{"id":"https://openalex.org/W2111541188","doi":"https://doi.org/10.1109/securecomm.2005.39","title":"Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption","display_name":"Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption","publication_year":2006,"publication_date":"2006-03-22","ids":{"openalex":"https://openalex.org/W2111541188","doi":"https://doi.org/10.1109/securecomm.2005.39","mag":"2111541188"},"language":"en","primary_location":{"id":"doi:10.1109/securecomm.2005.39","is_oa":false,"landing_page_url":"https://doi.org/10.1109/securecomm.2005.39","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080309085","display_name":"Daniel Socek","orcid":null},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"D. Socek","raw_affiliation_strings":["Center for Cryptology and Information Security and Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL, USA","Florida Atlantic University #TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Cryptology and Information Security and Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL, USA","institution_ids":["https://openalex.org/I63772739"]},{"raw_affiliation_string":"Florida Atlantic University #TAB#","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100745576","display_name":"Shujun Li","orcid":"https://orcid.org/0000-0001-5628-7328"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Shujun Li","raw_affiliation_strings":["Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong, China","City University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong, China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"City University of Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044624369","display_name":"Spyros S. Magliveras","orcid":null},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S.S. Magliveras","raw_affiliation_strings":["Center for Cryptology and Information Security, USA","Florida Atlantic University #TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Cryptology and Information Security, USA","institution_ids":[]},{"raw_affiliation_string":"Florida Atlantic University #TAB#","institution_ids":["https://openalex.org/I63772739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057260089","display_name":"Borko Furht","orcid":"https://orcid.org/0000-0002-3584-9659"},"institutions":[{"id":"https://openalex.org/I63772739","display_name":"Florida Atlantic University","ror":"https://ror.org/05p8w6387","country_code":"US","type":"education","lineage":["https://openalex.org/I63772739"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"B. Furht","raw_affiliation_strings":["Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL, USA","Florida Atlantic University #TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL, USA","institution_ids":["https://openalex.org/I63772739"]},{"raw_affiliation_string":"Florida Atlantic University #TAB#","institution_ids":["https://openalex.org/I63772739"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080309085"],"corresponding_institution_ids":["https://openalex.org/I63772739"],"apc_list":null,"apc_paid":null,"fwci":1.5805,"has_fulltext":false,"cited_by_count":46,"citation_normalized_percentile":{"value":0.84126678,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"406","last_page":"407"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6934400796890259},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6887248754501343},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6801429390907288},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.670361340045929},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.659761905670166},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6380773186683655},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.592090904712677},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5631276369094849},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5246670246124268},{"id":"https://openalex.org/keywords/piecewise-linear-function","display_name":"Piecewise linear function","score":0.49078235030174255},{"id":"https://openalex.org/keywords/logistic-map","display_name":"Logistic map","score":0.4705762267112732},{"id":"https://openalex.org/keywords/key-size","display_name":"Key size","score":0.46104830503463745},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.4444011151790619},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.43844446539878845},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.436509907245636},{"id":"https://openalex.org/keywords/chaotic-map","display_name":"Chaotic map","score":0.4222114682197571},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.41002222895622253},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23496660590171814},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21591481566429138},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19424927234649658},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10013231635093689}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6934400796890259},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6887248754501343},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6801429390907288},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.670361340045929},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.659761905670166},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6380773186683655},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.592090904712677},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5631276369094849},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5246670246124268},{"id":"https://openalex.org/C17095337","wikidata":"https://www.wikidata.org/wiki/Q2375229","display_name":"Piecewise linear function","level":2,"score":0.49078235030174255},{"id":"https://openalex.org/C205330730","wikidata":"https://www.wikidata.org/wiki/Q587182","display_name":"Logistic map","level":3,"score":0.4705762267112732},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.46104830503463745},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.4444011151790619},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.43844446539878845},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.436509907245636},{"id":"https://openalex.org/C2983793180","wikidata":"https://www.wikidata.org/wiki/Q166314","display_name":"Chaotic map","level":3,"score":0.4222114682197571},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.41002222895622253},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23496660590171814},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21591481566429138},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19424927234649658},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10013231635093689},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/securecomm.2005.39","is_oa":false,"landing_page_url":"https://doi.org/10.1109/securecomm.2005.39","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)","raw_type":"proceedings-article"},{"id":"pmh:oai:alma.44SUR_INST:11139373300002346","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.304.8962","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.8962","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.hooklee.com/Papers/SecureComm2005.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1599779438","https://openalex.org/W1966461245","https://openalex.org/W2015304581","https://openalex.org/W2115605660","https://openalex.org/W2170926081","https://openalex.org/W2499372985","https://openalex.org/W4211206866","https://openalex.org/W6685531302"],"related_works":["https://openalex.org/W1972971222","https://openalex.org/W2360233907","https://openalex.org/W1868030464","https://openalex.org/W2025853315","https://openalex.org/W4238213776","https://openalex.org/W2379538499","https://openalex.org/W4361804166","https://openalex.org/W2919394879","https://openalex.org/W1981949417","https://openalex.org/W1844185968"],"abstract_inverted_index":{"A":[0],"recently":[1],"proposed":[2],"Chaotic-Key":[3],"Based":[4],"Algorithm":[5],"(CKBA)":[6],"has":[7,87],"been":[8],"shown":[9],"to":[10,14,37,44,55,70],"be":[11],"unavoidably":[12],"susceptible":[13],"chosen/known-plaintext":[15],"attacks":[16,79],"and":[17,58,66,91],"ciphertext-only":[18],"attacks.":[19],"In":[20],"this":[21],"paper":[22],"we":[23,30,50,60],"enhance":[24],"the":[25,32,46,52,68,77],"CKBA":[26],"algorithm":[27],"three-fold:":[28],"1)":[29],"change":[31],"1-D":[33],"chaotic":[34,41],"Logistic":[35],"map":[36,42],"a":[38],"piecewise":[39],"linear":[40],"(PWLCM)":[43],"improve":[45],"balance":[47],"property,":[48],"2)":[49],"increase":[51],"key":[53],"size":[54],"128":[56],"bits,":[57],"3)":[59],"add":[61],"two":[62],"more":[63],"cryptographic":[64],"primitives":[65],"extend":[67],"scheme":[69],"operate":[71],"on":[72],"multiple":[73],"rounds":[74],"so":[75],"that":[76],"chosen/knownplaintext":[78],"are":[80],"no":[81],"longer":[82],"possible.":[83],"The":[84],"new":[85],"cipher":[86],"much":[88],"stronger":[89],"security":[90],"its":[92],"performance":[93],"characteristics":[94],"remain":[95],"very":[96],"good.":[97]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":6}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
