{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T16:31:02Z","timestamp":1769185862808,"version":"3.49.0"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T00:00:00Z","timestamp":1652054400000},"content-version":"vor","delay-in-days":128,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p>In terms of image processing, encryption plays the main role in the field of image transmission. Using one algorithm of deep learning (DL), such as neural network backpropagation, increases the performance of encryption by learning the parameters and weights derived from the image itself. The use of more than one layer in the neural network improves the performance of the algorithm. Also, in the process of image encryption, randomness is an important component, especially when used by smart learning methods. Deep neural networks are related to pixels used to manipulate position and value according to the predicted new value given from a variable neural system. It also includes messy encrypted images used via applying randomness and increasing the key space in addition to using the logistic and Henon map for complexity. The main goal of any encryption method is to increase the complexity of the encrypted image to be difficult or impossible to decrypt the image without the proposed key. One of the important measurements for image encryption is the histogram and how it can be uniformed by the proposed method. Variables of randomness are used as features for the deep learning system, with feedback during iteration. An ideal image processing encryption yields high messy images by keeping the quality. Experimental results showed the backpropagation algorithm achieved better results than other algorithms.<\/jats:p>","DOI":"10.1155\/2022\/5528416","type":"journal-article","created":{"date-parts":[[2022,5,9]],"date-time":"2022-05-09T18:35:37Z","timestamp":1652121337000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Improved Image Processing Based on Deep Learning Backpropagation Technique"],"prefix":"10.1155","volume":"2022","author":[{"given":"Yang","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0968-2418","authenticated-orcid":false,"given":"Yue","family":"Tian","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2022,5,9]]},"reference":[{"key":"e_1_2_8_1_2","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2017.080528"},{"key":"e_1_2_8_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2071-6_52"},{"key":"e_1_2_8_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41939-019-00049-y"},{"key":"e_1_2_8_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2890116"},{"key":"e_1_2_8_5_2","doi-asserted-by":"publisher","DOI":"10.3390\/e22091012"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.091"},{"key":"e_1_2_8_7_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2019.03.03"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103134"},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.012"},{"key":"e_1_2_8_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3012452"},{"key":"e_1_2_8_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2959031"},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2959017"},{"key":"e_1_2_8_13_2","doi-asserted-by":"crossref","unstructured":"SirichotedumrongW. MaekawaT. KinoshitaY. andKiyaH. Privacy-Preserving deep neural networks with pixel-based image encryption considering data augmentation in the encrypted domain Proceedings of the 2019 IEEE International Conference on Image Processing (ICIP) September 2019 Taipei Taiwan https:\/\/doi.org\/10.1109\/icip.2019.8804201.","DOI":"10.1109\/ICIP.2019.8804201"},{"key":"e_1_2_8_14_2","unstructured":"HeC. A deep learning based attack for the chaos-based image encryption 2019 https:\/\/arxiv.org\/abs\/1907.12245."},{"key":"e_1_2_8_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0978-0_13"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107911"},{"key":"e_1_2_8_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10437-z"},{"key":"e_1_2_8_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2020.153268"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2020.107748"},{"key":"e_1_2_8_20_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6662959"},{"key":"e_1_2_8_21_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6649605"},{"key":"e_1_2_8_22_2","article-title":"Human activities recognition via features extraction from skeleton","volume":"68","author":"Sulong G.","year":"2014","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_2_8_23_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6618245"},{"key":"e_1_2_8_24_2","article-title":"Recognition of human activities from still image using novel classifier","volume":"71","author":"Sulong G.","year":"2015","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.11113\/mjfas.v15n2.1146"},{"key":"e_1_2_8_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/tfuzz.2020.3012760"},{"key":"e_1_2_8_27_2","doi-asserted-by":"crossref","unstructured":"TanwarV. K. RamanB. RajputA. S. andBhargavaR. SecureDL: a privacy preserving deep learning model for image recognition over cloud 2021 https:\/\/doi.org\/10.36227\/techrxiv.13650059.","DOI":"10.36227\/techrxiv.13650059.v1"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/5528416","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/2022\/5528416","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/5528416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:15:26Z","timestamp":1769116526000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2022\/5528416"}},"subtitle":[],"editor":[{"given":"M. Irfan","family":"Uddin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1155\/2022\/5528416"],"URL":"https:\/\/doi.org\/10.1155\/2022\/5528416","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"2021-02-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5528416"}}