{"id":"https://openalex.org/W4281725795","doi":"https://doi.org/10.3233/jifs-213600","title":"Quaternion keyed Least Square Approximation for image encryption","display_name":"Quaternion keyed Least Square Approximation for image encryption","publication_year":2022,"publication_date":"2022-05-27","ids":{"openalex":"https://openalex.org/W4281725795","doi":"https://doi.org/10.3233/jifs-213600"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-213600","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-213600","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076301436","display_name":"D. Kalaiarasan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"D. Kalaiarasan","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Government College of Engineering, Srirangam, Trichy, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Government College of Engineering, Srirangam, Trichy, India","institution_ids":[]}]},{"author_position":"last","author":{"id":null,"display_name":"A. Ahilan","orcid":null},"institutions":[{"id":"https://openalex.org/I118826373","display_name":"Tirunelveli Medical College","ror":"https://ror.org/01c4srk95","country_code":"IN","type":"education","lineage":["https://openalex.org/I118826373"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"A. Ahilan","raw_affiliation_strings":["Department of Electronics & Communication Engineering, PSN College of Engineering and Technology, Tirunelveli, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics & Communication Engineering, PSN College of Engineering and Technology, Tirunelveli, India","institution_ids":["https://openalex.org/I118826373"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5076301436"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3062,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.53406019,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"43","issue":"4","first_page":"5221","last_page":"5236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6870050430297852},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6682714223861694},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.553905189037323},{"id":"https://openalex.org/keywords/advanced-encryption-standard","display_name":"Advanced Encryption Standard","score":0.5454509854316711},{"id":"https://openalex.org/keywords/peak-signal-to-noise-ratio","display_name":"Peak signal-to-noise ratio","score":0.5200712084770203},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5073744654655457},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5032340884208679},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4887504577636719},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4641474485397339},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4417755603790283},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.41468679904937744},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3662113845348358},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2979620695114136},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2873753011226654},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.08544102311134338}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6870050430297852},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6682714223861694},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.553905189037323},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.5454509854316711},{"id":"https://openalex.org/C154579607","wikidata":"https://www.wikidata.org/wiki/Q3373850","display_name":"Peak signal-to-noise ratio","level":3,"score":0.5200712084770203},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5073744654655457},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5032340884208679},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4887504577636719},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4641474485397339},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4417755603790283},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.41468679904937744},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3662113845348358},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2979620695114136},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2873753011226654},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.08544102311134338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-213600","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-213600","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2469595909","https://openalex.org/W2523079709","https://openalex.org/W2890618720","https://openalex.org/W2969827684","https://openalex.org/W2970884539","https://openalex.org/W2972589598","https://openalex.org/W3000117283","https://openalex.org/W3026242087","https://openalex.org/W3037826251","https://openalex.org/W3043360593","https://openalex.org/W3044222396","https://openalex.org/W3048702035","https://openalex.org/W3081291413","https://openalex.org/W3085059903","https://openalex.org/W3093910677","https://openalex.org/W3108287416","https://openalex.org/W3119035352","https://openalex.org/W3122897445","https://openalex.org/W3126494601","https://openalex.org/W3127657877","https://openalex.org/W3131071241","https://openalex.org/W3131701911","https://openalex.org/W3133394173","https://openalex.org/W3139219920","https://openalex.org/W3157678575","https://openalex.org/W3166239349","https://openalex.org/W3181402709","https://openalex.org/W4200512327","https://openalex.org/W6754454683","https://openalex.org/W6782103948","https://openalex.org/W6784680259","https://openalex.org/W6792013544","https://openalex.org/W6804945486"],"related_works":["https://openalex.org/W3100341211","https://openalex.org/W2462112841","https://openalex.org/W2243712200","https://openalex.org/W2363973945","https://openalex.org/W2905130456","https://openalex.org/W2120485880","https://openalex.org/W2255058412","https://openalex.org/W2230642122","https://openalex.org/W2940359311","https://openalex.org/W2770731184"],"abstract_inverted_index":{"Securing":[0],"image":[1,23,33,48,94],"data":[2],"from":[3,201],"prying":[4],"hackers":[5],"is":[6,41,226],"crucial":[7],"in":[8,101,109,210],"safeguarding":[9],"the":[10,15,22,31,62,66,73,81,110,122,133,139,142,163,168,188,197,202,221,224,229],"secrecy":[11],"of":[12,144,212,223],"data.":[13],"Over":[14],"years,":[16],"this":[17,60],"was":[18,34,69,78,89,98,107,129,135,176,183],"done":[19,79],"by":[20,228],"encrypting":[21],"using":[24,80,103],"an":[25,47],"algorithm":[26,88,97,164],"and":[27,106,132,149,157,170,186,217],"a":[28,37,42,92,119],"key,":[29],"where":[30],"visible":[32],"converted":[35],"into":[36],"meaningless":[38],"object.":[39],"It":[40],"difficult":[43],"problem":[44],"to":[45,71,125],"design":[46],"encryption":[49],"technique":[50],"based":[51],"on":[52,91],"chaotic":[53],"systems":[54],"with":[55,65],"predictable":[56],"cryptographic":[57,208],"features.":[58],"In":[59],"paper,":[61],"Quaternion,":[63],"along":[64],"Rossler":[67],"attractor,":[68],"used":[70],"generate":[72],"key":[74,174,225],"combination.":[75],"The":[76,87,96,173,192],"ciphering":[77,204],"Least":[82],"Square":[83],"Approximation":[84],"Algorithm":[85],"(LSA).":[86],"tested":[90,100],"grayscale":[93],"database.":[95],"initially":[99],"software":[102],"MATLAB":[104],"R2018b,":[105],"implemented":[108],"Cyclone":[111],"II":[112],"EP2C35F672C6":[113],"device":[114],"FPGA.":[115],"On":[116],"average,":[117],"for":[118],"cipher":[120,140,198],"image,":[121,141],"Peak":[123],"Signal":[124],"Noise":[126],"ratio":[127],"(PSNR)":[128],"9.09303":[130],"dB":[131],"entropy":[134],"7.9990":[136],"bits.":[137],"For":[138],"Number":[143],"Pixels":[145],"Change":[146,152],"Rate":[147],"(NPCR)":[148],"Unified":[150],"Average":[151],"Intensity":[153],"(UACI)":[154],"were":[155],"99.6039":[156],"33.4980,":[158],"respectively.":[159],"This":[160],"proved":[161],"that":[162,196],"could":[165],"effectively":[166],"mitigate":[167],"statistical":[169],"differential":[171],"attacks.":[172,191],"space":[175],"2":[177],"(M":[178],"\u00d7N":[179],"\u00d77":[180],"\u00d78),":[181],"which":[182],"sufficiently":[184],"high":[185],"mitigated":[187],"brute":[189],"force":[190],"obtained":[193],"results":[194],"confirm":[195],"images":[199],"resulting":[200],"proposed":[203],"scheme":[205],"possess":[206],"good":[207],"properties":[209],"terms":[211],"entropy,":[213],"PSNR,":[214],"UACI,":[215],"NPCR,":[216],"keyspace":[218],"analysis.":[219],"Furthermore,":[220],"strength":[222],"evaluated":[227],"NIST":[230],"test":[231],"suite.":[232]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-22T08:38:42.863108","created_date":"2025-10-10T00:00:00"}
