{"id":"https://openalex.org/W4411872926","doi":"https://doi.org/10.3390/cryptography9030049","title":"Image Encryption with Dual Watermark Based on Chaotic Map","display_name":"Image Encryption with Dual Watermark Based on Chaotic Map","publication_year":2025,"publication_date":"2025-07-01","ids":{"openalex":"https://openalex.org/W4411872926","doi":"https://doi.org/10.3390/cryptography9030049"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography9030049","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9030049","pdf_url":"https://www.mdpi.com/2410-387X/9/3/49/pdf?version=1751378956","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/9/3/49/pdf?version=1751378956","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019791929","display_name":"Ran Chu","orcid":"https://orcid.org/0000-0001-5760-4903"},"institutions":[{"id":"https://openalex.org/I88372448","display_name":"Dalian Polytechnic University","ror":"https://ror.org/00c7x4a95","country_code":"CN","type":"education","lineage":["https://openalex.org/I88372448"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ran Chu","raw_affiliation_strings":["Information Science and Engineering College, Dalian Polytechnic University, Dalian 116034, China"],"affiliations":[{"raw_affiliation_string":"Information Science and Engineering College, Dalian Polytechnic University, Dalian 116034, China","institution_ids":["https://openalex.org/I88372448"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077921452","display_name":"Jun Mou","orcid":"https://orcid.org/0000-0002-7774-2833"},"institutions":[{"id":"https://openalex.org/I88372448","display_name":"Dalian Polytechnic University","ror":"https://ror.org/00c7x4a95","country_code":"CN","type":"education","lineage":["https://openalex.org/I88372448"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Mou","raw_affiliation_strings":["Information Science and Engineering College, Dalian Polytechnic University, Dalian 116034, China"],"affiliations":[{"raw_affiliation_string":"Information Science and Engineering College, Dalian Polytechnic University, Dalian 116034, China","institution_ids":["https://openalex.org/I88372448"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051081514","display_name":"Yuanhui Cui","orcid":"https://orcid.org/0000-0002-9778-0255"},"institutions":[{"id":"https://openalex.org/I88372448","display_name":"Dalian Polytechnic University","ror":"https://ror.org/00c7x4a95","country_code":"CN","type":"education","lineage":["https://openalex.org/I88372448"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanhui Cui","raw_affiliation_strings":["Information Science and Engineering College, Dalian Polytechnic University, Dalian 116034, China"],"affiliations":[{"raw_affiliation_string":"Information Science and Engineering College, Dalian Polytechnic University, Dalian 116034, China","institution_ids":["https://openalex.org/I88372448"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019791929"],"corresponding_institution_ids":["https://openalex.org/I88372448"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":1.2996,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82223707,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"9","issue":"3","first_page":"49","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.972100019454956,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8158340454101562},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.792043924331665},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.7184863686561584},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6114912033081055},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6114861965179443},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5683212876319885},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5266501903533936},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.5190318822860718},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4993736743927002},{"id":"https://openalex.org/keywords/chaotic-map","display_name":"Chaotic map","score":0.4787285029888153},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20933467149734497},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.054655998945236206}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8158340454101562},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.792043924331665},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.7184863686561584},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6114912033081055},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6114861965179443},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5683212876319885},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5266501903533936},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.5190318822860718},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4993736743927002},{"id":"https://openalex.org/C2983793180","wikidata":"https://www.wikidata.org/wiki/Q166314","display_name":"Chaotic map","level":3,"score":0.4787285029888153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20933467149734497},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.054655998945236206},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography9030049","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9030049","pdf_url":"https://www.mdpi.com/2410-387X/9/3/49/pdf?version=1751378956","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d09f2cdd2bf141899addc9ca0fd35312","is_oa":true,"landing_page_url":"https://doaj.org/article/d09f2cdd2bf141899addc9ca0fd35312","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 9, Iss 3, p 49 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography9030049","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography9030049","pdf_url":"https://www.mdpi.com/2410-387X/9/3/49/pdf?version=1751378956","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4411872926.pdf","grobid_xml":"https://content.openalex.org/works/W4411872926.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W2001897902","https://openalex.org/W2063693948","https://openalex.org/W2234979722","https://openalex.org/W2514315863","https://openalex.org/W2743732015","https://openalex.org/W2889887095","https://openalex.org/W2910225346","https://openalex.org/W2913963972","https://openalex.org/W2972147003","https://openalex.org/W2979599398","https://openalex.org/W2981902590","https://openalex.org/W2998680368","https://openalex.org/W3009263480","https://openalex.org/W3013246088","https://openalex.org/W3026266985","https://openalex.org/W3046885767","https://openalex.org/W3118776416","https://openalex.org/W3136925340","https://openalex.org/W3137801059","https://openalex.org/W3153874840","https://openalex.org/W3156578259","https://openalex.org/W3165444304","https://openalex.org/W3173185241","https://openalex.org/W3183300061","https://openalex.org/W4200256588","https://openalex.org/W4225144494","https://openalex.org/W4304889886","https://openalex.org/W4319312582","https://openalex.org/W4404184309","https://openalex.org/W4404688238","https://openalex.org/W4405531574","https://openalex.org/W4407304478","https://openalex.org/W4407423509","https://openalex.org/W4407948341","https://openalex.org/W6781716181","https://openalex.org/W6788700852","https://openalex.org/W6849520776"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"A":[0],"dual":[1,109],"watermark":[2,77,110],"and":[3,22,35,55,78,108,113],"DNA":[4,96],"image":[5,44,54,83],"encryption":[6,97,107],"based":[7,84],"on":[8,85],"a":[9,15,75,86,94],"chaotic":[10,18,87],"map":[11,19],"is":[12,20,39,45,63,72,98],"proposed.":[13,99],"Firstly,":[14],"new":[16],"discrete":[17],"proposed,":[21],"the":[23,29,36,48,52,66,81,104,114],"dynamic":[24],"characteristics":[25],"are":[26],"analyzed.":[27],"Then,":[28],"hash":[30],"value":[31,50],"changes":[32],"initial":[33],"conditions,":[34],"pseudo-random":[37],"sequence":[38,88],"generated.":[40],"The":[41,70,100],"encrypted":[42,57],"copyright":[43,67,111],"fused":[46],"with":[47,65],"feature":[49],"of":[51,106],"original":[53,82],"then":[56],"again":[58],"to":[59,89,116],"form":[60],"zero-watermarking,":[61],"which":[62],"registered":[64],"certification":[68],"authority.":[69],"zero-watermarking":[71],"taken":[73],"as":[74],"robust":[76],"embedded":[79],"into":[80],"ensure":[90],"its":[91],"invisibility.":[92],"Finally,":[93],"cross-mutation":[95],"experimental":[101],"results":[102],"verify":[103],"performance":[105],"authentication,":[112],"ability":[115],"resist":[117],"attacks.":[118]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
