{"id":"https://openalex.org/W3108979300","doi":"https://doi.org/10.1155/2020/8841302","title":"3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System","display_name":"3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System","publication_year":2020,"publication_date":"2020-11-26","ids":{"openalex":"https://openalex.org/W3108979300","doi":"https://doi.org/10.1155/2020/8841302","mag":"3108979300"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8841302","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8841302","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8841302.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/8841302.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052548451","display_name":"Huiqing Huang","orcid":"https://orcid.org/0000-0001-5540-2523"},"institutions":[{"id":"https://openalex.org/I160391749","display_name":"Jiaying University","ror":"https://ror.org/018jdfk45","country_code":"CN","type":"education","lineage":["https://openalex.org/I160391749"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiqing Huang","raw_affiliation_strings":["School of Mathematics, Jiaying University, Meizhou 514015, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Jiaying University, Meizhou 514015, Guangdong, China","institution_ids":["https://openalex.org/I160391749"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101463711","display_name":"Dongsheng Cheng","orcid":"https://orcid.org/0000-0001-8066-1404"},"institutions":[{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dongsheng Cheng","raw_affiliation_strings":["School of Software Engineering, Shenzhen Institute of Information Technology, Shenzhen 518172, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Shenzhen Institute of Information Technology, Shenzhen 518172, Guangdong, China","institution_ids":["https://openalex.org/I158809036"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101463711"],"corresponding_institution_ids":["https://openalex.org/I158809036"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.1954,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.51267057,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9380999803543091,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8682600259780884},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8342512249946594},{"id":"https://openalex.org/keywords/transformation","display_name":"Transformation (genetics)","score":0.6081130504608154},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5861178040504456},{"id":"https://openalex.org/keywords/bit","display_name":"Bit (key)","score":0.5152533650398254},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.508815348148346},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3470191955566406},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2676617503166199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26500022411346436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8682600259780884},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8342512249946594},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.6081130504608154},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5861178040504456},{"id":"https://openalex.org/C117011727","wikidata":"https://www.wikidata.org/wiki/Q1278488","display_name":"Bit (key)","level":2,"score":0.5152533650398254},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.508815348148346},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3470191955566406},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2676617503166199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26500022411346436},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2020/8841302","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8841302","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8841302.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4170db1b65ef48d49ed29789f4939672","is_oa":true,"landing_page_url":"https://doaj.org/article/4170db1b65ef48d49ed29789f4939672","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2020/8841302","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8841302","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2020/8841302","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8841302","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/8841302.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2419715849","display_name":null,"funder_award_id":"2018GKTSCX043","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G2584149062","display_name":null,"funder_award_id":"2018A030307024","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G3052826272","display_name":null,"funder_award_id":"2019KTSCX168","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G5573378842","display_name":null,"funder_award_id":"2018A0303100016","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G7578297161","display_name":null,"funder_award_id":"2018KQNCX244","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G7836480700","display_name":null,"funder_award_id":"2020A1515010561","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3108979300.pdf","grobid_xml":"https://content.openalex.org/works/W3108979300.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W1967126832","https://openalex.org/W1978868455","https://openalex.org/W2007283093","https://openalex.org/W2010620862","https://openalex.org/W2010668061","https://openalex.org/W2044383346","https://openalex.org/W2058358215","https://openalex.org/W2059059484","https://openalex.org/W2059849733","https://openalex.org/W2069436097","https://openalex.org/W2080294346","https://openalex.org/W2087094626","https://openalex.org/W2115605660","https://openalex.org/W2153936398","https://openalex.org/W2166809149","https://openalex.org/W2170926081","https://openalex.org/W2202431353","https://openalex.org/W2323473128","https://openalex.org/W2354568091","https://openalex.org/W2562860847","https://openalex.org/W2565851752","https://openalex.org/W2598248720","https://openalex.org/W2770106662","https://openalex.org/W2790225553","https://openalex.org/W2790843571","https://openalex.org/W2805123356","https://openalex.org/W2810557795","https://openalex.org/W2898574434","https://openalex.org/W2923473698","https://openalex.org/W2972948178","https://openalex.org/W2987741184","https://openalex.org/W2996572944","https://openalex.org/W3026266985","https://openalex.org/W4248031590"],"related_works":["https://openalex.org/W4327546585","https://openalex.org/W2411923897","https://openalex.org/W4394546135","https://openalex.org/W4285347720","https://openalex.org/W4200259850","https://openalex.org/W2333831899","https://openalex.org/W2484894494","https://openalex.org/W2375981391","https://openalex.org/W45120566","https://openalex.org/W2361408597"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"propose":[4],"a":[5,43],"novel":[6],"3-image":[7],"bit-level":[8],"encryption":[9,122],"algorithm":[10],"based":[11],"on":[12],"3D":[13,44,61,67,74],"nonequilateral":[14,68],"Arnold":[15,69],"transformation":[16,70],"and":[17,38,71,79,117,130,141,153,187],"hyperchaotic":[18,88],"system.":[19],"Firstly,":[20],"the":[21,60,72,87,94,112,120,128,133,145,159,167,179,188,191,195],"three":[22,82,95,100],"plain":[23],"images":[24,102],"with":[25,47],"<math":[26,49],"xmlns=\"http://www.w3.org/1998/Math/MathML\"":[27,50],"id=\"M1\">":[28],"<mi>N</mi>":[29,52],"<mo>\u00d7</mo>":[30,53,55],"<mi>M</mi>":[31,54],"</math>":[32,57],"are":[33,103,124],"decomposed":[34],"into":[35,42,81],"8-bit":[36],"planes":[37],"then":[39,99],"they":[40],"overlap":[41],"bit":[45,62,75],"matrix":[46,63,76],"size":[48],"id=\"M2\">":[51],"<mn>24</mn>":[56],".":[58],"Then,":[59],"is":[64,77,90,162,182],"scrambled":[65,73],"by":[66],"integrated":[78],"transformed":[80],"2D":[83,96],"pixel-level":[84,97],"images.":[85],"Finally,":[86],"system":[89],"used":[91],"to":[92,105,126,165],"diffuse":[93],"images;":[98],"diffused":[101],"rearranged":[104],"be":[106],"one":[107],"color":[108],"image,":[109],"resulting":[110],"in":[111,171],"encrypted":[113],"image.":[114],"Numerical":[115],"simulations":[116],"analyses":[118,137],"of":[119,132,190],"proposed":[121,146,172,180],"scheme":[123],"given":[125],"validate":[127],"feasibility":[129],"safety":[131],"method.":[134,173],"The":[135,174],"statistical":[136,151],"like":[138],"histogram,":[139],"correlation,":[140],"entropy":[142],"confirm":[143],"that":[144,158,178,194],"method":[147,181,196],"can":[148,197],"effectively":[149],"resist":[150,198],"attacks":[152,186],"security":[154],"key":[155,160],"analysis":[156,176],"shows":[157],"space":[161],"large":[163],"enough":[164],"render":[166],"brute-force":[168],"attack":[169],"ineffective":[170],"differential":[175,185],"confirms":[177],"effective":[183],"against":[184],"results":[189],"experiment":[192],"confirmed":[193],"occlusion":[199],"attack.":[200]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
