{"id":"https://openalex.org/W4367021649","doi":"https://doi.org/10.3934/nhm.2023055","title":"An image encryption algorithm based on heat flow cryptosystems","display_name":"An image encryption algorithm based on heat flow cryptosystems","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4367021649","doi":"https://doi.org/10.3934/nhm.2023055"},"language":"en","primary_location":{"id":"doi:10.3934/nhm.2023055","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3934/nhm.2023055","pdf_url":null,"source":{"id":"https://openalex.org/S21752972","display_name":"Networks and Heterogeneous Media","issn_l":"1556-1801","issn":["1556-1801","1556-181X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Networks and Heterogeneous Media","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"http://dx.doi.org/10.3934/nhm.2023055","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016171406","display_name":"Jin Li","orcid":"https://orcid.org/0000-0001-6887-7720"},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Li","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Hebei Key Laboratory of Data Science and Application, Tangshan 063210, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Hebei Key Laboratory of Data Science and Application, Tangshan 063210, P. R. China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052367414","display_name":"Jinzheng Qu","orcid":"https://orcid.org/0000-0003-2309-2334"},"institutions":[{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinzheng Qu","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Hebei Key Laboratory of Data Science and Application, Tangshan 063210, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Hebei Key Laboratory of Data Science and Application, Tangshan 063210, P. R. China","institution_ids":["https://openalex.org/I137506752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024453118","display_name":"Xibo Duan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132981","display_name":"Ningxia Water Conservancy","ror":"https://ror.org/02p2qrw13","country_code":"CN","type":"funder","lineage":["https://openalex.org/I4210132981"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xibo Duan","raw_affiliation_strings":["Shandong Water Conservancy Vocational College, Rizhao 276800, P. R. China"],"affiliations":[{"raw_affiliation_string":"Shandong Water Conservancy Vocational College, Rizhao 276800, P. R. China","institution_ids":["https://openalex.org/I4210132981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063177528","display_name":"Xiaoning Su","orcid":"https://orcid.org/0000-0001-7954-8236"},"institutions":[{"id":"https://openalex.org/I4210132981","display_name":"Ningxia Water Conservancy","ror":"https://ror.org/02p2qrw13","country_code":"CN","type":"funder","lineage":["https://openalex.org/I4210132981"]},{"id":"https://openalex.org/I137506752","display_name":"North China University of Science and Technology","ror":"https://ror.org/04z4wmb81","country_code":"CN","type":"education","lineage":["https://openalex.org/I137506752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoning Su","raw_affiliation_strings":["College of Science, North China University of Science and Technology, Hebei Key Laboratory of Data Science and Application, Tangshan 063210, P. R. China","Shandong Water Conservancy Vocational College, Rizhao 276800, P. R. China"],"affiliations":[{"raw_affiliation_string":"College of Science, North China University of Science and Technology, Hebei Key Laboratory of Data Science and Application, Tangshan 063210, P. R. China","institution_ids":["https://openalex.org/I137506752"]},{"raw_affiliation_string":"Shandong Water Conservancy Vocational College, Rizhao 276800, P. R. China","institution_ids":["https://openalex.org/I4210132981"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063177528"],"corresponding_institution_ids":["https://openalex.org/I137506752","https://openalex.org/I4210132981"],"apc_list":null,"apc_paid":null,"fwci":0.2423,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.49527956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"18","issue":"3","first_page":"1260","last_page":"1287"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.806722104549408},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.76155686378479},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6789768934249878},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.6770716905593872},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.6408323049545288},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.48253318667411804},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.46647295355796814},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.4596651792526245},{"id":"https://openalex.org/keywords/disk-encryption-theory","display_name":"Disk encryption theory","score":0.4154411554336548},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.40760326385498047},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.2511480450630188},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2311493456363678},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1479099690914154}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.806722104549408},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.76155686378479},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6789768934249878},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.6770716905593872},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.6408323049545288},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.48253318667411804},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.46647295355796814},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.4596651792526245},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.4154411554336548},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40760326385498047},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.2511480450630188},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2311493456363678},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1479099690914154},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3934/nhm.2023055","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3934/nhm.2023055","pdf_url":null,"source":{"id":"https://openalex.org/S21752972","display_name":"Networks and Heterogeneous Media","issn_l":"1556-1801","issn":["1556-1801","1556-181X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Networks and Heterogeneous Media","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c5b86023209e4619a2da8d50202ebd7f","is_oa":true,"landing_page_url":"https://doaj.org/article/c5b86023209e4619a2da8d50202ebd7f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Networks and Heterogeneous Media, Vol 18, Iss 3, Pp 1260-1287 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3934/nhm.2023055","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3934/nhm.2023055","pdf_url":null,"source":{"id":"https://openalex.org/S21752972","display_name":"Networks and Heterogeneous Media","issn_l":"1556-1801","issn":["1556-1801","1556-181X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315844","host_organization_name":"American Institute of Mathematical Sciences","host_organization_lineage":["https://openalex.org/P4310315844"],"host_organization_lineage_names":["American Institute of Mathematical Sciences"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Networks and Heterogeneous Media","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1582623901","https://openalex.org/W2787079824","https://openalex.org/W2805123356","https://openalex.org/W2904260134","https://openalex.org/W2911223165","https://openalex.org/W2917426586","https://openalex.org/W2944731310","https://openalex.org/W2948556935","https://openalex.org/W2995520056","https://openalex.org/W2998204968","https://openalex.org/W3003734798","https://openalex.org/W3036399271","https://openalex.org/W3092428393","https://openalex.org/W3109754446","https://openalex.org/W3119373096","https://openalex.org/W3126299125","https://openalex.org/W3159578031","https://openalex.org/W3166423341","https://openalex.org/W3209398169","https://openalex.org/W4206898960","https://openalex.org/W4243494487","https://openalex.org/W4285111657","https://openalex.org/W4287969435","https://openalex.org/W4294001483","https://openalex.org/W4317512969"],"related_works":["https://openalex.org/W4245054042","https://openalex.org/W2889430153","https://openalex.org/W2599014939","https://openalex.org/W2389178160","https://openalex.org/W4299870558","https://openalex.org/W3211136635","https://openalex.org/W2355986883","https://openalex.org/W2144246620","https://openalex.org/W2898251349","https://openalex.org/W2391125300"],"abstract_inverted_index":{"&lt;abstract&gt;&lt;p&gt;Image":[0],"encryption":[1,14,22,29,77,91,107,126,144,154],"has":[2],"been":[3],"an":[4,27,75],"important":[5],"research":[6],"topic":[7],"in":[8,50,158],"information":[9,133],"security.":[10],"Different":[11],"from":[12],"traditional":[13],"methods,":[15],"heat":[16,33,40,82],"flow":[17,34,41,83,98],"cryptosystem":[18,42,84],"is":[19,66,85,95,102,109,156,164],"a":[20,37,54],"new":[21],"method.":[23],"This":[24],"paper":[25],"proposes":[26],"image":[28,76,113,143,153],"algorithm":[30,78,94,101,108,155,163],"based":[31,43,79],"on":[32,44,80],"cryptosystem.":[35],"First,":[36],"class":[38],"of":[39,90,100,169],"nonlinear":[45,71],"pseudo-parabolic":[46,72],"equations":[47],"are":[48,137],"given":[49],"this":[51],"paper.":[52],"Second,":[53],"numerical":[55],"method":[56,65],"with":[57,114,121],"high":[58],"precision":[59],"namely":[60],"barycentric":[61],"Lagrange":[62],"interpolation":[63],"collocation":[64],"proposed":[67,106,152],"to":[68,111,139,166],"solve":[69],"the":[70,81,87,97,105,122,142,151,162,167],"equation.":[73],"Third,":[74],"designed,":[86],"detailed":[88],"process":[89],"and":[92,116,119,135,161,171],"decryption":[93],"given,":[96],"diagram":[99],"showed.":[103],"Finally,":[104],"applied":[110],"various":[112],"gray":[115],"RGB":[117],"format":[118],"compared":[120],"current":[123],"popular":[124],"chaotic":[125],"algorithm.":[127,145],"Many":[128],"indicators":[129,160],"such":[130],"as":[131],"histograms,":[132],"entropy":[134],"correlation":[136],"used":[138],"objectively":[140],"evaluate":[141],"The":[146],"experimental":[147],"results":[148],"show":[149],"that":[150],"better":[157],"most":[159],"sensitive":[165],"change":[168],"key":[170],"plaintext.&lt;/p&gt;&lt;/abstract&gt;":[172]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-24T08:02:53.985720","created_date":"2025-10-10T00:00:00"}
