{"id":"https://openalex.org/W7133220584","doi":"https://doi.org/10.3390/cryptography10020016","title":"A Robust Image Encryption Framework Using Deep Feature Extraction and AES Key Optimization","display_name":"A Robust Image Encryption Framework Using Deep Feature Extraction and AES Key Optimization","publication_year":2026,"publication_date":"2026-03-02","ids":{"openalex":"https://openalex.org/W7133220584","doi":"https://doi.org/10.3390/cryptography10020016"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography10020016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020016","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/cryptography10020016","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5127860919","display_name":"Sahara A. S. Almola","orcid":null},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Sahara A. S. Almola","raw_affiliation_strings":["Department of Computer Information Systems, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Information Systems, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034917193","display_name":"Hameed A. Younis","orcid":"https://orcid.org/0000-0003-4580-9287"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Hameed A. Younis","raw_affiliation_strings":["Department of Cyber Security, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008996820","display_name":"Raidah S. Khudeyer","orcid":"https://orcid.org/0000-0003-1322-6626"},"institutions":[{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Raidah S. Khudeyer","raw_affiliation_strings":["Department of Computer Information Systems, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Information Systems, College of Computer Science and Information Technology, University of Basrah, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5127860919"],"corresponding_institution_ids":["https://openalex.org/I126633494"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.3671451,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"2","first_page":"16","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9383999705314636,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9383999705314636,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.02239999920129776,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.006599999964237213,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7021999955177307},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5130000114440918},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4717999994754791},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.4607999920845032},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.4487999975681305},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4449000060558319},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41659998893737793},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4138000011444092},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.41200000047683716}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7021999955177307},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5339999794960022},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5130000114440918},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48179998993873596},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4717999994754791},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.4607999920845032},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.4487999975681305},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4449000060558319},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41659998893737793},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4138000011444092},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.41200000047683716},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3813999891281128},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.37790000438690186},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.35199999809265137},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.32600000500679016},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.3046000003814697},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2930000126361847},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.29109999537467957},{"id":"https://openalex.org/C67174900","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Minutiae","level":4,"score":0.28619998693466187},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2825999855995178},{"id":"https://openalex.org/C83665646","wikidata":"https://www.wikidata.org/wiki/Q42139305","display_name":"Feature vector","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2791999876499176},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.26649999618530273},{"id":"https://openalex.org/C94520183","wikidata":"https://www.wikidata.org/wiki/Q190746","display_name":"Advanced Encryption Standard","level":3,"score":0.26600000262260437},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.2624000012874603}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography10020016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020016","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d4cd79dd3ca243ab894a918a1ee06c6d","is_oa":true,"landing_page_url":"https://doaj.org/article/d4cd79dd3ca243ab894a918a1ee06c6d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 10, Iss 2, p 16 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography10020016","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography10020016","pdf_url":null,"source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5111300349235535,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W2888082421","https://openalex.org/W2907811000","https://openalex.org/W2983620831","https://openalex.org/W2986120962","https://openalex.org/W4200364420","https://openalex.org/W4213452758","https://openalex.org/W4223505845","https://openalex.org/W4292693222","https://openalex.org/W4377293289","https://openalex.org/W4386255320","https://openalex.org/W4388713780","https://openalex.org/W4390191530","https://openalex.org/W4390798406","https://openalex.org/W4392100962","https://openalex.org/W4392241793","https://openalex.org/W4392716743","https://openalex.org/W4394685986","https://openalex.org/W4399273261","https://openalex.org/W4403076972","https://openalex.org/W4403944638","https://openalex.org/W4404231097","https://openalex.org/W4404994086","https://openalex.org/W4404998244","https://openalex.org/W4405414197","https://openalex.org/W4405810215","https://openalex.org/W4405841716","https://openalex.org/W4405846970","https://openalex.org/W4405999650","https://openalex.org/W4406257392","https://openalex.org/W4406749779","https://openalex.org/W4406901295","https://openalex.org/W4407002606","https://openalex.org/W4408507522","https://openalex.org/W4409370000","https://openalex.org/W4409435617","https://openalex.org/W4409473550","https://openalex.org/W4409505205","https://openalex.org/W4410300893","https://openalex.org/W4410745507","https://openalex.org/W4410949861","https://openalex.org/W4411043714","https://openalex.org/W4411341459","https://openalex.org/W4411710091","https://openalex.org/W4411849681","https://openalex.org/W4412406125","https://openalex.org/W4412530541","https://openalex.org/W4413108228","https://openalex.org/W4413225892","https://openalex.org/W4413354119","https://openalex.org/W4413943669","https://openalex.org/W4414346988","https://openalex.org/W4414450045","https://openalex.org/W4414713019","https://openalex.org/W7082065028"],"related_works":[],"abstract_inverted_index":{"This":[0,225],"article":[1],"presents":[2],"a":[3,25,31,162,228],"novel":[4],"framework":[5],"for":[6,243],"encrypting":[7],"color":[8],"images":[9,97],"to":[10,110],"enhance":[11],"digital":[12],"data":[13],"security":[14,120],"using":[15,57,100,119],"deep":[16],"learning":[17],"and":[18,65,85,92,121,140,175,196,222,231,239],"artificial":[19],"intelligence":[20],"techniques.":[21],"The":[22,186],"system":[23,187],"employs":[24,149],"two-model":[26],"neural":[27,172,205],"architecture:":[28],"the":[29,43,83,101,146,182,204,219],"first,":[30],"Convolutional":[32],"Neural":[33],"Network":[34],"(CNN),":[35],"verifies":[36],"sender":[37,84],"authenticity":[38],"during":[39],"user":[40],"authentication,":[41],"while":[42,198],"second":[44],"extracts":[45],"unique":[46],"fingerprint":[47],"features.":[48],"These":[49],"features":[50],"are":[51,75,98],"converted":[52],"into":[53],"high-entropy":[54],"encryption":[55,122,148,234],"keys":[56,107],"Particle":[58],"Swarm":[59],"Optimization":[60],"(PSO),":[61],"minimizing":[62],"key":[63,69,141,152,158],"similarity":[64],"ensuring":[66,115],"that":[67],"no":[68],"is":[70,159],"reused":[71],"or":[72,90],"transmitted.":[73],"Keys":[74],"generated":[76,169],"in":[77],"real":[78],"time":[79],"simultaneously":[80],"at":[81],"both":[82],"receiver":[86],"ends,":[87],"preventing":[88],"interception":[89],"leakage":[91],"providing":[93],"maximum":[94],"confidentiality.":[95],"Encrypted":[96],"secured":[99],"Advanced":[102],"Encryption":[103],"Standard":[104],"(AES-256)":[105],"with":[106,212],"uniquely":[108],"bound":[109],"each":[111],"user\u2019s":[112],"biometric":[113,237],"identity,":[114],"personalized":[116],"privacy.":[117],"Evaluation":[118],"metrics":[123],"yielded":[124],"strong":[125],"results:":[126],"entropy":[127],"of":[128,135,138,143,155,167],"7.9991,":[129],"correlation":[130],"coefficient":[131],"below":[132,216],"0.00001,":[133],"NPCR":[134],"99.66%,":[136],"UACI":[137],"33.9069%,":[139],"space":[142,154,166],"2256.":[144],"Although":[145],"final":[147],"an":[150,213],"AES-256":[151],"(key":[153],"2256),":[156],"this":[157],"derived":[160],"from":[161],"much":[163],"larger":[164],"deep-key":[165],"28192":[168],"by":[170],"multi-layer":[171],"feature":[173,241],"extraction":[174,242],"optimized":[176],"via":[177],"PSO,":[178],"thereby":[179],"significantly":[180],"enhancing":[181],"overall":[183],"cryptographic":[184],"strength.":[185],"also":[188],"demonstrated":[189],"robustness":[190],"against":[191],"common":[192],"attacks,":[193],"including":[194],"noise":[195],"cropping,":[197],"maintaining":[199],"recoverable":[200],"original":[201],"content.":[202],"Furthermore,":[203],"models":[206],"achieved":[207],"classification":[208],"accuracy":[209],"exceeding":[210],"99.83%":[211],"error":[214],"rate":[215],"0.05%,":[217],"confirming":[218],"framework\u2019s":[220],"reliability":[221],"practical":[223],"applicability.":[224],"approach":[226],"provides":[227],"secure,":[229],"dynamic,":[230],"efficient":[232],"image":[233],"paradigm,":[235],"combining":[236],"authentication":[238],"AI-based":[240],"advanced":[244],"cybersecurity":[245],"applications.":[246]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-03-03T00:00:00"}
