{"id":"https://openalex.org/W3165240529","doi":"https://doi.org/10.13052/jcsm2245-1439.1031","title":"An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images","display_name":"An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images","publication_year":2021,"publication_date":"2021-05-15","ids":{"openalex":"https://openalex.org/W3165240529","doi":"https://doi.org/10.13052/jcsm2245-1439.1031","mag":"3165240529"},"language":"en","primary_location":{"id":"doi:10.13052/jcsm2245-1439.1031","is_oa":true,"landing_page_url":"https://doi.org/10.13052/jcsm2245-1439.1031","pdf_url":"https://journals.riverpublishers.com/index.php/JCSANDM/article/download/5713/5677","source":{"id":"https://openalex.org/S4210187554","display_name":"Journal of Cyber Security and Mobility","issn_l":"2245-1439","issn":["2245-1439","2245-4578"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cyber Security and Mobility","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://journals.riverpublishers.com/index.php/JCSANDM/article/download/5713/5677","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089085195","display_name":"M. Raviraja Holla","orcid":"https://orcid.org/0000-0003-1627-552X"},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"M. Raviraja Holla","raw_affiliation_strings":["Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal,  Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal,  Karnataka, India","institution_ids":["https://openalex.org/I164861460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036621212","display_name":"Alwyn Roshan Pais","orcid":"https://orcid.org/0000-0003-4571-4608"},"institutions":[{"id":"https://openalex.org/I11880225","display_name":"National Institute of Technology Karnataka","ror":"https://ror.org/01hz4v948","country_code":"IN","type":"education","lineage":["https://openalex.org/I11880225"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Alwyn R. Pais","raw_affiliation_strings":["Information Security Research Lab., Department of Computer Science and Engineering, National Institute of Technology Karnataka, Surathkal, India"],"affiliations":[{"raw_affiliation_string":"Information Security Research Lab., Department of Computer Science and Engineering, National Institute of Technology Karnataka, Surathkal, India","institution_ids":["https://openalex.org/I11880225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103014620","display_name":"D. Suma","orcid":null},"institutions":[{"id":"https://openalex.org/I164861460","display_name":"Manipal Academy of Higher Education","ror":"https://ror.org/02xzytt36","country_code":"IN","type":"education","lineage":["https://openalex.org/I164861460"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. Suma","raw_affiliation_strings":["Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal,  Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education (MAHE), Manipal,  Karnataka, India","institution_ids":["https://openalex.org/I164861460"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089085195"],"corresponding_institution_ids":["https://openalex.org/I164861460"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05362699,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13234","display_name":"advanced mathematical theories","score":0.9793000221252441,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.7888606786727905},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.7807068824768066},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7168119549751282},{"id":"https://openalex.org/keywords/grayscale","display_name":"Grayscale","score":0.6966713666915894},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.6449869275093079},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5726366639137268},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5571731328964233},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.5571089386940002},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4975772202014923},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.48769697546958923},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.4742516577243805},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.46759456396102905},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4313240647315979},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3455736041069031},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3396158218383789},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.33742696046829224},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.32872217893600464},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27556055784225464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20732426643371582},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.19751262664794922}],"concepts":[{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.7888606786727905},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.7807068824768066},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7168119549751282},{"id":"https://openalex.org/C78201319","wikidata":"https://www.wikidata.org/wiki/Q685727","display_name":"Grayscale","level":3,"score":0.6966713666915894},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.6449869275093079},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5726366639137268},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5571731328964233},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.5571089386940002},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4975772202014923},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.48769697546958923},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.4742516577243805},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.46759456396102905},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4313240647315979},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3455736041069031},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3396158218383789},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.33742696046829224},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.32872217893600464},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27556055784225464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20732426643371582},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.19751262664794922},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.13052/jcsm2245-1439.1031","is_oa":true,"landing_page_url":"https://doi.org/10.13052/jcsm2245-1439.1031","pdf_url":"https://journals.riverpublishers.com/index.php/JCSANDM/article/download/5713/5677","source":{"id":"https://openalex.org/S4210187554","display_name":"Journal of Cyber Security and Mobility","issn_l":"2245-1439","issn":["2245-1439","2245-4578"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cyber Security and Mobility","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.13052/jcsm2245-1439.1031","is_oa":true,"landing_page_url":"https://doi.org/10.13052/jcsm2245-1439.1031","pdf_url":"https://journals.riverpublishers.com/index.php/JCSANDM/article/download/5713/5677","source":{"id":"https://openalex.org/S4210187554","display_name":"Journal of Cyber Security and Mobility","issn_l":"2245-1439","issn":["2245-1439","2245-4578"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cyber Security and Mobility","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3165240529.pdf","grobid_xml":"https://content.openalex.org/works/W3165240529.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W81035361","https://openalex.org/W1719430855","https://openalex.org/W2020039621","https://openalex.org/W2133665775","https://openalex.org/W2236624286","https://openalex.org/W2257939694","https://openalex.org/W2290638669","https://openalex.org/W2293161194","https://openalex.org/W2545606581","https://openalex.org/W2616531481","https://openalex.org/W2765704077","https://openalex.org/W2787079824","https://openalex.org/W2793719903","https://openalex.org/W2801893904","https://openalex.org/W2802792559","https://openalex.org/W2806311723","https://openalex.org/W2884874123","https://openalex.org/W2902067837","https://openalex.org/W2903608884","https://openalex.org/W2917623276","https://openalex.org/W2947324913","https://openalex.org/W2953986777","https://openalex.org/W2963807318","https://openalex.org/W2968669204","https://openalex.org/W2969414999","https://openalex.org/W2971625441","https://openalex.org/W2973964571","https://openalex.org/W2976809040","https://openalex.org/W2977395714","https://openalex.org/W2990576418","https://openalex.org/W2999834558","https://openalex.org/W3000387595","https://openalex.org/W3002923804","https://openalex.org/W3011640969","https://openalex.org/W3027373908","https://openalex.org/W3105279569"],"related_works":["https://openalex.org/W2058965144","https://openalex.org/W2164382479","https://openalex.org/W2461459052","https://openalex.org/W2015922933","https://openalex.org/W2791533424","https://openalex.org/W2296021536","https://openalex.org/W1975569077","https://openalex.org/W4382284432","https://openalex.org/W2566414952","https://openalex.org/W2376542885"],"abstract_inverted_index":{"The":[0,17,44,77,134,169],"logistic":[1,18,49,106,157],"map":[2,19,50,158],"is":[3,10,51,61,151],"a":[4,62,105,160],"class":[5],"of":[6,80,92,99,143,178],"chaotic":[7],"maps.":[8],"It":[9],"still":[11],"in":[12,14,104],"use":[13,91],"image":[15,167],"cryptography.":[16],"cryptosystem":[20,136],"has":[21],"two":[22,29,120,176],"stages,":[23],"namely":[24],"permutation,":[25],"and":[26,114],"diffusion.":[27],"These":[28],"stages":[30,177],"being":[31],"computationally":[32],"intensive,":[33],"the":[34,37,40,48,55,85,90,97,112,119,124,141,154,164,175,179],"permutation":[35],"relocates":[36],"pixels,":[38],"whereas":[39],"diffusion":[41],"rescales":[42],"them.":[43],"research":[45],"on":[46],"refining":[47],"progressing":[52],"to":[53,64,68,72,111,163],"make":[54],"encryption":[56],"more":[57,144],"secure.":[58],"Now":[59],"there":[60],"need":[63],"improve":[65],"its":[66],"efficiency":[67,129],"enable":[69],"such":[70],"models":[71,122],"fit":[73],"for":[74],"high-speed":[75],"applications.":[76],"new":[78],"invention":[79],"accelerators":[81],"offers":[82],"efficiency.":[83,117],"But":[84],"inherent":[86],"data":[87],"dependencies":[88],"hinder":[89],"accelerators.":[93],"This":[94],"paper":[95],"discusses":[96],"novelty":[98],"identifying":[100],"independent":[101],"data-parallel":[102],"tasks":[103],"map,":[107],"handing":[108],"them":[109],"over":[110],"accelerators,":[113],"improving":[115],"their":[116],"Among":[118],"accelerator":[121],"proposed,":[123],"first":[125],"one":[126],"achieves":[127],"peak":[128],"using":[130],"coalesced":[131],"memory":[132],"access.":[133],"other":[135],"further":[137],"improves":[138],"performance":[139],"at":[140],"cost":[142],"execution":[145],"resources.":[146],"In":[147],"this":[148],"investigation,":[149],"it":[150],"noteworthy":[152],"that":[153,174],"parallelly":[155],"accelerated":[156],"achieved":[159],"significant":[161],"speedup":[162],"larger":[165],"grayscale":[166],"used.":[168],"objective":[170],"security":[171],"estimates":[172],"proved":[173],"proposed":[180],"systems":[181],"progressively":[182],"ensure":[183],"security.":[184]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
