Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.21203/rs.3.rs-3399892/v1
With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced encryption algorithms are utmost necessary. The proposed encryption scheme introduces a novel approach that capitalizes on the distinct characteristics of users' authenticated usernames to dictate the sequence in which image blocks are encrypted. The methodology encompasses two key strategies. Initially, a set of four individual chaotic maps - Sin, Chebyshev, Logistic, and Gaussian - are employed for encryption. Also, the image blocks are encrypted with a novel 4D chaotic map. The process begins with segmenting an N×N×3 color image into its red, blue, and green constituents, each of size N×N. These constituents are further subdivided into four arrays, each sized (4×4) × (N/4) × (N/4). The encryption process for various image bands is based on the use of chaotic sequences generated by schemes 1 and 2. These resulting sequences serve as the fundamental encryption keys, guiding a variety of processes including both confusion and diffusion. The proposed encryption schemes, Scheme 1 and Scheme 2 were rigorously evaluated through extensive simulations, comparing their performance with a traditional algorithm. Both procedures demonstrated robustness against statistical analysis differential attacks and showcased NPCR and UACI values closely approximating ideal standards of 99.6 and 33.4, respectively. Notably, Scheme 2, employing the proposed 4D map, outperformed Scheme 1, which used four different chaotic maps, particularly in terms of NPCR and UACI. The schemes exhibited a significant key space of 2540, rendering decryption infeasible within an astronomical time frame of 9.449 × 10130 years. Further, entropy and correlation analysis validation revealed values close to 7.99 and 0, aligning with traditional algorithms' values. Additionally, pixel distribution analyses indicated uniformity along horizontal, vertical, and diagonal directions. The paper introduces an innovative encryption approach that capitalizes on user-specific characteristics and demonstrates superior security and performance compared to conventional methods.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.21203/rs.3.rs-3399892/v1
- OA Status
- gold
- References
- 32
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4387775164
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4387775164Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.21203/rs.3.rs-3399892/v1Digital Object Identifier
- Title
-
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic SequencesWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-10-19Full publication date if available
- Authors
-
P. Mathivanan, K Ashwini, Amer Aljaedi, Mohamed Bouye, Zaid BassfarList of authors in order
- Landing page
-
https://doi.org/10.21203/rs.3.rs-3399892/v1Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.21203/rs.3.rs-3399892/v1Direct OA link when available
- Concepts
-
Encryption, Chaotic, Computer science, Key space, Algorithm, Theoretical computer science, Robustness (evolution), Chaotic map, Data mining, Artificial intelligence, Computer network, Gene, Biochemistry, ChemistryTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
32Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4387775164 |
|---|---|
| doi | https://doi.org/10.21203/rs.3.rs-3399892/v1 |
| ids.doi | https://doi.org/10.21203/rs.3.rs-3399892/v1 |
| ids.openalex | https://openalex.org/W4387775164 |
| fwci | 0.0 |
| type | preprint |
| title | Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| topics[1].id | https://openalex.org/T10388 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9214000105857849 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Advanced Steganography and Watermarking Techniques |
| topics[2].id | https://openalex.org/T10627 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9142000079154968 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Advanced Image and Video Retrieval Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C148730421 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8388131856918335 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[0].display_name | Encryption |
| concepts[1].id | https://openalex.org/C2777052490 |
| concepts[1].level | 2 |
| concepts[1].score | 0.652935266494751 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q5072826 |
| concepts[1].display_name | Chaotic |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.61507248878479 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C105322999 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5982507467269897 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1557574 |
| concepts[3].display_name | Key space |
| concepts[4].id | https://openalex.org/C11413529 |
| concepts[4].level | 1 |
| concepts[4].score | 0.5308502912521362 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[4].display_name | Algorithm |
| concepts[5].id | https://openalex.org/C80444323 |
| concepts[5].level | 1 |
| concepts[5].score | 0.5066009759902954 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2878974 |
| concepts[5].display_name | Theoretical computer science |
| concepts[6].id | https://openalex.org/C63479239 |
| concepts[6].level | 3 |
| concepts[6].score | 0.4309949576854706 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7353546 |
| concepts[6].display_name | Robustness (evolution) |
| concepts[7].id | https://openalex.org/C2983793180 |
| concepts[7].level | 3 |
| concepts[7].score | 0.4254128932952881 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q166314 |
| concepts[7].display_name | Chaotic map |
| concepts[8].id | https://openalex.org/C124101348 |
| concepts[8].level | 1 |
| concepts[8].score | 0.3733564615249634 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[8].display_name | Data mining |
| concepts[9].id | https://openalex.org/C154945302 |
| concepts[9].level | 1 |
| concepts[9].score | 0.26587361097335815 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[9].display_name | Artificial intelligence |
| concepts[10].id | https://openalex.org/C31258907 |
| concepts[10].level | 1 |
| concepts[10].score | 0.12938016653060913 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[10].display_name | Computer network |
| concepts[11].id | https://openalex.org/C104317684 |
| concepts[11].level | 2 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q7187 |
| concepts[11].display_name | Gene |
| concepts[12].id | https://openalex.org/C55493867 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7094 |
| concepts[12].display_name | Biochemistry |
| concepts[13].id | https://openalex.org/C185592680 |
| concepts[13].level | 0 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q2329 |
| concepts[13].display_name | Chemistry |
| keywords[0].id | https://openalex.org/keywords/encryption |
| keywords[0].score | 0.8388131856918335 |
| keywords[0].display_name | Encryption |
| keywords[1].id | https://openalex.org/keywords/chaotic |
| keywords[1].score | 0.652935266494751 |
| keywords[1].display_name | Chaotic |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.61507248878479 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/key-space |
| keywords[3].score | 0.5982507467269897 |
| keywords[3].display_name | Key space |
| keywords[4].id | https://openalex.org/keywords/algorithm |
| keywords[4].score | 0.5308502912521362 |
| keywords[4].display_name | Algorithm |
| keywords[5].id | https://openalex.org/keywords/theoretical-computer-science |
| keywords[5].score | 0.5066009759902954 |
| keywords[5].display_name | Theoretical computer science |
| keywords[6].id | https://openalex.org/keywords/robustness |
| keywords[6].score | 0.4309949576854706 |
| keywords[6].display_name | Robustness (evolution) |
| keywords[7].id | https://openalex.org/keywords/chaotic-map |
| keywords[7].score | 0.4254128932952881 |
| keywords[7].display_name | Chaotic map |
| keywords[8].id | https://openalex.org/keywords/data-mining |
| keywords[8].score | 0.3733564615249634 |
| keywords[8].display_name | Data mining |
| keywords[9].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[9].score | 0.26587361097335815 |
| keywords[9].display_name | Artificial intelligence |
| keywords[10].id | https://openalex.org/keywords/computer-network |
| keywords[10].score | 0.12938016653060913 |
| keywords[10].display_name | Computer network |
| language | en |
| locations[0].id | doi:10.21203/rs.3.rs-3399892/v1 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | acceptedVersion |
| locations[0].raw_type | posted-content |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.21203/rs.3.rs-3399892/v1 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5079669364 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | P. Mathivanan |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[0].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering (Cyber Security), Amrita Vishwa Vidyapeetham, Chennai Campus |
| authorships[0].institutions[0].id | https://openalex.org/I81556334 |
| authorships[0].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | P. Mathivanan |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Department of Computer Science and Engineering (Cyber Security), Amrita Vishwa Vidyapeetham, Chennai Campus |
| authorships[1].author.id | https://openalex.org/A5024644141 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1974-2162 |
| authorships[1].author.display_name | K Ashwini |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I81556334 |
| authorships[1].affiliations[0].raw_affiliation_string | Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Chennai Campus. |
| authorships[1].institutions[0].id | https://openalex.org/I81556334 |
| authorships[1].institutions[0].ror | https://ror.org/03am10p12 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I81556334 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Amrita Vishwa Vidyapeetham |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | K Ashwini |
| authorships[1].is_corresponding | True |
| authorships[1].raw_affiliation_strings | Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Chennai Campus. |
| authorships[2].author.id | https://openalex.org/A5035743797 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-4099-5025 |
| authorships[2].author.display_name | Amer Aljaedi |
| authorships[2].countries | SA |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I72264486 |
| authorships[2].affiliations[0].raw_affiliation_string | College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia |
| authorships[2].institutions[0].id | https://openalex.org/I72264486 |
| authorships[2].institutions[0].ror | https://ror.org/04yej8x59 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I72264486 |
| authorships[2].institutions[0].country_code | SA |
| authorships[2].institutions[0].display_name | University of Tabuk |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Amer Aljaedi |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | College of Computing and Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia |
| authorships[3].author.id | https://openalex.org/A5023428361 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Mohamed Bouye |
| authorships[3].countries | SA |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I82952536 |
| authorships[3].affiliations[0].raw_affiliation_string | Department of Mathematics, College of Science, King Khalid University, Saudi Arabia |
| authorships[3].institutions[0].id | https://openalex.org/I82952536 |
| authorships[3].institutions[0].ror | https://ror.org/052kwzs30 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I82952536 |
| authorships[3].institutions[0].country_code | SA |
| authorships[3].institutions[0].display_name | King Khalid University |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Mohamed Bouye |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Department of Mathematics, College of Science, King Khalid University, Saudi Arabia |
| authorships[4].author.id | https://openalex.org/A5031564954 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-1172-885X |
| authorships[4].author.display_name | Zaid Bassfar |
| authorships[4].countries | SA |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I72264486 |
| authorships[4].affiliations[0].raw_affiliation_string | Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia |
| authorships[4].institutions[0].id | https://openalex.org/I72264486 |
| authorships[4].institutions[0].ror | https://ror.org/04yej8x59 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I72264486 |
| authorships[4].institutions[0].country_code | SA |
| authorships[4].institutions[0].display_name | University of Tabuk |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Zaid Bassfar |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Department of Information Technology, University of Tabuk, Tabuk 71491, Saudi Arabia |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.21203/rs.3.rs-3399892/v1 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-25T14:43:58.451035 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W2376048186, https://openalex.org/W2147754652, https://openalex.org/W2373836497, https://openalex.org/W2392085618, https://openalex.org/W2553824135, https://openalex.org/W2542453563, https://openalex.org/W4380303202, https://openalex.org/W2385229064, https://openalex.org/W2360233907, https://openalex.org/W1972971222 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.21203/rs.3.rs-3399892/v1 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | acceptedVersion |
| best_oa_location.raw_type | posted-content |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-3399892/v1 |
| primary_location.id | doi:10.21203/rs.3.rs-3399892/v1 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | acceptedVersion |
| primary_location.raw_type | posted-content |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-3399892/v1 |
| publication_date | 2023-10-19 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W4290958908, https://openalex.org/W4294927211, https://openalex.org/W3048532210, https://openalex.org/W4306923815, https://openalex.org/W4293916131, https://openalex.org/W6773082124, https://openalex.org/W4293148817, https://openalex.org/W4380152950, https://openalex.org/W4225524037, https://openalex.org/W4318041106, https://openalex.org/W4307248733, https://openalex.org/W4379364595, https://openalex.org/W4221140148, https://openalex.org/W4378976249, https://openalex.org/W4324380314, https://openalex.org/W4385358906, https://openalex.org/W4385607050, https://openalex.org/W4200429023, https://openalex.org/W4386524465, https://openalex.org/W4386378733, https://openalex.org/W4312196317, https://openalex.org/W4372347949, https://openalex.org/W4382401270, https://openalex.org/W4378672806, https://openalex.org/W4220710095, https://openalex.org/W3021781350, https://openalex.org/W4220791853, https://openalex.org/W3109278164, https://openalex.org/W4378512421, https://openalex.org/W4377293289, https://openalex.org/W2999435040, https://openalex.org/W4225542653 |
| referenced_works_count | 32 |
| abstract_inverted_index.- | 70, 76 |
| abstract_inverted_index.1 | 146, 173 |
| abstract_inverted_index.2 | 176 |
| abstract_inverted_index.a | 33, 63, 88, 159, 187, 241 |
| abstract_inverted_index.0, | 272 |
| abstract_inverted_index.1, | 224 |
| abstract_inverted_index.2, | 216 |
| abstract_inverted_index.2. | 148 |
| abstract_inverted_index.4D | 90, 220 |
| abstract_inverted_index.To | 15 |
| abstract_inverted_index.an | 98, 251, 293 |
| abstract_inverted_index.as | 8, 153 |
| abstract_inverted_index.by | 144 |
| abstract_inverted_index.in | 50, 232 |
| abstract_inverted_index.is | 13, 135 |
| abstract_inverted_index.of | 19, 42, 65, 110, 140, 161, 209, 234, 245, 255 |
| abstract_inverted_index.on | 38, 137, 299 |
| abstract_inverted_index.to | 46, 269, 309 |
| abstract_inverted_index.× | 124, 126, 257 |
| abstract_inverted_index.The | 28, 56, 93, 128, 168, 238, 290 |
| abstract_inverted_index.and | 74, 106, 147, 166, 174, 199, 202, 211, 236, 262, 271, 287, 302, 306 |
| abstract_inverted_index.are | 25, 54, 77, 85, 115 |
| abstract_inverted_index.for | 79, 131 |
| abstract_inverted_index.its | 103 |
| abstract_inverted_index.key | 60, 243 |
| abstract_inverted_index.set | 64 |
| abstract_inverted_index.the | 17, 39, 48, 82, 138, 154, 218 |
| abstract_inverted_index.two | 59 |
| abstract_inverted_index.use | 139 |
| abstract_inverted_index.7.99 | 270 |
| abstract_inverted_index.99.6 | 210 |
| abstract_inverted_index.Both | 190 |
| abstract_inverted_index.NPCR | 201, 235 |
| abstract_inverted_index.Sin, | 71 |
| abstract_inverted_index.UACI | 203 |
| abstract_inverted_index.With | 1 |
| abstract_inverted_index.both | 164 |
| abstract_inverted_index.each | 109, 121 |
| abstract_inverted_index.four | 66, 119, 227 |
| abstract_inverted_index.into | 102, 118 |
| abstract_inverted_index.map, | 221 |
| abstract_inverted_index.map. | 92 |
| abstract_inverted_index.maps | 69 |
| abstract_inverted_index.red, | 104 |
| abstract_inverted_index.size | 111 |
| abstract_inverted_index.such | 7, 20 |
| abstract_inverted_index.that | 36, 297 |
| abstract_inverted_index.time | 253 |
| abstract_inverted_index.used | 226 |
| abstract_inverted_index.were | 177 |
| abstract_inverted_index.with | 87, 96, 186, 274 |
| abstract_inverted_index.(N/4) | 125 |
| abstract_inverted_index.10130 | 258 |
| abstract_inverted_index.2540, | 246 |
| abstract_inverted_index.33.4, | 212 |
| abstract_inverted_index.9.449 | 256 |
| abstract_inverted_index.Also, | 81 |
| abstract_inverted_index.N×N. | 112 |
| abstract_inverted_index.These | 113, 149 |
| abstract_inverted_index.UACI. | 237 |
| abstract_inverted_index.along | 284 |
| abstract_inverted_index.bands | 134 |
| abstract_inverted_index.based | 136 |
| abstract_inverted_index.blue, | 105 |
| abstract_inverted_index.close | 268 |
| abstract_inverted_index.color | 100 |
| abstract_inverted_index.data, | 10, 21 |
| abstract_inverted_index.frame | 254 |
| abstract_inverted_index.green | 107 |
| abstract_inverted_index.ideal | 207 |
| abstract_inverted_index.image | 52, 83, 101, 133 |
| abstract_inverted_index.keys, | 157 |
| abstract_inverted_index.maps, | 230 |
| abstract_inverted_index.novel | 34, 89 |
| abstract_inverted_index.paper | 291 |
| abstract_inverted_index.pixel | 279 |
| abstract_inverted_index.serve | 152 |
| abstract_inverted_index.sized | 122 |
| abstract_inverted_index.space | 244 |
| abstract_inverted_index.terms | 233 |
| abstract_inverted_index.their | 184 |
| abstract_inverted_index.which | 51, 225 |
| abstract_inverted_index.(4×4) | 123 |
| abstract_inverted_index.(N/4). | 127 |
| abstract_inverted_index.Scheme | 172, 175, 215, 223 |
| abstract_inverted_index.begins | 95 |
| abstract_inverted_index.blocks | 53, 84 |
| abstract_inverted_index.scheme | 31 |
| abstract_inverted_index.users' | 43 |
| abstract_inverted_index.utmost | 26 |
| abstract_inverted_index.values | 204, 267 |
| abstract_inverted_index.within | 250 |
| abstract_inverted_index.years. | 259 |
| abstract_inverted_index.N×N×3 | 99 |
| abstract_inverted_index.against | 194 |
| abstract_inverted_index.arrays, | 120 |
| abstract_inverted_index.attacks | 198 |
| abstract_inverted_index.chaotic | 68, 91, 141, 229 |
| abstract_inverted_index.closely | 205 |
| abstract_inverted_index.common. | 14 |
| abstract_inverted_index.dictate | 47 |
| abstract_inverted_index.entropy | 261 |
| abstract_inverted_index.further | 116 |
| abstract_inverted_index.guiding | 158 |
| abstract_inverted_index.images, | 12 |
| abstract_inverted_index.process | 94, 130 |
| abstract_inverted_index.protect | 16 |
| abstract_inverted_index.schemes | 145, 239 |
| abstract_inverted_index.sharing | 4 |
| abstract_inverted_index.through | 180 |
| abstract_inverted_index.values. | 277 |
| abstract_inverted_index.variety | 160 |
| abstract_inverted_index.various | 132 |
| abstract_inverted_index.Further, | 260 |
| abstract_inverted_index.Gaussian | 75 |
| abstract_inverted_index.Notably, | 214 |
| abstract_inverted_index.advanced | 22 |
| abstract_inverted_index.aligning | 273 |
| abstract_inverted_index.analyses | 281 |
| abstract_inverted_index.analysis | 196, 264 |
| abstract_inverted_index.approach | 35, 296 |
| abstract_inverted_index.compared | 308 |
| abstract_inverted_index.diagonal | 288 |
| abstract_inverted_index.distinct | 40 |
| abstract_inverted_index.employed | 78 |
| abstract_inverted_index.methods. | 311 |
| abstract_inverted_index.proposed | 29, 169, 219 |
| abstract_inverted_index.revealed | 266 |
| abstract_inverted_index.schemes, | 171 |
| abstract_inverted_index.security | 305 |
| abstract_inverted_index.sequence | 49 |
| abstract_inverted_index.superior | 304 |
| abstract_inverted_index.Logistic, | 73 |
| abstract_inverted_index.advances, | 3 |
| abstract_inverted_index.comparing | 183 |
| abstract_inverted_index.confusion | 165 |
| abstract_inverted_index.different | 228 |
| abstract_inverted_index.employing | 217 |
| abstract_inverted_index.encrypted | 86 |
| abstract_inverted_index.evaluated | 179 |
| abstract_inverted_index.exhibited | 240 |
| abstract_inverted_index.extensive | 181 |
| abstract_inverted_index.generated | 143 |
| abstract_inverted_index.including | 163 |
| abstract_inverted_index.indicated | 282 |
| abstract_inverted_index.integrity | 18 |
| abstract_inverted_index.processes | 162 |
| abstract_inverted_index.rendering | 247 |
| abstract_inverted_index.resulting | 150 |
| abstract_inverted_index.sensitive | 5 |
| abstract_inverted_index.sequences | 142, 151 |
| abstract_inverted_index.showcased | 200 |
| abstract_inverted_index.standards | 208 |
| abstract_inverted_index.usernames | 45 |
| abstract_inverted_index.vertical, | 286 |
| abstract_inverted_index.Chebyshev, | 72 |
| abstract_inverted_index.Initially, | 62 |
| abstract_inverted_index.algorithm. | 189 |
| abstract_inverted_index.algorithms | 24 |
| abstract_inverted_index.decryption | 248 |
| abstract_inverted_index.diffusion. | 167 |
| abstract_inverted_index.encrypted. | 55 |
| abstract_inverted_index.encryption | 23, 30, 129, 156, 170, 295 |
| abstract_inverted_index.especially | 11 |
| abstract_inverted_index.individual | 67 |
| abstract_inverted_index.infeasible | 249 |
| abstract_inverted_index.innovative | 294 |
| abstract_inverted_index.introduces | 32, 292 |
| abstract_inverted_index.multimedia | 9 |
| abstract_inverted_index.necessary. | 27 |
| abstract_inverted_index.procedures | 191 |
| abstract_inverted_index.rigorously | 178 |
| abstract_inverted_index.robustness | 193 |
| abstract_inverted_index.segmenting | 97 |
| abstract_inverted_index.subdivided | 117 |
| abstract_inverted_index.uniformity | 283 |
| abstract_inverted_index.validation | 265 |
| abstract_inverted_index.algorithms' | 276 |
| abstract_inverted_index.capitalizes | 37, 298 |
| abstract_inverted_index.correlation | 263 |
| abstract_inverted_index.directions. | 289 |
| abstract_inverted_index.encompasses | 58 |
| abstract_inverted_index.encryption. | 80 |
| abstract_inverted_index.fundamental | 155 |
| abstract_inverted_index.horizontal, | 285 |
| abstract_inverted_index.methodology | 57 |
| abstract_inverted_index.performance | 185, 307 |
| abstract_inverted_index.significant | 242 |
| abstract_inverted_index.statistical | 195 |
| abstract_inverted_index.strategies. | 61 |
| abstract_inverted_index.traditional | 188, 275 |
| abstract_inverted_index.astronomical | 252 |
| abstract_inverted_index.constituents | 114 |
| abstract_inverted_index.conventional | 310 |
| abstract_inverted_index.demonstrated | 192 |
| abstract_inverted_index.demonstrates | 303 |
| abstract_inverted_index.differential | 197 |
| abstract_inverted_index.distribution | 280 |
| abstract_inverted_index.information, | 6 |
| abstract_inverted_index.outperformed | 222 |
| abstract_inverted_index.particularly | 231 |
| abstract_inverted_index.simulations, | 182 |
| abstract_inverted_index.Additionally, | 278 |
| abstract_inverted_index.approximating | 206 |
| abstract_inverted_index.authenticated | 44 |
| abstract_inverted_index.constituents, | 108 |
| abstract_inverted_index.respectively. | 213 |
| abstract_inverted_index.technological | 2 |
| abstract_inverted_index.user-specific | 300 |
| abstract_inverted_index.characteristics | 41, 301 |
| abstract_inverted_index.<title>Abstract</title> | 0 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5024644141 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 5 |
| corresponding_institution_ids | https://openalex.org/I81556334 |
| citation_normalized_percentile.value | 0.15681456 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |