{"id":"https://openalex.org/W2939372483","doi":"https://doi.org/10.1145/3309074.3309107","title":"Controlled partial image encryption based on LSIC and chaotic map","display_name":"Controlled partial image encryption based on LSIC and chaotic map","publication_year":2019,"publication_date":"2019-01-19","ids":{"openalex":"https://openalex.org/W2939372483","doi":"https://doi.org/10.1145/3309074.3309107","mag":"2939372483"},"language":"en","primary_location":{"id":"doi:10.1145/3309074.3309107","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3309074.3309107","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033495329","display_name":"B. D. Parameshachari","orcid":null},"institutions":[{"id":"https://openalex.org/I65674248","display_name":"Visvesvaraya Technological University","ror":"https://ror.org/00ha14p11","country_code":"IN","type":"education","lineage":["https://openalex.org/I65674248"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Parameshachari B D","raw_affiliation_strings":["GSSSIETW Mysuru, India and Affiliated to VTU Belagavi"],"affiliations":[{"raw_affiliation_string":"GSSSIETW Mysuru, India and Affiliated to VTU Belagavi","institution_ids":["https://openalex.org/I65674248"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kiran","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kiran","raw_affiliation_strings":["VTU, Belagavi and G Madegowda Institute of Technology (GMIT), Mandya, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"VTU, Belagavi and G Madegowda Institute of Technology (GMIT), Mandya, Karnataka, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009519694","display_name":"P. Rashmi","orcid":null},"institutions":[{"id":"https://openalex.org/I4403386631","display_name":"Sri Siddhartha Academy of Higher Education","ror":"https://ror.org/05pc6yw33","country_code":null,"type":"education","lineage":["https://openalex.org/I4403386631"]},{"id":"https://openalex.org/I510634243","display_name":"Sri Siddhartha Medical College","ror":"https://ror.org/01zemh668","country_code":"IN","type":"education","lineage":["https://openalex.org/I4403386631","https://openalex.org/I510634243"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rashmi P","raw_affiliation_strings":["Sri Siddhartha Academy of Higher Education, Tumakuru, India"],"affiliations":[{"raw_affiliation_string":"Sri Siddhartha Academy of Higher Education, Tumakuru, India","institution_ids":["https://openalex.org/I510634243","https://openalex.org/I4403386631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011268184","display_name":"Supriya Maganahalli Chandramouli","orcid":"https://orcid.org/0000-0002-8059-1079"},"institutions":[{"id":"https://openalex.org/I53508799","display_name":"Tumkur University","ror":"https://ror.org/02j63m808","country_code":"IN","type":"education","lineage":["https://openalex.org/I53508799"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Supriya M C","raw_affiliation_strings":["SSIT, Tumakuru, India and Affiliated to SAHE, Tumakuru"],"affiliations":[{"raw_affiliation_string":"SSIT, Tumakuru, India and Affiliated to SAHE, Tumakuru","institution_ids":["https://openalex.org/I53508799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056868633","display_name":"Rajashekarappa Rajashekarappa","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajashekarappa","raw_affiliation_strings":["SDMCET, Dharwad, India and Affiliated to VTU Belagavi"],"affiliations":[{"raw_affiliation_string":"SDMCET, Dharwad, India and Affiliated to VTU Belagavi","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110609413","display_name":"H. T. Panduranga","orcid":null},"institutions":[{"id":"https://openalex.org/I53508799","display_name":"Tumkur University","ror":"https://ror.org/02j63m808","country_code":"IN","type":"education","lineage":["https://openalex.org/I53508799"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Panduranga H T","raw_affiliation_strings":["Govt. Poly-technic, Tumkur-Karantaka"],"affiliations":[{"raw_affiliation_string":"Govt. Poly-technic, Tumkur-Karantaka","institution_ids":["https://openalex.org/I53508799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5033495329"],"corresponding_institution_ids":["https://openalex.org/I65674248"],"apc_list":null,"apc_paid":null,"fwci":4.904,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.96130202,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"60","last_page":"63"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7185245752334595},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6029230952262878},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5902456045150757},{"id":"https://openalex.org/keywords/chaotic-map","display_name":"Chaotic map","score":0.5436186194419861},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4569741487503052},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.4540886878967285},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.34333592653274536},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3331618309020996},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27656036615371704},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23207178711891174},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2243528962135315}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7185245752334595},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6029230952262878},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5902456045150757},{"id":"https://openalex.org/C2983793180","wikidata":"https://www.wikidata.org/wiki/Q166314","display_name":"Chaotic map","level":3,"score":0.5436186194419861},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4569741487503052},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.4540886878967285},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.34333592653274536},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3331618309020996},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27656036615371704},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23207178711891174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2243528962135315}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3309074.3309107","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3309074.3309107","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W136622180","https://openalex.org/W2023290515","https://openalex.org/W2063044092","https://openalex.org/W2063685463","https://openalex.org/W2076501742","https://openalex.org/W2081223177","https://openalex.org/W2133665775","https://openalex.org/W2159269332","https://openalex.org/W2168051653","https://openalex.org/W2534085923","https://openalex.org/W2808273267","https://openalex.org/W4248031590","https://openalex.org/W4285719527","https://openalex.org/W6605598820","https://openalex.org/W6717539790"],"related_works":["https://openalex.org/W1627362987","https://openalex.org/W2018914863","https://openalex.org/W2897664099","https://openalex.org/W2393321762","https://openalex.org/W2391464897","https://openalex.org/W4286889817","https://openalex.org/W3210623391","https://openalex.org/W3133955711","https://openalex.org/W3106063164","https://openalex.org/W607022575"],"abstract_inverted_index":{"Partial":[0],"image":[1,12,32,46],"encryption":[2,18,33,139],"plays":[3],"a":[4],"vital":[5],"role":[6],"in":[7],"the":[8,128,142],"field":[9],"of":[10,17,41,53,67,90,98,138],"medical":[11],"encryption,":[13],"because":[14],"small":[15],"amount":[16,137],"leads":[19],"to":[20],"high":[21],"security":[22],"with":[23,58,81],"low":[24],"computation":[25],"complexity.":[26],"This":[27],"paper":[28],"presents":[29],"controlled":[30,136],"partial":[31,122],"using":[34,112],"LSIC":[35,91],"and":[36],"chaotic":[37,113],"map.":[38,114],"It":[39],"consists":[40],"two":[42],"methods.":[43],"In":[44,95],"method-1":[45],"is":[47,56,70,79,110],"divided":[48],"into":[49,92],"16x16":[50,82,93],"blocks.":[51],"Entropy":[52],"each":[54,68,88],"block":[55,69,78,84,99,109],"compared":[57],"threshold":[59,74,103,118],"entropy":[60,62,66,75,97,104,119],"from":[61],"selection":[63],"table.":[64],"If":[65],"greater":[71,100],"than":[72,101],"predefined":[73,102],"then":[76,105],"that":[77,108,132],"XORed":[80],"random":[83],"generated":[85],"by":[86],"converting":[87],"row":[89],"block.":[94],"method-2":[96],"pixels":[106],"within":[107],"shuffled":[111],"Based":[115],"on":[116],"different":[117,121],"values":[120],"encrypted":[123],"images":[124],"are":[125],"obtained.":[126],"From":[127],"experimental":[129],"results":[130],"shows":[131],"proposed":[133],"methods":[134],"can":[135],"as":[140],"per":[141],"requirements.":[143]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":38},{"year":2020,"cited_by_count":8}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
