{"id":"https://openalex.org/W4408300214","doi":"https://doi.org/10.70985/6kzwhg03","title":"Enhanced Dual-Layer Image Encryption with DWT-DCT-SVD Hybrid Approach","display_name":"Enhanced Dual-Layer Image Encryption with DWT-DCT-SVD Hybrid Approach","publication_year":2025,"publication_date":"2025-03-10","ids":{"openalex":"https://openalex.org/W4408300214","doi":"https://doi.org/10.70985/6kzwhg03"},"language":"en","primary_location":{"id":"doi:10.70985/6kzwhg03","is_oa":true,"landing_page_url":"https://doi.org/10.70985/6kzwhg03","pdf_url":"https://networksecuritypub.com/index.php/journal/article/download/201/75","source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://networksecuritypub.com/index.php/journal/article/download/201/75","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066233796","display_name":"Saima Kanwal","orcid":"https://orcid.org/0000-0002-5451-6286"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Saima Kanwal","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100747830","display_name":"Tao Feng","orcid":"https://orcid.org/0000-0003-1611-9017"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Feng Tao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5015520849","display_name":"M. Kamran Khan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Majid Khan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5066233796"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03818897,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2024","issue":"10","first_page":"52","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9070000052452087,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6784234642982483},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.643349826335907},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.62921541929245},{"id":"https://openalex.org/keywords/dual-layer","display_name":"Dual layer","score":0.6050378680229187},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5449243783950806},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5244303345680237},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.502112627029419},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.4141530990600586},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3969755172729492},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3571888506412506},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.26437562704086304},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24876689910888672},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.07321110367774963},{"id":"https://openalex.org/keywords/composite-material","display_name":"Composite material","score":0.05296206474304199}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6784234642982483},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.643349826335907},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.62921541929245},{"id":"https://openalex.org/C2993148961","wikidata":"https://www.wikidata.org/wiki/Q5294","display_name":"Dual layer","level":3,"score":0.6050378680229187},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5449243783950806},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5244303345680237},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.502112627029419},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.4141530990600586},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3969755172729492},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3571888506412506},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.26437562704086304},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24876689910888672},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.07321110367774963},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.05296206474304199},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.70985/6kzwhg03","is_oa":true,"landing_page_url":"https://doi.org/10.70985/6kzwhg03","pdf_url":"https://networksecuritypub.com/index.php/journal/article/download/201/75","source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.70985/6kzwhg03","is_oa":true,"landing_page_url":"https://doi.org/10.70985/6kzwhg03","pdf_url":"https://networksecuritypub.com/index.php/journal/article/download/201/75","source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4408300214.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1916685473","https://openalex.org/W2055682261","https://openalex.org/W1993363272","https://openalex.org/W2186390138","https://openalex.org/W2060035984","https://openalex.org/W2790129917","https://openalex.org/W2992856432","https://openalex.org/W1978162990","https://openalex.org/W2329901306","https://openalex.org/W4403794707"],"abstract_inverted_index":{"In":[0],"the":[1,7,66,73,76,163,188,192],"evolving":[2],"landscape":[3],"of":[4,9,60,79,107,115,165,221],"telemedicine,":[5],"ensuring":[6,187],"security":[8,101,229],"medical":[10,44,53,109,209],"images":[11,54],"has":[12],"become":[13],"increasingly":[14],"critical.":[15],"This":[16,200],"paper":[17],"introduces":[18],"an":[19],"advanced":[20],"hybrid":[21,201],"watermarking":[22],"technique":[23],"that":[24],"integrates":[25],"Discrete":[26,30],"Wavelet":[27],"Transform":[28,32],"(DWT),":[29],"Cosine":[31],"(DCT),":[33],"and":[34,55,71,90,100,134,152,160,225,230],"Singular":[35],"Value":[36],"Decomposition":[37],"(SVD)":[38],"using":[39,69,88,104],"double":[40,226],"encryption":[41,92,227],"to":[42,65,146,174,182],"safeguard":[43],"images.":[45],"The":[46,84,96,219],"proposed":[47],"methodology":[48],"involves":[49],"several":[50],"steps:":[51],"pre-processing":[52],"watermarks,":[56],"applying":[57],"multiple":[58],"levels":[59],"DWT":[61],"decomposition,":[62],"converting":[63],"sub-bands":[64],"frequency":[67],"domain":[68],"DCT,":[70,223],"embedding":[72,214],"watermark":[74,85,189],"into":[75],"singular":[77],"values":[78,143,157,170,180],"DCT":[80],"coefficients":[81],"with":[82,112,215],"SVD.":[83],"is":[86],"secured":[87],"circular":[89],"chaotic":[91],"techniques":[93],"before":[94],"embedding.":[95],"method's":[97],"robustness,":[98,186],"imperceptibility,":[99],"were":[102],"evaluated":[103],"a":[105,113,204],"dataset":[106],"100":[108],"images,":[110],"each":[111],"resolution":[114],"512x512":[116],"pixels.":[117],"Key":[118],"performance":[119],"metrics":[120],"included":[121],"Structural":[122],"Similarity":[123],"Index":[124],"(SSIM),":[125],"Peak":[126],"Signal-to-Noise":[127],"Ratio":[128],"(PSNR),":[129],"Mean":[130],"Squared":[131],"Error":[132],"(MSE),":[133],"Normalized":[135],"Correlation":[136],"(NC).":[137],"Experimental":[138],"results":[139],"demonstrated":[140],"high":[141],"PSNR":[142],"(35.2":[144],"dB":[145],"38.4":[147],"dB),":[148],"indicating":[149],"minimal":[150],"distortion":[151],"excellent":[153],"image":[154,197,210,216],"quality.":[155],"SSIM":[156],"between":[158],"0.92":[159],"0.96":[161],"highlighted":[162],"preservation":[164],"structural":[166],"integrity,":[167],"while":[168],"MSE":[169],"ranged":[171],"from":[172],"11.0":[173],"15.8,":[175],"reflecting":[176],"low":[177],"distortion.":[178],"NC":[179],"close":[181],"1":[183],"indicated":[184],"strong":[185],"closely":[190],"matched":[191],"original":[193],"even":[194],"after":[195],"various":[196],"processing":[198],"attacks.":[199],"method":[202],"offers":[203],"robust":[205],"solution":[206],"for":[207,236],"secure":[208],"watermarking,":[211],"balancing":[212],"effective":[213],"quality":[217],"preservation.":[218],"integration":[220],"DWT,":[222],"SVD,":[224],"enhances":[228],"resilience,":[231],"making":[232],"it":[233],"highly":[234],"suitable":[235],"telemedicine":[237],"applications.":[238]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
