{"id":"https://openalex.org/W4411913043","doi":"https://doi.org/10.1631/fitee.2400721","title":"SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key","display_name":"SPJEU: a self-sufficient plaintext-related JPEG image encryption scheme based on a unified key","publication_year":2025,"publication_date":"2025-06-01","ids":{"openalex":"https://openalex.org/W4411913043","doi":"https://doi.org/10.1631/fitee.2400721"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.2400721","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2400721","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100351523","display_name":"Ming Li","orcid":"https://orcid.org/0000-0003-3385-8364"},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"education","lineage":["https://openalex.org/I75955062"]},{"id":"https://openalex.org/I80626142","display_name":"Xinxiang Medical University","ror":"https://ror.org/038hzq450","country_code":"CN","type":"education","lineage":["https://openalex.org/I80626142"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Li","raw_affiliation_strings":["Henan Key Laboratory of Educational Artificial Intelligence and Personalized Learning, Xinxiang, China","School of Computer and Information Engineering, Henan Normal University, Xinxiang, China"],"raw_orcid":"https://orcid.org/0000-0003-3385-8364","affiliations":[{"raw_affiliation_string":"Henan Key Laboratory of Educational Artificial Intelligence and Personalized Learning, Xinxiang, China","institution_ids":["https://openalex.org/I80626142"]},{"raw_affiliation_string":"School of Computer and Information Engineering, Henan Normal University, Xinxiang, China","institution_ids":["https://openalex.org/I75955062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100604796","display_name":"Wenwen Zhou","orcid":"https://orcid.org/0000-0002-4645-9103"},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"education","lineage":["https://openalex.org/I75955062"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenwen Zhou","raw_affiliation_strings":["School of Computer and Information Engineering, Henan Normal University, Xinxiang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Henan Normal University, Xinxiang, China","institution_ids":["https://openalex.org/I75955062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000473685","display_name":"Mengdie Wang","orcid":"https://orcid.org/0000-0002-1671-3924"},"institutions":[{"id":"https://openalex.org/I4210164787","display_name":"Puyang Vocational and Technical College","ror":"https://ror.org/05t1wae93","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210164787"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengdie Wang","raw_affiliation_strings":["School of Information Engineering, Anyang Vocational and Technical College, Anyang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Anyang Vocational and Technical College, Anyang, China","institution_ids":["https://openalex.org/I4210164787"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085698418","display_name":"Yushu Zhang","orcid":"https://orcid.org/0000-0001-8183-8435"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"education","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yushu Zhang","raw_affiliation_strings":["College of Computer Science and Technology/College of Software, Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-8183-8435","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology/College of Software, Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Geelong, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100351523"],"corresponding_institution_ids":["https://openalex.org/I75955062","https://openalex.org/I80626142"],"apc_list":null,"apc_paid":null,"fwci":1.1332,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79482174,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"26","issue":"6","first_page":"847","last_page":"861"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6723390221595764},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6158017516136169},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5731208324432373},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5644349455833435},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5376933813095093},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4676007628440857},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45229753851890564},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4442501962184906},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.4116946756839752},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.27280351519584656},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.27018284797668457}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6723390221595764},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6158017516136169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5731208324432373},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5644349455833435},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5376933813095093},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4676007628440857},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45229753851890564},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4442501962184906},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.4116946756839752},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.27280351519584656},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.27018284797668457},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1631/fitee.2400721","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2400721","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/29671781","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/29671781","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2011134637","https://openalex.org/W2036067009","https://openalex.org/W2063045808","https://openalex.org/W2146360671","https://openalex.org/W2158807150","https://openalex.org/W2438990518","https://openalex.org/W2489592103","https://openalex.org/W2521458040","https://openalex.org/W2558527387","https://openalex.org/W2572666595","https://openalex.org/W2582098157","https://openalex.org/W2624920640","https://openalex.org/W2773762033","https://openalex.org/W2781255632","https://openalex.org/W2790928171","https://openalex.org/W2791288201","https://openalex.org/W2792958464","https://openalex.org/W2901404669","https://openalex.org/W2901908388","https://openalex.org/W2962531843","https://openalex.org/W2969916032","https://openalex.org/W2970522004","https://openalex.org/W2975677158","https://openalex.org/W3014855215","https://openalex.org/W3083465696","https://openalex.org/W3147162255","https://openalex.org/W4210828215","https://openalex.org/W4221094777","https://openalex.org/W4285298427","https://openalex.org/W4296501358","https://openalex.org/W4383987512","https://openalex.org/W4392503822"],"related_works":["https://openalex.org/W4322741006","https://openalex.org/W2120205576","https://openalex.org/W2134324324","https://openalex.org/W2098392677","https://openalex.org/W2362689357","https://openalex.org/W2375981391","https://openalex.org/W45120566","https://openalex.org/W2365982350","https://openalex.org/W2508016950","https://openalex.org/W2361408597"],"abstract_inverted_index":{"In":[0],"recent":[1],"research":[2],"on":[3,75,151],"image":[4,71,101],"encryption,":[5],"many":[6,26],"schemes":[7],"associate":[8],"the":[9,14,23,36,83,86,89,93,99,111,123,141,152,172,183,189,193],"key":[10,54,59,78,90,177],"generation":[11],"mechanism":[12],"with":[13],"plaintext":[15,19,37,87,116,164],"to":[16,35,39,44,110,118],"resist":[17,162],"chosen":[18,163],"attacks.":[20],"However,":[21],"when":[22],"sender":[24],"encrypts":[25],"images,":[27],"a":[28,67,76,103,127],"large":[29],"amount":[30],"of":[31,188],"additional":[32,169],"data":[33,170],"related":[34],"need":[38],"be":[40,119],"transmitted,":[41],"which":[42],"leads":[43],"problems":[45],"such":[46],"as":[47],"high":[48,51],"transmission":[49],"costs,":[50],"requirements":[52],"for":[53],"storage":[55],"space,":[56],"and":[57,88,140,148,175,185,192],"complex":[58],"management.":[60,178],"Therefore,":[61],"in":[62,98,171],"this":[63],"paper,":[64],"we":[65],"propose":[66],"self-sufficient":[68],"plaintext-related":[69,168],"JPEG":[70,100],"encryption":[72,107,197],"scheme":[73,81,160,180],"based":[74,150],"unified":[77,104],"(SPJEU).":[79],"This":[80,179],"establishes":[82],"connection":[84],"between":[85],"by":[91],"selecting":[92],"direct":[94],"current":[95,143],"(DC)":[96],"coefficients":[97,134,145],"through":[102,137],"key.":[105],"Homomorphic":[106],"is":[108,198],"applied":[109],"selected":[112],"DC":[113,133],"coefficients,":[114],"allowing":[115],"information":[117],"decrypted":[120],"directly":[121],"from":[122],"ciphertext":[124,190],"domain":[125],"using":[126],"specific":[128],"calculation":[129],"method.":[130],"The":[131],"remaining":[132],"are":[135,146],"encrypted":[136],"group":[138],"diffusion,":[139],"alternating":[142],"(AC)":[144],"grouped":[147],"permuted":[149],"run":[153],"length.":[154],"Extensive":[155],"experiments":[156],"show":[157],"that":[158],"our":[159],"can":[161],"attacks,":[165],"avoid":[166],"transmitting":[167],"communication":[173],"channel,":[174],"simplify":[176],"also":[181],"ensures":[182],"security":[184],"format":[186],"compatibility":[187],"image,":[191],"file":[194],"increment":[195],"after":[196],"very":[199],"small.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
