{"id":"https://openalex.org/W4372348569","doi":"https://doi.org/10.3390/cryptography7020023","title":"Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment","display_name":"Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment","publication_year":2023,"publication_date":"2023-05-04","ids":{"openalex":"https://openalex.org/W4372348569","doi":"https://doi.org/10.3390/cryptography7020023"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7020023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7020023","pdf_url":"https://www.mdpi.com/2410-387X/7/2/23/pdf?version=1683194417","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/2/23/pdf?version=1683194417","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012125066","display_name":"Pallavi Kulkarni","orcid":null},"institutions":[{"id":"https://openalex.org/I4210125823","display_name":"KLE University","ror":"https://ror.org/03aam9155","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210125823"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pallavi Kulkarni","raw_affiliation_strings":["Department of Electronics and Communication Engineering, KLE Dr. MSSCET, Belgaum 590008, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, KLE Dr. MSSCET, Belgaum 590008, India","institution_ids":["https://openalex.org/I4210125823"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051094885","display_name":"Rajashri Khanai","orcid":"https://orcid.org/0000-0002-5080-722X"},"institutions":[{"id":"https://openalex.org/I4210125823","display_name":"KLE University","ror":"https://ror.org/03aam9155","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210125823"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rajashri Khanai","raw_affiliation_strings":["Department of Computer Science Engineering, KLE Dr. MSSCET, Belgaum 590008, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science Engineering, KLE Dr. MSSCET, Belgaum 590008, India","institution_ids":["https://openalex.org/I4210125823"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038145906","display_name":"Dattaprasad A. Torse","orcid":"https://orcid.org/0000-0002-2101-487X"},"institutions":[{"id":"https://openalex.org/I4210125823","display_name":"KLE University","ror":"https://ror.org/03aam9155","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210125823"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dattaprasad Torse","raw_affiliation_strings":["Department of Electronics and Communication Engineering, KLE Dr. MSSCET, Belgaum 590008, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, KLE Dr. MSSCET, Belgaum 590008, India","institution_ids":["https://openalex.org/I4210125823"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038009049","display_name":"Nalini C. Iyer","orcid":"https://orcid.org/0000-0001-5160-403X"},"institutions":[{"id":"https://openalex.org/I3132975163","display_name":"KLE Technological University","ror":"https://ror.org/04yh52k23","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132975163"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Nalini Iyer","raw_affiliation_strings":["Department of Electronics and Communication Engineering, KLE Technological University, Hubli 580031, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering, KLE Technological University, Hubli 580031, India","institution_ids":["https://openalex.org/I3132975163"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044683729","display_name":"Gururaj Bindagi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090302","display_name":"Novartis (India)","ror":"https://ror.org/00dhvr506","country_code":"IN","type":"company","lineage":["https://openalex.org/I1283582996","https://openalex.org/I4210090302"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gururaj Bindagi","raw_affiliation_strings":["Platform Architect, Novartis, Hyderabad 500081, India"],"affiliations":[{"raw_affiliation_string":"Platform Architect, Novartis, Hyderabad 500081, India","institution_ids":["https://openalex.org/I4210090302"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012125066"],"corresponding_institution_ids":["https://openalex.org/I4210125823"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.4903,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.63647444,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"7","issue":"2","first_page":"23","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7954217195510864},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7343540191650391},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6829360127449036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5859396457672119},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5102894306182861},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47587600350379944},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.44213494658470154},{"id":"https://openalex.org/keywords/client-side-encryption","display_name":"Client-side encryption","score":0.43353503942489624},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4144752621650696},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3835046589374542},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.3105083703994751}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7954217195510864},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7343540191650391},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6829360127449036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5859396457672119},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5102894306182861},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47587600350379944},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.44213494658470154},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.43353503942489624},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4144752621650696},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3835046589374542},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.3105083703994751},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7020023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7020023","pdf_url":"https://www.mdpi.com/2410-387X/7/2/23/pdf?version=1683194417","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:9f6271dead224ae2876aa2b0b2f3f361","is_oa":true,"landing_page_url":"https://doaj.org/article/9f6271dead224ae2876aa2b0b2f3f361","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 2, p 23 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7020023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7020023","pdf_url":"https://www.mdpi.com/2410-387X/7/2/23/pdf?version=1683194417","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4372348569.pdf"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W1996720481","https://openalex.org/W2015218975","https://openalex.org/W2039541634","https://openalex.org/W2096336295","https://openalex.org/W2112589978","https://openalex.org/W2271163303","https://openalex.org/W2289246793","https://openalex.org/W2792905960","https://openalex.org/W2793965508","https://openalex.org/W2794017053","https://openalex.org/W2798169276","https://openalex.org/W2899732343","https://openalex.org/W2902966117","https://openalex.org/W2908895861","https://openalex.org/W2944454002","https://openalex.org/W2944785541","https://openalex.org/W2948556935","https://openalex.org/W2999263361","https://openalex.org/W3024647486","https://openalex.org/W3047589366","https://openalex.org/W3081798277","https://openalex.org/W3090260262","https://openalex.org/W3100114739","https://openalex.org/W4220776802","https://openalex.org/W6680371559","https://openalex.org/W6782152751"],"related_works":["https://openalex.org/W2965484163","https://openalex.org/W4232705780","https://openalex.org/W2096221836","https://openalex.org/W4239325954","https://openalex.org/W4309584611","https://openalex.org/W2744406407","https://openalex.org/W2624091145","https://openalex.org/W4232607684","https://openalex.org/W3118757263","https://openalex.org/W4308784203"],"abstract_inverted_index":{"The":[0,65,239,291,318],"cloud":[1,61,69,80,132],"provides":[2,173],"on-demand,":[3],"high-quality":[4],"services":[5,24,88],"to":[6,89,93,116,144,158,212,244,282,325],"its":[7],"users":[8,19],"without":[9],"the":[10,18,22,27,52,57,60,68,71,95,106,117,146,154,192,197,203,207,221,230,234,237,246,254,261,266,313,327,332],"burden":[11],"of":[12,59,67,105,148,199,331],"managing":[13],"hardware":[14],"and":[15,48,75,123,150,167,236,270,286,312,329],"software.":[16],"Though":[17],"benefit":[20],"from":[21,229],"remote":[23],"provided":[25],"by":[26,253],"cloud,":[28],"they":[29],"do":[30],"not":[31],"have":[32],"their":[33,37],"personal":[34,47],"data":[35,135],"in":[36,79,91,126,196,299,309],"physical":[38],"possession.":[39],"This":[40],"certainly":[41],"poses":[42],"new":[43,164],"security":[44,87,285],"threats":[45],"for":[46,62,86,224],"confidential":[49],"data,":[50],"bringing":[51],"focus":[53],"back":[54],"on":[55,153],"trusting":[56],"use":[58],"sensitive":[63],"data.":[64,156],"benefits":[66],"outweigh":[70],"concerns":[72],"raised":[73],"earlier,":[74],"with":[76,178,183,276],"an":[77,218],"increase":[78],"usage,":[81],"it":[82,141],"becomes":[83],"more":[84],"important":[85,143],"evolve":[90],"order":[92,211],"address":[94,145],"ever-changing":[96],"threat":[97],"landscape.":[98],"Advanced":[99],"encryption":[100,110,180,273],"standard":[101,274],"(AES),":[102],"being":[103],"one":[104],"most":[107],"widely":[108],"used":[109,223,243],"techniques,":[111],"has":[112],"inherent":[113],"disadvantages":[114],"related":[115,300],"secret":[118,247],"key":[119,201,222,231,241,256,319],"that":[120],"is":[121,142,188,206,227,242,251],"shared,":[122],"predictable":[124],"patterns":[125],"subkey":[127],"generation.":[128],"In":[129,210,259],"addition,":[130,260],"since":[131],"storage":[133],"involves":[134],"transfer":[136],"over":[137,288],"a":[138,163,174,306],"wireless":[139,289],"channel,":[140],"effect":[147],"noise":[149],"multipath":[151],"propagation":[152],"transmitted":[155],"Catering":[157],"this":[159,214],"problem,":[160],"we":[161,216],"propose":[162,217],"approach\u2014the":[165],"secure":[166],"reliable":[168],"neural":[169,255],"cryptcoding":[170],"(SARNC)":[171],"technique\u2014which":[172],"superior":[175],"algorithm,":[176],"dealing":[177],"better":[179],"techniques":[181],"combined":[182],"channel":[184],"coding.":[185],"A":[186,302],"chain":[187],"as":[189,191],"strong":[190],"weakest":[193,204],"link":[194,205],"and,":[195],"case":[198],"symmetric":[200],"encryption,":[202],"shared":[208,232,240],"key.":[209],"overcome":[213],"limitation,":[215],"approach":[219,263],"wherein":[220],"cryptographic":[225],"purposes":[226],"different":[228],"between":[233],"sender":[235],"receiver.":[238],"derive":[245],"private":[248],"key,":[249],"which":[250],"generated":[252],"exchange":[257],"protocol.":[258],"proposed":[262,292],"emphasizes":[264],"strengthening":[265],"sub-key":[267],"generation":[268],"process":[269],"integrating":[271],"advanced":[272],"(AES)":[275],"low-density":[277],"parity":[278],"check":[279],"(LDPC)":[280],"codes":[281],"provide":[283],"end-to-end":[284],"reliability":[287],"channels.":[290],"technique":[293],"was":[294,322],"tested":[295],"against":[296],"research":[297],"done":[298],"areas.":[301],"comparative":[303],"study":[304],"shows":[305],"significant":[307],"improvement":[308],"PSNR,":[310],"MSE,":[311],"structural":[314],"similarity":[315],"index":[316],"(SSIM).":[317],"strength":[320,328],"analysis":[321],"carried":[323],"out":[324],"understand":[326],"weaknesses":[330],"keys":[333],"generated.":[334]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-02-28T09:26:25.869077","created_date":"2025-10-10T00:00:00"}
