Systematic Survey on Visually Meaningful Image Encryption Techniques Article Swipe
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.1109/access.2022.3203173
Due to advancements in technology, digital images are widely used in various applications like medical field, military communication, remote sensing, etc. These images may contain sensitive and confidential information. Therefore, images are required to be protected from unauthorized access. Many image protection techniques have been proposed in past years. The most common technique to protect the images is encryption. In this technique, a secret key and an encryption algorithm are used to change the plain image into an encrypted image. The encrypted image looks like a noisy image and can easily attract the attacker’s attention. If an image gets captured and stacked, sensitive information can be revealed. In this regard, Visually Meaningful Encrypted Image (VMEI) technique is developed, which initially encrypts the original image and then hides it into a reference image. The final encrypted image looks like a normal image. Hence, the VMEI technique provides more security as compared to simple image encryption techniques. Therefore, a systematic survey of existing VMEI techniques is presented in this paper. The VMEI techniques are divided into different categories based on their characteristics. Moreover, this paper elaborates and investigates the improvements and analyses performed on VMEI techniques based on various evaluation parameters. These evaluation parameters are divided into different categories such as security attacks, encryption key attacks, quality analysis, and noise attacks. Finally, this paper discusses the potential applications and future challenges of VMEI techniques.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1109/access.2022.3203173
- https://ieeexplore.ieee.org/ielx7/6287639/6514899/09870781.pdf
- OA Status
- gold
- Cited By
- 14
- References
- 75
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4293811990
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4293811990Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1109/access.2022.3203173Digital Object Identifier
- Title
-
Systematic Survey on Visually Meaningful Image Encryption TechniquesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-01-01Full publication date if available
- Authors
-
Varsha Himthani, Vijaypal Singh Dhaka, Manjit Kaur, Dilbag Singh, Heung-No LeeList of authors in order
- Landing page
-
https://doi.org/10.1109/access.2022.3203173Publisher landing page
- PDF URL
-
https://ieeexplore.ieee.org/ielx7/6287639/6514899/09870781.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://ieeexplore.ieee.org/ielx7/6287639/6514899/09870781.pdfDirect OA link when available
- Concepts
-
Encryption, Computer science, Key (lock), Image (mathematics), Digital image, Computer vision, Image quality, Computer security, Artificial intelligence, Cryptography, Image processingTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
14Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 5, 2024: 5, 2023: 4Per-year citation counts (last 5 years)
- References (count)
-
75Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4293811990 |
|---|---|
| doi | https://doi.org/10.1109/access.2022.3203173 |
| ids.doi | https://doi.org/10.1109/access.2022.3203173 |
| ids.openalex | https://openalex.org/W4293811990 |
| fwci | 1.73308522 |
| type | article |
| title | Systematic Survey on Visually Meaningful Image Encryption Techniques |
| awards[0].id | https://openalex.org/G8166863427 |
| awards[0].funder_id | https://openalex.org/F4320322120 |
| awards[0].display_name | |
| awards[0].funder_award_id | NRF-2021R1A2B5B03002118 |
| awards[0].funder_display_name | National Research Foundation of Korea |
| biblio.issue | |
| biblio.volume | 10 |
| biblio.last_page | 98373 |
| biblio.first_page | 98360 |
| topics[0].id | https://openalex.org/T11017 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1707 |
| topics[0].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[0].display_name | Chaos-based Image/Signal Encryption |
| topics[1].id | https://openalex.org/T10388 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9998000264167786 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1707 |
| topics[1].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[1].display_name | Advanced Steganography and Watermarking Techniques |
| topics[2].id | https://openalex.org/T12357 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9957000017166138 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Digital Media Forensic Detection |
| funders[0].id | https://openalex.org/F4320322120 |
| funders[0].ror | https://ror.org/013aysd81 |
| funders[0].display_name | National Research Foundation of Korea |
| funders[1].id | https://openalex.org/F4320328359 |
| funders[1].ror | https://ror.org/01wpjm123 |
| funders[1].display_name | Ministry of Science and ICT, South Korea |
| is_xpac | False |
| apc_list.value | 1850 |
| apc_list.currency | USD |
| apc_list.value_usd | 1850 |
| apc_paid.value | 1850 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 1850 |
| concepts[0].id | https://openalex.org/C148730421 |
| concepts[0].level | 2 |
| concepts[0].score | 0.9147785305976868 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q141090 |
| concepts[0].display_name | Encryption |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.8010480403900146 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C26517878 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5501540303230286 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[2].display_name | Key (lock) |
| concepts[3].id | https://openalex.org/C115961682 |
| concepts[3].level | 2 |
| concepts[3].score | 0.519836962223053 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q860623 |
| concepts[3].display_name | Image (mathematics) |
| concepts[4].id | https://openalex.org/C42781572 |
| concepts[4].level | 4 |
| concepts[4].score | 0.5164947509765625 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1250322 |
| concepts[4].display_name | Digital image |
| concepts[5].id | https://openalex.org/C31972630 |
| concepts[5].level | 1 |
| concepts[5].score | 0.5096139907836914 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q844240 |
| concepts[5].display_name | Computer vision |
| concepts[6].id | https://openalex.org/C55020928 |
| concepts[6].level | 3 |
| concepts[6].score | 0.44304874539375305 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3813865 |
| concepts[6].display_name | Image quality |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.43596720695495605 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C154945302 |
| concepts[8].level | 1 |
| concepts[8].score | 0.41431254148483276 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[8].display_name | Artificial intelligence |
| concepts[9].id | https://openalex.org/C178489894 |
| concepts[9].level | 2 |
| concepts[9].score | 0.4123097062110901 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[9].display_name | Cryptography |
| concepts[10].id | https://openalex.org/C9417928 |
| concepts[10].level | 3 |
| concepts[10].score | 0.3272022604942322 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q1070689 |
| concepts[10].display_name | Image processing |
| keywords[0].id | https://openalex.org/keywords/encryption |
| keywords[0].score | 0.9147785305976868 |
| keywords[0].display_name | Encryption |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.8010480403900146 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/key |
| keywords[2].score | 0.5501540303230286 |
| keywords[2].display_name | Key (lock) |
| keywords[3].id | https://openalex.org/keywords/image |
| keywords[3].score | 0.519836962223053 |
| keywords[3].display_name | Image (mathematics) |
| keywords[4].id | https://openalex.org/keywords/digital-image |
| keywords[4].score | 0.5164947509765625 |
| keywords[4].display_name | Digital image |
| keywords[5].id | https://openalex.org/keywords/computer-vision |
| keywords[5].score | 0.5096139907836914 |
| keywords[5].display_name | Computer vision |
| keywords[6].id | https://openalex.org/keywords/image-quality |
| keywords[6].score | 0.44304874539375305 |
| keywords[6].display_name | Image quality |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.43596720695495605 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[8].score | 0.41431254148483276 |
| keywords[8].display_name | Artificial intelligence |
| keywords[9].id | https://openalex.org/keywords/cryptography |
| keywords[9].score | 0.4123097062110901 |
| keywords[9].display_name | Cryptography |
| keywords[10].id | https://openalex.org/keywords/image-processing |
| keywords[10].score | 0.3272022604942322 |
| keywords[10].display_name | Image processing |
| language | en |
| locations[0].id | doi:10.1109/access.2022.3203173 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2485537415 |
| locations[0].source.issn | 2169-3536 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2169-3536 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | IEEE Access |
| locations[0].source.host_organization | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_name | Institute of Electrical and Electronics Engineers |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319808 |
| locations[0].source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09870781.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | IEEE Access |
| locations[0].landing_page_url | https://doi.org/10.1109/access.2022.3203173 |
| locations[1].id | pmh:oai:doaj.org/article:e630a7ecbe0d476e95984f98ba59b126 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | cc-by-sa |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | https://openalex.org/licenses/cc-by-sa |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | IEEE Access, Vol 10, Pp 98360-98373 (2022) |
| locations[1].landing_page_url | https://doaj.org/article/e630a7ecbe0d476e95984f98ba59b126 |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5042565707 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1382-8603 |
| authorships[0].author.display_name | Varsha Himthani |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I73779912 |
| authorships[0].affiliations[0].raw_affiliation_string | Computer and Communication Engineering, Manipal University Jaipur, Jaipur, Rajasthan, India |
| authorships[0].institutions[0].id | https://openalex.org/I73779912 |
| authorships[0].institutions[0].ror | https://ror.org/040h76494 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I73779912 |
| authorships[0].institutions[0].country_code | |
| authorships[0].institutions[0].display_name | Manipal University Jaipur |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Varsha Himthani |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Computer and Communication Engineering, Manipal University Jaipur, Jaipur, Rajasthan, India |
| authorships[1].author.id | https://openalex.org/A5108541054 |
| authorships[1].author.orcid | |
| authorships[1].author.display_name | Vijaypal Singh Dhaka |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I73779912 |
| authorships[1].affiliations[0].raw_affiliation_string | Computer and Communication Engineering, Manipal University Jaipur, Jaipur, Rajasthan, India |
| authorships[1].institutions[0].id | https://openalex.org/I73779912 |
| authorships[1].institutions[0].ror | https://ror.org/040h76494 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I73779912 |
| authorships[1].institutions[0].country_code | |
| authorships[1].institutions[0].display_name | Manipal University Jaipur |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Vijaypal Singh Dhaka |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Computer and Communication Engineering, Manipal University Jaipur, Jaipur, Rajasthan, India |
| authorships[2].author.id | https://openalex.org/A5101898959 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Manjit Kaur |
| authorships[2].countries | KR |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I39534123 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju, South Korea |
| authorships[2].institutions[0].id | https://openalex.org/I39534123 |
| authorships[2].institutions[0].ror | https://ror.org/024kbgz78 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I39534123 |
| authorships[2].institutions[0].country_code | KR |
| authorships[2].institutions[0].display_name | Gwangju Institute of Science and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Manjit Kaur |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju, South Korea |
| authorships[3].author.id | https://openalex.org/A5013150230 |
| authorships[3].author.orcid | https://orcid.org/0000-0001-6475-4491 |
| authorships[3].author.display_name | Dilbag Singh |
| authorships[3].countries | KR |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I39534123 |
| authorships[3].affiliations[0].raw_affiliation_string | School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju, South Korea |
| authorships[3].institutions[0].id | https://openalex.org/I39534123 |
| authorships[3].institutions[0].ror | https://ror.org/024kbgz78 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I39534123 |
| authorships[3].institutions[0].country_code | KR |
| authorships[3].institutions[0].display_name | Gwangju Institute of Science and Technology |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Dilbag Singh |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju, South Korea |
| authorships[4].author.id | https://openalex.org/A5034347136 |
| authorships[4].author.orcid | https://orcid.org/0000-0001-8528-5778 |
| authorships[4].author.display_name | Heung-No Lee |
| authorships[4].countries | KR |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I39534123 |
| authorships[4].affiliations[0].raw_affiliation_string | School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju, South Korea |
| authorships[4].institutions[0].id | https://openalex.org/I39534123 |
| authorships[4].institutions[0].ror | https://ror.org/024kbgz78 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I39534123 |
| authorships[4].institutions[0].country_code | KR |
| authorships[4].institutions[0].display_name | Gwangju Institute of Science and Technology |
| authorships[4].author_position | last |
| authorships[4].raw_author_name | Heung-No Lee |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | School of Electrical Engineering and Computer Science, Gwangju Institute of Science and Technology, Gwangju, South Korea |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09870781.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Systematic Survey on Visually Meaningful Image Encryption Techniques |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11017 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1707 |
| primary_topic.subfield.display_name | Computer Vision and Pattern Recognition |
| primary_topic.display_name | Chaos-based Image/Signal Encryption |
| related_works | https://openalex.org/W2104599943, https://openalex.org/W2387112055, https://openalex.org/W2391464897, https://openalex.org/W2376168677, https://openalex.org/W2025536124, https://openalex.org/W4387763778, https://openalex.org/W2368473326, https://openalex.org/W2358057490, https://openalex.org/W2368647523, https://openalex.org/W3198279703 |
| cited_by_count | 14 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 5 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 5 |
| counts_by_year[2].year | 2023 |
| counts_by_year[2].cited_by_count | 4 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1109/access.2022.3203173 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2485537415 |
| best_oa_location.source.issn | 2169-3536 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2169-3536 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | IEEE Access |
| best_oa_location.source.host_organization | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| best_oa_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09870781.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | IEEE Access |
| best_oa_location.landing_page_url | https://doi.org/10.1109/access.2022.3203173 |
| primary_location.id | doi:10.1109/access.2022.3203173 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2485537415 |
| primary_location.source.issn | 2169-3536 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2169-3536 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | IEEE Access |
| primary_location.source.host_organization | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_name | Institute of Electrical and Electronics Engineers |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319808 |
| primary_location.source.host_organization_lineage_names | Institute of Electrical and Electronics Engineers |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://ieeexplore.ieee.org/ielx7/6287639/6514899/09870781.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | IEEE Access |
| primary_location.landing_page_url | https://doi.org/10.1109/access.2022.3203173 |
| publication_date | 2022-01-01 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W2151133447, https://openalex.org/W6799864793, https://openalex.org/W2121358906, https://openalex.org/W4226061600, https://openalex.org/W6679164396, https://openalex.org/W2768757711, https://openalex.org/W2974992188, https://openalex.org/W2895660505, https://openalex.org/W6802684604, https://openalex.org/W2799561125, https://openalex.org/W2913797747, https://openalex.org/W2483923130, https://openalex.org/W2551769760, https://openalex.org/W2947173686, https://openalex.org/W2969815465, https://openalex.org/W2952974476, https://openalex.org/W4220810043, https://openalex.org/W4281928774, https://openalex.org/W2987762782, https://openalex.org/W3132391173, https://openalex.org/W3012231202, https://openalex.org/W2352616222, https://openalex.org/W2133665775, https://openalex.org/W3127900952, https://openalex.org/W6730658852, https://openalex.org/W2521732745, https://openalex.org/W2056185885, https://openalex.org/W2025393039, https://openalex.org/W2593858131, https://openalex.org/W3006346345, https://openalex.org/W2765221833, https://openalex.org/W3000167287, https://openalex.org/W2790038097, https://openalex.org/W2965728763, https://openalex.org/W2735389800, https://openalex.org/W4205148863, https://openalex.org/W4205109001, https://openalex.org/W4225399289, https://openalex.org/W3194458288, https://openalex.org/W2369298470, https://openalex.org/W3002913619, https://openalex.org/W2995924053, https://openalex.org/W2789184008, https://openalex.org/W2891791183, https://openalex.org/W2105145864, https://openalex.org/W2992483795, https://openalex.org/W2592206357, https://openalex.org/W1987570579, https://openalex.org/W2901602009, https://openalex.org/W6685843332, https://openalex.org/W6757227759, https://openalex.org/W2537700529, https://openalex.org/W2015710702, https://openalex.org/W2507521523, https://openalex.org/W3122103149, https://openalex.org/W844411675, https://openalex.org/W2330191679, https://openalex.org/W3129675108, https://openalex.org/W3093923775, https://openalex.org/W3176844538, https://openalex.org/W3048752794, https://openalex.org/W3092747493, https://openalex.org/W3123361482, https://openalex.org/W3004735683, https://openalex.org/W3009587941, https://openalex.org/W3015061318, https://openalex.org/W2989787958, https://openalex.org/W1610673435, https://openalex.org/W2559727410, https://openalex.org/W2904771195, https://openalex.org/W3187337342, https://openalex.org/W2182008131, https://openalex.org/W1533162639, https://openalex.org/W2129812098, https://openalex.org/W3209565286 |
| referenced_works_count | 75 |
| abstract_inverted_index.a | 62, 85, 129, 138, 156 |
| abstract_inverted_index.If | 95 |
| abstract_inverted_index.In | 59, 107 |
| abstract_inverted_index.an | 66, 77, 96 |
| abstract_inverted_index.as | 148, 208 |
| abstract_inverted_index.be | 34, 105 |
| abstract_inverted_index.in | 3, 10, 46, 165 |
| abstract_inverted_index.is | 57, 116, 163 |
| abstract_inverted_index.it | 127 |
| abstract_inverted_index.of | 159, 229 |
| abstract_inverted_index.on | 177, 191, 195 |
| abstract_inverted_index.to | 1, 33, 53, 71, 150 |
| abstract_inverted_index.Due | 0 |
| abstract_inverted_index.The | 49, 80, 132, 168 |
| abstract_inverted_index.and | 26, 65, 88, 100, 124, 184, 188, 216, 226 |
| abstract_inverted_index.are | 7, 31, 69, 171, 202 |
| abstract_inverted_index.can | 89, 104 |
| abstract_inverted_index.key | 64, 212 |
| abstract_inverted_index.may | 23 |
| abstract_inverted_index.the | 55, 73, 92, 121, 142, 186, 223 |
| abstract_inverted_index.Many | 39 |
| abstract_inverted_index.VMEI | 143, 161, 169, 192, 230 |
| abstract_inverted_index.been | 44 |
| abstract_inverted_index.etc. | 20 |
| abstract_inverted_index.from | 36 |
| abstract_inverted_index.gets | 98 |
| abstract_inverted_index.have | 43 |
| abstract_inverted_index.into | 76, 128, 173, 204 |
| abstract_inverted_index.like | 13, 84, 137 |
| abstract_inverted_index.more | 146 |
| abstract_inverted_index.most | 50 |
| abstract_inverted_index.past | 47 |
| abstract_inverted_index.such | 207 |
| abstract_inverted_index.then | 125 |
| abstract_inverted_index.this | 60, 108, 166, 181, 220 |
| abstract_inverted_index.used | 9, 70 |
| abstract_inverted_index.Image | 113 |
| abstract_inverted_index.These | 21, 199 |
| abstract_inverted_index.based | 176, 194 |
| abstract_inverted_index.final | 133 |
| abstract_inverted_index.hides | 126 |
| abstract_inverted_index.image | 40, 75, 82, 87, 97, 123, 135, 152 |
| abstract_inverted_index.looks | 83, 136 |
| abstract_inverted_index.noise | 217 |
| abstract_inverted_index.noisy | 86 |
| abstract_inverted_index.paper | 182, 221 |
| abstract_inverted_index.plain | 74 |
| abstract_inverted_index.their | 178 |
| abstract_inverted_index.which | 118 |
| abstract_inverted_index.(VMEI) | 114 |
| abstract_inverted_index.Hence, | 141 |
| abstract_inverted_index.change | 72 |
| abstract_inverted_index.common | 51 |
| abstract_inverted_index.easily | 90 |
| abstract_inverted_index.field, | 15 |
| abstract_inverted_index.future | 227 |
| abstract_inverted_index.image. | 79, 131, 140 |
| abstract_inverted_index.images | 6, 22, 30, 56 |
| abstract_inverted_index.normal | 139 |
| abstract_inverted_index.paper. | 167 |
| abstract_inverted_index.remote | 18 |
| abstract_inverted_index.secret | 63 |
| abstract_inverted_index.simple | 151 |
| abstract_inverted_index.survey | 158 |
| abstract_inverted_index.widely | 8 |
| abstract_inverted_index.years. | 48 |
| abstract_inverted_index.access. | 38 |
| abstract_inverted_index.attract | 91 |
| abstract_inverted_index.contain | 24 |
| abstract_inverted_index.digital | 5 |
| abstract_inverted_index.divided | 172, 203 |
| abstract_inverted_index.medical | 14 |
| abstract_inverted_index.protect | 54 |
| abstract_inverted_index.quality | 214 |
| abstract_inverted_index.regard, | 109 |
| abstract_inverted_index.various | 11, 196 |
| abstract_inverted_index.Finally, | 219 |
| abstract_inverted_index.Visually | 110 |
| abstract_inverted_index.analyses | 189 |
| abstract_inverted_index.attacks, | 210, 213 |
| abstract_inverted_index.attacks. | 218 |
| abstract_inverted_index.captured | 99 |
| abstract_inverted_index.compared | 149 |
| abstract_inverted_index.encrypts | 120 |
| abstract_inverted_index.existing | 160 |
| abstract_inverted_index.military | 16 |
| abstract_inverted_index.original | 122 |
| abstract_inverted_index.proposed | 45 |
| abstract_inverted_index.provides | 145 |
| abstract_inverted_index.required | 32 |
| abstract_inverted_index.security | 147, 209 |
| abstract_inverted_index.sensing, | 19 |
| abstract_inverted_index.stacked, | 101 |
| abstract_inverted_index.Encrypted | 112 |
| abstract_inverted_index.Moreover, | 180 |
| abstract_inverted_index.algorithm | 68 |
| abstract_inverted_index.analysis, | 215 |
| abstract_inverted_index.different | 174, 205 |
| abstract_inverted_index.discusses | 222 |
| abstract_inverted_index.encrypted | 78, 81, 134 |
| abstract_inverted_index.initially | 119 |
| abstract_inverted_index.performed | 190 |
| abstract_inverted_index.potential | 224 |
| abstract_inverted_index.presented | 164 |
| abstract_inverted_index.protected | 35 |
| abstract_inverted_index.reference | 130 |
| abstract_inverted_index.revealed. | 106 |
| abstract_inverted_index.sensitive | 25, 102 |
| abstract_inverted_index.technique | 52, 115, 144 |
| abstract_inverted_index.Meaningful | 111 |
| abstract_inverted_index.Therefore, | 29, 155 |
| abstract_inverted_index.attention. | 94 |
| abstract_inverted_index.categories | 175, 206 |
| abstract_inverted_index.challenges | 228 |
| abstract_inverted_index.developed, | 117 |
| abstract_inverted_index.elaborates | 183 |
| abstract_inverted_index.encryption | 67, 153, 211 |
| abstract_inverted_index.evaluation | 197, 200 |
| abstract_inverted_index.parameters | 201 |
| abstract_inverted_index.protection | 41 |
| abstract_inverted_index.systematic | 157 |
| abstract_inverted_index.technique, | 61 |
| abstract_inverted_index.techniques | 42, 162, 170, 193 |
| abstract_inverted_index.encryption. | 58 |
| abstract_inverted_index.information | 103 |
| abstract_inverted_index.parameters. | 198 |
| abstract_inverted_index.techniques. | 154, 231 |
| abstract_inverted_index.technology, | 4 |
| abstract_inverted_index.advancements | 2 |
| abstract_inverted_index.applications | 12, 225 |
| abstract_inverted_index.confidential | 27 |
| abstract_inverted_index.improvements | 187 |
| abstract_inverted_index.information. | 28 |
| abstract_inverted_index.investigates | 185 |
| abstract_inverted_index.unauthorized | 37 |
| abstract_inverted_index.communication, | 17 |
| abstract_inverted_index.characteristics. | 179 |
| abstract_inverted_index.attacker’s | 93 |
| cited_by_percentile_year.max | 98 |
| cited_by_percentile_year.min | 97 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 5 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.699999988079071 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.842413 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |