{"id":"https://openalex.org/W4376852277","doi":"https://doi.org/10.1145/3573942.3574060","title":"Image Encryption Algorithm Based on Compound Chaotic System and DNA Coding","display_name":"Image Encryption Algorithm Based on Compound Chaotic System and DNA Coding","publication_year":2022,"publication_date":"2022-09-23","ids":{"openalex":"https://openalex.org/W4376852277","doi":"https://doi.org/10.1145/3573942.3574060"},"language":"en","primary_location":{"id":"doi:10.1145/3573942.3574060","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1145/3573942.3574060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101997357","display_name":"Si-Peng Cheng","orcid":"https://orcid.org/0000-0001-8651-8975"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Si-Peng Cheng","raw_affiliation_strings":["School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, China"],"raw_orcid":"https://orcid.org/0000-0001-8651-8975","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100402635","display_name":"Xuefeng Zhang","orcid":"https://orcid.org/0000-0001-6056-667X"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xue-Feng Zhang","raw_affiliation_strings":["School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, China"],"raw_orcid":"https://orcid.org/0000-0001-6056-667X","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110976427","display_name":"Wen Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100200","display_name":"China Internet Network Information Center","ror":"https://ror.org/011t9p927","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210100200","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen Jiang","raw_affiliation_strings":["National Internet Emergency Center, China"],"raw_orcid":"https://orcid.org/0000-0001-8651-8975","affiliations":[{"raw_affiliation_string":"National Internet Emergency Center, China","institution_ids":["https://openalex.org/I4210100200"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101997357"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.102,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.43611385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2019","issue":null,"first_page":"537","last_page":"546"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9660000205039978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7760844230651855},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.7492486238479614},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.6879019737243652},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6326864957809448},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6319157481193542},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6198529005050659},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.5763266086578369},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5354732275009155},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.4823886454105377},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4724726378917694},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4710780680179596},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.45355066657066345},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.44899576902389526},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3822650909423828},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.33917751908302307},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17442703247070312},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1136944591999054},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08056080341339111},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.0719079077243805}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7760844230651855},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.7492486238479614},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.6879019737243652},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6326864957809448},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6319157481193542},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6198529005050659},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.5763266086578369},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5354732275009155},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.4823886454105377},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4724726378917694},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4710780680179596},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.45355066657066345},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44899576902389526},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3822650909423828},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.33917751908302307},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17442703247070312},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1136944591999054},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08056080341339111},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0719079077243805},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3573942.3574060","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1145/3573942.3574060","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"display_name":"No poverty","id":"https://metadata.un.org/sdg/1"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1977312644","https://openalex.org/W1998706302","https://openalex.org/W2035167366","https://openalex.org/W2105145864","https://openalex.org/W2320833261","https://openalex.org/W2333965811","https://openalex.org/W2760967785","https://openalex.org/W2789284498","https://openalex.org/W2791301627","https://openalex.org/W2885531592","https://openalex.org/W2908749194","https://openalex.org/W2941990895","https://openalex.org/W3048532210","https://openalex.org/W3177140957"],"related_works":["https://openalex.org/W2103421876","https://openalex.org/W2740975029","https://openalex.org/W1613228441","https://openalex.org/W2908420681","https://openalex.org/W2349050058","https://openalex.org/W3121471452","https://openalex.org/W2996919338","https://openalex.org/W4319790645","https://openalex.org/W4390449953","https://openalex.org/W2039893264"],"abstract_inverted_index":{"Aiming":[0],"at":[1],"the":[2,52,57,67,76,81,88,98,106],"problems":[3],"of":[4,80],"image":[5,35,59,108],"encryption,":[6],"such":[7],"as":[8,28],"poor":[9,13],"encryption":[10,36],"effect":[11],"and":[12,25,43,66,74,78,93,113,122,126],"security,":[14],"a":[15,63,102],"compound":[16,40],"chaotic":[17,41],"map":[18,24,27],"ILSC":[19],"is":[20,47,60,70],"designed":[21],"with":[22],"Logistic":[23],"Sine":[26],"seed":[29],"maps.":[30],"Based":[31],"on":[32,39,72],"this,":[33],"an":[34],"algorithm":[37,100],"based":[38],"system":[42],"dynamic":[44],"DNA":[45,53,64,82],"coding":[46,55],"proposed.":[48],"First,":[49],"according":[50],"to":[51,86],"random":[54],"rules,":[56],"plaintext":[58],"converted":[61],"into":[62],"matrix,":[65],"scrambling":[68],"operation":[69],"performed":[71],"it,":[73],"then":[75],"rows":[77],"columns":[79],"matrix":[83],"are":[84],"XORed":[85],"obtain":[87],"ciphertext":[89,107],"image.":[90],"Theoretical":[91],"analysis":[92],"simulation":[94],"results":[95],"show":[96],"that":[97],"proposed":[99],"has":[101,109,127],"larger":[103],"key":[104],"space,":[105],"higher":[110],"information":[111],"entropy,":[112],"can":[114],"effectively":[115],"resist":[116],"statistical":[117],"attacks,":[118],"brute":[119],"force":[120],"attacks":[121],"other":[123],"attack":[124],"methods,":[125],"better":[128],"performance.":[129]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
