{"id":"https://openalex.org/W4403890036","doi":"https://doi.org/10.3389/fcomp.2024.1274704","title":"Concurrent compression and meaningful encryption of images using chaotic compressive sensing","display_name":"Concurrent compression and meaningful encryption of images using chaotic compressive sensing","publication_year":2024,"publication_date":"2024-10-30","ids":{"openalex":"https://openalex.org/W4403890036","doi":"https://doi.org/10.3389/fcomp.2024.1274704"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2024.1274704","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1274704","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2024.1274704/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2024.1274704/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024644141","display_name":"K Ashwini","orcid":"https://orcid.org/0000-0003-1974-2162"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"K. Ashwini","raw_affiliation_strings":["Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Chennai, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113865401","display_name":"S. Sutha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"S. Sutha","raw_affiliation_strings":["Department of Electronics and Communication Engineering, Sri Venkateswara College of Engineering, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, Sri Venkateswara College of Engineering, Chennai, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113354937","display_name":"S. Sountharrajan","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sountharrajan S.","raw_affiliation_strings":["Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Amrita School of Computing, Amrita Vishwa Vidyapeetham, Chennai, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108915000","display_name":"Durga Prasad Bavirisetti","orcid":null},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Durga Prasad Bavirisetti","raw_affiliation_strings":["Department of Computer Science, Norwegian University of Science and Technology (NTNU), Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Norwegian University of Science and Technology (NTNU), Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5108915000"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":0.2567,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5535797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"6","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11210","display_name":"Mathematical Analysis and Transform Methods","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/2604","display_name":"Applied Mathematics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7461057305335999},{"id":"https://openalex.org/keywords/compression","display_name":"Compression (physics)","score":0.6403659582138062},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6165708899497986},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5553268790245056},{"id":"https://openalex.org/keywords/compressed-sensing","display_name":"Compressed sensing","score":0.520860493183136},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4172958433628082},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3960581421852112},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26468175649642944},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25818806886672974},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.14512327313423157},{"id":"https://openalex.org/keywords/composite-material","display_name":"Composite material","score":0.08011817932128906}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7461057305335999},{"id":"https://openalex.org/C180016635","wikidata":"https://www.wikidata.org/wiki/Q2712821","display_name":"Compression (physics)","level":2,"score":0.6403659582138062},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6165708899497986},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5553268790245056},{"id":"https://openalex.org/C124851039","wikidata":"https://www.wikidata.org/wiki/Q2665459","display_name":"Compressed sensing","level":2,"score":0.520860493183136},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4172958433628082},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3960581421852112},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26468175649642944},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25818806886672974},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.14512327313423157},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.08011817932128906}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3389/fcomp.2024.1274704","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1274704","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2024.1274704/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:830f0e4823d045ce952b76628634c5ed","is_oa":true,"landing_page_url":"https://doaj.org/article/830f0e4823d045ce952b76628634c5ed","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 6 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2024.1274704","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2024.1274704","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2024.1274704/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403890036.pdf","grobid_xml":"https://content.openalex.org/works/W4403890036.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W2015418199","https://openalex.org/W2031377725","https://openalex.org/W2032437927","https://openalex.org/W2092721083","https://openalex.org/W2140506330","https://openalex.org/W2152254020","https://openalex.org/W2165983133","https://openalex.org/W2299461907","https://openalex.org/W2519501408","https://openalex.org/W2800986149","https://openalex.org/W2806163639","https://openalex.org/W2914178465","https://openalex.org/W2940705568","https://openalex.org/W2992483795","https://openalex.org/W3007471510","https://openalex.org/W3009587941","https://openalex.org/W3022388466","https://openalex.org/W3025598099","https://openalex.org/W3033463797","https://openalex.org/W3037758685","https://openalex.org/W3095087998","https://openalex.org/W3118312065","https://openalex.org/W3127358834","https://openalex.org/W3146401826","https://openalex.org/W3185450349","https://openalex.org/W3194458288","https://openalex.org/W4250955649","https://openalex.org/W4295259530","https://openalex.org/W4306686063","https://openalex.org/W4324380314","https://openalex.org/W4377030789","https://openalex.org/W4383616889","https://openalex.org/W4386378733","https://openalex.org/W4387591425"],"related_works":["https://openalex.org/W2158224665","https://openalex.org/W2379589510","https://openalex.org/W2810730439","https://openalex.org/W4300044672","https://openalex.org/W1881631164","https://openalex.org/W2358292267","https://openalex.org/W2378166785","https://openalex.org/W2376048186","https://openalex.org/W2612632602","https://openalex.org/W2321805087"],"abstract_inverted_index":{"The":[0,54,69,86],"presented":[1],"research":[2],"introduces":[3],"a":[4,39,44,50,59,81,97],"new":[5,51],"approach":[6,103],"to":[7,76],"simultaneously":[8],"compressing":[9],"and":[10,107,114,132],"encrypting":[11],"images":[12],"using":[13,26,43],"chaotic":[14,52,56,67],"compressive":[15],"sensing.":[16],"This":[17,102],"technique":[18],"involves":[19],"transforming":[20],"the":[21,27,90,118,123,126],"image":[22,99],"into":[23],"sparser":[24],"data":[25,88],"discrete":[28],"cosine":[29],"transform":[30],"basis,":[31],"which":[32],"is":[33,72,93],"then":[34,94],"compressed":[35,87],"through":[36],"projection":[37],"onto":[38,96],"lower":[40],"dimensional":[41],"space":[42],"measurement":[45],"matrix":[46],"designed":[47],"based":[48],"on":[49,117],"map.":[53],"proposed":[55,70,91,119],"map":[57,71,92],"produced":[58],"Lyapunov":[60],"exponent":[61],"value":[62],"of":[63,111,125],"2.675":[64],"proving":[65],"its":[66],"behavior.":[68],"also":[73],"highly":[74],"sensitive":[75],"initial":[77],"values,":[78],"making":[79],"it":[80],"secure":[82],"basis":[83],"for":[84,100],"encryption.":[85],"with":[89],"embedded":[95],"colorful":[98],"transmission.":[101],"achieves":[104],"both":[105],"compression":[106],"visually":[108],"meaningful":[109],"encryption":[110],"images.":[112],"Quantitative":[113],"Qualitative":[115],"results":[116],"compression-encryption":[120],"algorithm":[121],"shows":[122],"effectiveness":[124],"methodology":[127],"against":[128],"chosen":[129],"plaintext":[130],"attacks":[131],"cipher-only":[133],"attacks.":[134]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-10T00:00:00"}
