{"id":"https://openalex.org/W4386736866","doi":"https://doi.org/10.1109/access.2023.3315658","title":"Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques","display_name":"Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4386736866","doi":"https://doi.org/10.1109/access.2023.3315658"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3315658","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3315658","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10251498.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10251498.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071129319","display_name":"Mohammed Es-Sabry","orcid":null},"institutions":[{"id":"https://openalex.org/I81605866","display_name":"Sidi Mohamed Ben Abdellah University","ror":"https://ror.org/04efg9a07","country_code":"MA","type":"education","lineage":["https://openalex.org/I81605866"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Mohammed Es-Sabry","raw_affiliation_strings":["Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco","LISAC, Department of Computer Science, Faculty of Science, Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco"],"raw_orcid":"https://orcid.org/0000-0001-7807-6855","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]},{"raw_affiliation_string":"LISAC, Department of Computer Science, Faculty of Science, Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063786906","display_name":"Nabil El Akkad","orcid":"https://orcid.org/0000-0003-0277-8003"},"institutions":[{"id":"https://openalex.org/I81605866","display_name":"Sidi Mohamed Ben Abdellah University","ror":"https://ror.org/04efg9a07","country_code":"MA","type":"education","lineage":["https://openalex.org/I81605866"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Nabil El Akkad","raw_affiliation_strings":["Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco","LISAC, Department of Computer Science, Faculty of Science, Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco","Systems and Applications, ENSA of Fez, LESA, Laboratory of Engineering, Sidi Mohamed Ben Abdellah University, Fez, Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]},{"raw_affiliation_string":"LISAC, Department of Computer Science, Faculty of Science, Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]},{"raw_affiliation_string":"Systems and Applications, ENSA of Fez, LESA, Laboratory of Engineering, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009652332","display_name":"Mostafa Merras","orcid":"https://orcid.org/0000-0002-3020-726X"},"institutions":[{"id":"https://openalex.org/I81605866","display_name":"Sidi Mohamed Ben Abdellah University","ror":"https://ror.org/04efg9a07","country_code":"MA","type":"education","lineage":["https://openalex.org/I81605866"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mostafa Merras","raw_affiliation_strings":["Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco","LISAC, Department of Computer Science, Faculty of Science, Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco"],"raw_orcid":"https://orcid.org/0000-0002-3020-726X","affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]},{"raw_affiliation_string":"LISAC, Department of Computer Science, Faculty of Science, Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052434186","display_name":"Khalid Satori","orcid":"https://orcid.org/0000-0001-6055-4169"},"institutions":[{"id":"https://openalex.org/I81605866","display_name":"Sidi Mohamed Ben Abdellah University","ror":"https://ror.org/04efg9a07","country_code":"MA","type":"education","lineage":["https://openalex.org/I81605866"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Khalid Satori","raw_affiliation_strings":["Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco","LISAC, Department of Computer Science, Faculty of Science, Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Science Dhar El Mahraz, LISAC, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]},{"raw_affiliation_string":"LISAC, Department of Computer Science, Faculty of Science, Dhar El Mahraz, Sidi Mohamed Ben Abdellah University, Fez, Morocco","institution_ids":["https://openalex.org/I81605866"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006443274","display_name":"Walid El\u2010Shafai","orcid":"https://orcid.org/0000-0001-7509-2120"},"institutions":[{"id":"https://openalex.org/I63601056","display_name":"Menoufia University","ror":"https://ror.org/05sjrb944","country_code":"EG","type":"education","lineage":["https://openalex.org/I63601056"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Walid El-Shafai","raw_affiliation_strings":["Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt"],"raw_orcid":"https://orcid.org/0000-0001-7509-2120","affiliations":[{"raw_affiliation_string":"Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt","institution_ids":["https://openalex.org/I63601056"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086504559","display_name":"Torki Altameem","orcid":"https://orcid.org/0000-0003-0598-6406"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Torki Altameem","raw_affiliation_strings":["Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia","Computer Science Department, Community College, King Saud University, 11451, 95, Riyadh, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Computer Science Department, Community College, King Saud University, 11451, 95, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068882573","display_name":"Mostafa M. Fouda","orcid":"https://orcid.org/0000-0003-1790-8640"},"institutions":[{"id":"https://openalex.org/I106969075","display_name":"Idaho State University","ror":"https://ror.org/0162z8b04","country_code":"US","type":"education","lineage":["https://openalex.org/I106969075"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa M. Fouda","raw_affiliation_strings":["Department of Electrical and Computer Engineering, College of Science and Engineering, Idaho State University, Pocatello, ID, USA"],"raw_orcid":"https://orcid.org/0000-0003-1790-8640","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, College of Science and Engineering, Idaho State University, Pocatello, ID, USA","institution_ids":["https://openalex.org/I106969075"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5071129319"],"corresponding_institution_ids":["https://openalex.org/I81605866"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.9214,"has_fulltext":true,"cited_by_count":34,"citation_normalized_percentile":{"value":0.95165033,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"11","issue":null,"first_page":"100856","last_page":"100878"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9717000126838684,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9703999757766724,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8582969903945923},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.799785852432251},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.6523928046226501},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.6411733627319336},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.578014612197876},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.5400680899620056},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.5337062478065491},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5305559635162354},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5120454430580139},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4579033851623535},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44488105177879333},{"id":"https://openalex.org/keywords/relation","display_name":"Relation (database)","score":0.42281392216682434},{"id":"https://openalex.org/keywords/disk-encryption-theory","display_name":"Disk encryption theory","score":0.41535085439682007},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4034920334815979},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32141944766044617},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.14862465858459473},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.10936370491981506},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.10502892732620239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09835958480834961}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8582969903945923},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.799785852432251},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.6523928046226501},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.6411733627319336},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.578014612197876},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.5400680899620056},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.5337062478065491},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5305559635162354},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5120454430580139},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4579033851623535},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44488105177879333},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.42281392216682434},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.41535085439682007},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4034920334815979},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32141944766044617},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.14862465858459473},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.10936370491981506},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10502892732620239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09835958480834961}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3315658","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3315658","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10251498.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a5d49eca045b41f091f85e50f7a7e704","is_oa":true,"landing_page_url":"https://doaj.org/article/a5d49eca045b41f091f85e50f7a7e704","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 100856-100878 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3315658","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3315658","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10251498.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G7248596679","display_name":null,"funder_award_id":"RSP2023R503","funder_id":"https://openalex.org/F4320321145","funder_display_name":"King Saud University"}],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386736866.pdf","grobid_xml":"https://content.openalex.org/works/W4386736866.grobid-xml"},"referenced_works_count":38,"referenced_works":["https://openalex.org/W2010065947","https://openalex.org/W2783134310","https://openalex.org/W2800336050","https://openalex.org/W2885625391","https://openalex.org/W2924833998","https://openalex.org/W2955259290","https://openalex.org/W3015417882","https://openalex.org/W3015702131","https://openalex.org/W3025802515","https://openalex.org/W3088041972","https://openalex.org/W3118996927","https://openalex.org/W3133218597","https://openalex.org/W3174323879","https://openalex.org/W3188020797","https://openalex.org/W3214812056","https://openalex.org/W4210663935","https://openalex.org/W4221087777","https://openalex.org/W4229045184","https://openalex.org/W4243966183","https://openalex.org/W4281631418","https://openalex.org/W4285116268","https://openalex.org/W4285200823","https://openalex.org/W4285205601","https://openalex.org/W4292603192","https://openalex.org/W4306649840","https://openalex.org/W4309437595","https://openalex.org/W4310553589","https://openalex.org/W4312222551","https://openalex.org/W4312619979","https://openalex.org/W4313471479","https://openalex.org/W4313579021","https://openalex.org/W4322505681","https://openalex.org/W4327905235","https://openalex.org/W4328103222","https://openalex.org/W4328118242","https://openalex.org/W4353069602","https://openalex.org/W4361026482","https://openalex.org/W4363675256"],"related_works":["https://openalex.org/W1972971222","https://openalex.org/W2357677916","https://openalex.org/W2079637080","https://openalex.org/W2623284116","https://openalex.org/W2353983817","https://openalex.org/W2383966178","https://openalex.org/W2027741953","https://openalex.org/W4388488734","https://openalex.org/W2354283558","https://openalex.org/W2522187453"],"abstract_inverted_index":{"With":[0],"the":[1,66,82,117,124],"growing":[2],"need":[3],"for":[4,25,74],"secure":[5],"multimedia":[6],"data":[7],"transmission,":[8],"image":[9,44,130],"encryption":[10,18,45,131],"has":[11,71],"become":[12],"an":[13,49,62],"important":[14],"research":[15],"area.":[16],"Traditional":[17],"algorithms":[19],"like":[20],"RSA":[21],"are":[22],"not":[23],"well-suited":[24],"this":[26],"purpose,":[27],"leading":[28],"researchers":[29],"to":[30,93,115],"explore":[31],"new":[32,43],"approaches":[33],"such":[34],"as":[35,53],"chaotic":[36,76],"maps.":[37],"The":[38,57,120],"present":[39],"study":[40],"introduces":[41],"a":[42,54],"algorithm":[46],"that":[47,123],"utilizes":[48],"improved":[50,58,79],"Rossler":[51,59,68],"system":[52,60],"keystream":[55],"generator.":[56],"is":[61],"enhanced":[63],"version":[64],"of":[65,97,135],"original":[67],"system,":[69],"which":[70],"been":[72],"optimized":[73],"better":[75],"behavior":[77],"and":[78,109,138],"security.":[80,98],"For":[81],"confusion":[83],"part,":[84],"we":[85],"combine":[86],"DNA":[87],"encoding":[88],"techniques":[89],"with":[90],"Baker":[91],"maps":[92],"ensure":[94],"high":[95],"levels":[96],"Various":[99],"performance":[100],"metrics,":[101],"including":[102],"NPCR,":[103],"UACI,":[104],"correlation":[105],"coefficient,":[106],"histogram":[107],"analysis,":[108,112],"key":[110],"sensitivity":[111],"were":[113],"used":[114],"evaluate":[116],"proposed":[118,125],"scheme.":[119],"results":[121],"showed":[122],"method":[126],"surpassed":[127],"several":[128],"existing":[129],"methods":[132],"in":[133],"terms":[134],"both":[136],"security":[137],"efficiency.":[139]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
