{"id":"https://openalex.org/W4407980380","doi":"https://doi.org/10.34028/iajit/22/2/9","title":"Simplified and Effective Dual-Round Image Encryption Robust Technique","display_name":"Simplified and Effective Dual-Round Image Encryption Robust Technique","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407980380","doi":"https://doi.org/10.34028/iajit/22/2/9"},"language":"en","primary_location":{"id":"doi:10.34028/iajit/22/2/9","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/22/2/9","pdf_url":"https://doi.org/10.34028/iajit/22/2/9","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.34028/iajit/22/2/9","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048693125","display_name":"Mohamad Al-Laham","orcid":"https://orcid.org/0000-0002-5995-6336"},"institutions":[{"id":"https://openalex.org/I33926330","display_name":"Al-Balqa Applied University","ror":"https://ror.org/00qedmt22","country_code":"JO","type":"education","lineage":["https://openalex.org/I33926330"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Mohamad Al-Laham","raw_affiliation_strings":["Department of Management Information Systems , Al-Balqa Applied University , Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Management Information Systems , Al-Balqa Applied University , Jordan","institution_ids":["https://openalex.org/I33926330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078990476","display_name":"Bilal Bataineh","orcid":"https://orcid.org/0000-0002-4525-1642"},"institutions":[{"id":"https://openalex.org/I27570832","display_name":"Jadara University","ror":"https://ror.org/001drnv35","country_code":"JO","type":"education","lineage":["https://openalex.org/I27570832"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Bilal Bataineh","raw_affiliation_strings":["Department of Computer Science Jadara University , Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science Jadara University , Jordan","institution_ids":["https://openalex.org/I27570832"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025189279","display_name":"Ziad Alqadi\ufeff","orcid":"https://orcid.org/0000-0003-4734-8605"},"institutions":[{"id":"https://openalex.org/I33926330","display_name":"Al-Balqa Applied University","ror":"https://ror.org/00qedmt22","country_code":"JO","type":"education","lineage":["https://openalex.org/I33926330"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ziad Alqadi","raw_affiliation_strings":["Department of Computer and Engineering Al-Balqa Applied University , Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Engineering Al-Balqa Applied University , Jordan","institution_ids":["https://openalex.org/I33926330"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048693125"],"corresponding_institution_ids":["https://openalex.org/I33926330"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02449089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9711999893188477,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9187854528427124},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6804381012916565},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6655222177505493},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5550857186317444},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.30521541833877563},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27811625599861145}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9187854528427124},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6804381012916565},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6655222177505493},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5550857186317444},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.30521541833877563},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27811625599861145},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.34028/iajit/22/2/9","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/22/2/9","pdf_url":"https://doi.org/10.34028/iajit/22/2/9","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.34028/iajit/22/2/9","is_oa":true,"landing_page_url":"https://doi.org/10.34028/iajit/22/2/9","pdf_url":"https://doi.org/10.34028/iajit/22/2/9","source":{"id":"https://openalex.org/S100666833","display_name":"The International Arab Journal of Information Technology","issn_l":"1683-3198","issn":["1683-3198","2309-4524"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4362726017","host_organization_name":"Zarqa University","host_organization_lineage":["https://openalex.org/P4362726017"],"host_organization_lineage_names":["Zarqa University"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The International Arab Journal of Information Technology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4407980380.pdf","grobid_xml":"https://content.openalex.org/works/W4407980380.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W2375981391","https://openalex.org/W45120566","https://openalex.org/W2361408597","https://openalex.org/W2352553236"],"abstract_inverted_index":{"A":[0],"simplified":[1],"and":[2,24,37,46,66,93,103,106,126,129,147,160,193,212,233,273,284,299,302,329,344],"efficient":[3],"technique":[4,14,111,184,255,289],"of":[5,7,53,75,101,140,164,209,229,331],"cryptography":[6],"an":[8],"image":[9,22,54,135,217,222,266,274,308],"will":[10,15,28,112,120,131,143,152,170,246,256,260,276,290,294],"be":[11,29,121,137,144,153,171,247,257,261,291],"developed.":[12],"The":[13,110,149,183,219,253,287,315],"utilize":[16],"two":[17,114,156],"simple":[18,34],"rounds":[19],"to":[20,82,136,196,199,227,263,305,322],"apply":[21],"encryption":[23,207,285,298,309],"decryption,":[25],"each":[26],"round":[27],"implemented":[30,154],"by":[31,62,161,339],"performing":[32],"a":[33,98,186,250],"rows":[35],"shuffling":[36,150],"columns":[38],"shuffling,":[39,95],"eliminating":[40,63],"the":[41,73,124,127,134,180,238,242,282,297,307,326,332],"need":[42],"for":[43,50],"computational":[44,60],"logical":[45,67],"arithmetic":[47,65],"operations":[48,151],"required":[49],"other":[51,313],"techniques":[52],"encryption.":[55],"Our":[56],"approach,":[57],"while":[58],"simplifying":[59],"demands":[61],"complex":[64],"operations,":[68],"maintains":[69],"robust":[70,213],"security":[71],"through":[72,241],"integration":[74],"dual":[76],"Chaotic":[77],"Logistic":[78],"Map":[79],"Models":[80],"(CLMM)":[81],"generate":[83],"highly":[84],"sensitive":[85,226],"indices":[86,89,116,158],"keys.":[87],"These":[88],"keys":[90,119,142,169],"control":[91],"row":[92],"column":[94],"which":[96],"provides":[97],"high":[99,194],"degree":[100],"permutation":[102],"resists":[104],"known-plaintext":[105],"cipher":[107],"text-only":[108],"attacks.":[109],"require":[113,278],"secret":[115,157],"keys,":[117,159],"these":[118,141,168],"variable":[122],"in":[123,179,237,281],"length":[125],"contents":[128],"they":[130],"depend":[132],"on":[133],"encrypted-decrypted,":[138],"generation":[139],"very":[145],"easy":[146],"simple.":[148],"using":[155,173],"implementing":[162],"couple":[163],"chaotic":[165,175,190],"logistic":[166,191],"map":[167],"produced":[172],"selected":[174],"parameters":[176],"values":[177],"included":[178],"private":[181,188,230,239],"key.":[182],"uses":[185],"256-bit":[187],"key,":[189],"maps,":[192],"sensitivity":[195],"parameter":[197],"variations":[198],"achieve":[200],"\"Very":[201],"strong\"":[202],"key":[203,231,240],"space":[204],"entropy,":[205],"with":[206,267,312],"throughput":[208],"19,540":[210],"KB/s":[211],"performance":[214],"across":[215],"diverse":[216],"sizes.":[218],"generated":[220],"decrypted":[221],"may":[223],"become":[224],"so":[225],"chosen":[228],"values,":[232],"any":[234,268,279],"little":[235],"variation":[236],"decryption":[243,283,300],"task,":[244],"it":[245,259,293,303],"showed":[248],"as":[249],"hacking":[251],"try.":[252],"proposed":[254,333],"flexible,":[258],"used":[262],"process":[264,310],"every":[265],"size":[269],"(gray":[270],"and/or":[271],"color),":[272],"changing":[275],"not":[277],"updating":[280],"processes.":[286],"developed":[288],"efficient;":[292],"decrease":[295],"both":[296],"times,":[301],"lead":[304],"accelerate":[306],"comparing":[311],"techniques.":[314],"study":[316],"systematically":[317],"utilizes":[318],"specific":[319],"evaluation":[320],"metrics":[321,349],"substantiate":[323],"claims":[324],"regarding":[325],"quality,":[327],"security,":[328],"velocity":[330],"cryptographic":[334],"technique.":[335],"Quality":[336],"is":[337],"assessed":[338],"Mean":[340],"Square":[341],"Error":[342],"(MSE)":[343],"Peak":[345],"Signal-to-Noise":[346],"Ratio":[347],"(PSNR)":[348]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-10T00:00:00"}
