},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1650913953781128},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2659651.2659677","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2659651.2659677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Security of Information and Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.550000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W119362848","https://openalex.org/W1548691389","https://openalex.org/W1892798954","https://openalex.org/W2107015241","https://openalex.org/W2116897550","https://openalex.org/W2619630761","https://openalex.org/W2824413661","https://openalex.org/W2913419753"],"related_works":["https://openalex.org/W2565952052","https://openalex.org/W2896010704","https://openalex.org/W2802183509","https://openalex.org/W2349124474","https://openalex.org/W2906421360","https://openalex.org/W4237677910","https://openalex.org/W2770854848","https://openalex.org/W2766667873","https://openalex.org/W2016928660","https://openalex.org/W4214571442"],"abstract_inverted_index":{"High-entropy":[0],"codewords":[1,56],"frequently":[2],"occur":[3],"in":[4,13,77],"the":[5,34],"context":[6],"of":[7,53,69,75,95],"cryptographic":[8],"protocols,":[9],"and":[10,38,91,115],"typically":[11],"range":[12],"length":[14],"from":[15],"128":[16],"to":[17,26,33,50,82],"1024":[18],"bits.":[19],"Human":[20],"vision":[21],"is":[22,65,88,99],"not":[23],"well":[24],"equipped":[25],"compare":[27],"or":[28,104],"recognise":[29],"such":[30],"codewords,":[31],"due":[32],"high":[35],"information":[36],"(length)":[37],"entropy":[39],"content.":[40],"In":[41],"this":[42],"paper,":[43],"we":[44],"propose":[45],"a":[46,66],"human":[47,84],"visualisation":[48],"mechanism":[49,67],"enable":[51],"representation":[52,70,110],"long":[54],"high-entropy":[55],"via":[57],"perceptually":[58],"significant":[59],"visual":[60,85,97],"images.":[61],"The":[62,93,108],"main":[63],"contribution":[64],"capable":[68],"at":[71],"more":[72],"detailed":[73],"scales":[74],"resolution":[76],"progressive":[78],"steps,":[79],"so":[80],"as":[81],"allow":[83],"inspection":[86],"which":[87],"both":[89],"secure":[90],"ergonomic.":[92],"generation":[94],"these":[96],"representations":[98],"either":[100],"dependent":[101],"on":[102],"key-specific":[103],"context-sensitive":[105],"system":[106],"inputs.":[107],"featured":[109],"allows":[111],"for":[112],"machine-to-human":[113],"authentication":[114],"authorization.":[116]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
