{"id":"https://openalex.org/W2070494096","doi":"https://doi.org/10.15439/2014f250","title":"Image Hashing Secured With Chaotic Sequences","display_name":"Image Hashing Secured With Chaotic Sequences","publication_year":2014,"publication_date":"2014-09-29","ids":{"openalex":"https://openalex.org/W2070494096","doi":"https://doi.org/10.15439/2014f250","mag":"2070494096"},"language":"en","primary_location":{"id":"doi:10.15439/2014f250","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2014f250","pdf_url":"https://annals-csis.org/proceedings/2014/pliks/250.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2014/pliks/250.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022164311","display_name":"Relu-Laurentiu Tataru","orcid":null},"institutions":[{"id":"https://openalex.org/I61641377","display_name":"Universitatea Na\u021bional\u0103 de \u0218tiin\u021b\u0103 \u0219i Tehnologie Politehnica Bucure\u0219ti","ror":"https://ror.org/0558j5q12","country_code":"RO","type":"education","lineage":["https://openalex.org/I61641377"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Relu-Laurentiu Tataru","raw_affiliation_strings":["Faculty of Electronics, Telecommunications and Information Technology, Politehnica University of Bucharest, 1-3, Iuliu Maniu Bvd., Bucharest 6, Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Electronics, Telecommunications and Information Technology, Politehnica University of Bucharest, 1-3, Iuliu Maniu Bvd., Bucharest 6, Romania","institution_ids":["https://openalex.org/I61641377"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5022164311"],"corresponding_institution_ids":["https://openalex.org/I61641377"],"apc_list":null,"apc_paid":null,"fwci":0.2556,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.49486653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"735","last_page":"740"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10824","display_name":"Image Retrieval and Classification Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7352200746536255},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6195148825645447},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5763575434684753},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5713170170783997},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5609942674636841},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.47583580017089844},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4677458107471466},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.46209967136383057},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.41664019227027893},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.413490355014801},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4011307656764984},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3979633152484894},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.3749699592590332},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36960655450820923},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.2707177400588989},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14133787155151367}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7352200746536255},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6195148825645447},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5763575434684753},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5713170170783997},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5609942674636841},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.47583580017089844},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4677458107471466},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.46209967136383057},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.41664019227027893},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.413490355014801},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4011307656764984},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3979633152484894},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3749699592590332},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36960655450820923},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.2707177400588989},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14133787155151367},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15439/2014f250","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2014f250","pdf_url":"https://annals-csis.org/proceedings/2014/pliks/250.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:b03b72c0c2854b8fbc96ea8b632211f6","is_oa":false,"landing_page_url":"https://doaj.org/article/b03b72c0c2854b8fbc96ea8b632211f6","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Annals of computer science and information systems, Vol 2, Pp 735-740 (2014)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.15439/2014f250","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2014f250","pdf_url":"https://annals-csis.org/proceedings/2014/pliks/250.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2070494096.pdf","grobid_xml":"https://content.openalex.org/works/W2070494096.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W22271197","https://openalex.org/W35660749","https://openalex.org/W1514337436","https://openalex.org/W1551558511","https://openalex.org/W1647732624","https://openalex.org/W1788576983","https://openalex.org/W1970612911","https://openalex.org/W2095765012","https://openalex.org/W2096933452","https://openalex.org/W2143998759","https://openalex.org/W2171073511","https://openalex.org/W2181518158","https://openalex.org/W2590096814","https://openalex.org/W2912867020"],"related_works":["https://openalex.org/W2601209352","https://openalex.org/W4313377945","https://openalex.org/W4220747575","https://openalex.org/W2164990255","https://openalex.org/W2612631671","https://openalex.org/W2111280862","https://openalex.org/W2034182554","https://openalex.org/W2167365418","https://openalex.org/W2545896937","https://openalex.org/W2099087328"],"abstract_inverted_index":{"This":[0,36],"paper":[1],"presents":[2],"an":[3],"image":[4,41,77],"hashing":[5,25],"algorithm":[6],"using":[7,18,57],"robust":[8,28],"features":[9,15],"from":[10,74],"jointed":[11],"frequency":[12],"domains.":[13],"Extracted":[14],"are":[16],"enciphered":[17],"a":[19,66],"secure":[20],"chaotic":[21,91],"system.":[22],"The":[23,79],"proposed":[24],"scheme":[26,37],"is":[27,84],"to":[29],"JPEG":[30],"compression":[31],"with":[32],"low":[33],"quality":[34],"factors.":[35],"also":[38],"withstands":[39],"several":[40],"processing":[42],"attacks":[43,54],"such":[44],"us":[45],"filtering,":[46],"noise":[47],"addition":[48],"and":[49,71,93],"some":[50],"geometric":[51],"transforms.":[52],"All":[53],"were":[55],"conducted":[56,64],"Checkmark":[58],"benchmark.":[59],"A":[60],"detailed":[61],"analysis":[62],"was":[63],"on":[65],"set":[67],"of":[68,81,89,96],"3000":[69],"color":[70],"gray":[72],"images":[73],"three":[75],"different":[76],"databases.":[78],"security":[80],"the":[82,87,90,94,97],"method":[83],"assured":[85],"by":[86],"robustness":[88],"PRNG":[92],"secrecy":[95],"cryptographic":[98],"key.":[99]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
