{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:48:45Z","timestamp":1743014925885,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031442155"},{"type":"electronic","value":"9783031442162"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44216-2_15","type":"book-chapter","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T07:02:58Z","timestamp":1695279778000},"page":"177-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Optimization and Parallelization of Two-Dimensional Zigzag Scanning on the Matrix"],"prefix":"10.1007","author":[{"given":"Ling","family":"Li","sequence":"first","affiliation":[]},{"given":"Yaobin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lijuan","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guangwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaolin","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,22]]},"reference":[{"issue":"9","key":"15_CR1","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1007\/s11760-019-01492-7","volume":"13","author":"A Messaoudi","year":"2019","unstructured":"Messaoudi, A., et al.: DCT-based color image compression algorithm using adaptive block scanning. SIViP 13(9), 1441\u20131449 (2019)","journal-title":"SIViP"},{"issue":"1","key":"15_CR2","first-page":"87","volume":"37","author":"P Zeng","year":"2016","unstructured":"Zeng, P., Zhang, X.: Classified detection algorithm of zero-quantized DCT coefficient for H.264\/AVC. J. Jiangxi Univ. Sci. Technol. 37(1), 87\u201394 (2016)","journal-title":"J. Jiangxi Univ. Sci. Technol."},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1007\/s11042-020-09654-3","volume":"80","author":"N Dolati","year":"2021","unstructured":"Dolati, N., Beheshti, S.A.A., Azagegan, H.: A selective encryption for H.264\/AVC videos based on scrambling. Multimed. Tools Appl. 80, 2319\u20132338 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"15_CR4","first-page":"3160","volume":"96","author":"E Hassan","year":"2018","unstructured":"Hassan, E., George, L., Mohammed, F.: Color image compression based on DCT, differential pulse coding modulation, and adaptive shift coding. J. Theor. Appl. Inf. Technol. 96(11), 3160\u20133171 (2018)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"1","key":"15_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.35741\/issn.0258-2724.55.1.1","volume":"55","author":"NH Salman","year":"2020","unstructured":"Salman, N.H., Rafea, S.: The arithmetic coding and hybrid discrete wavelet and cosine transform approaches in image compression. J. Southwest Jiaotong Univ. 55(1), 1\u20139 (2020)","journal-title":"J. Southwest Jiaotong Univ."},{"issue":"1","key":"15_CR6","doi-asserted-by":"publisher","first-page":"329","DOI":"10.24996\/ijs.2021.62.1.31","volume":"62","author":"RI Yousif","year":"2021","unstructured":"Yousif, R.I., Salman, N.H.: Image compression based on arithmetic coding algorithm. Iraqi J. Sci. 62(1), 329\u2013334 (2021)","journal-title":"Iraqi J. Sci."},{"issue":"5","key":"15_CR7","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.3390\/s21051817","volume":"21","author":"J Xue","year":"2021","unstructured":"Xue, J., et al.: 3D DCT based image compression method for the medical endoscopic application. Sensors 21(5), 1817 (2021)","journal-title":"Sensors"},{"key":"15_CR8","first-page":"1","volume":"7","author":"SS Li","year":"2021","unstructured":"Li, S.S., Zhao, L., Yang, N.: Medical image encryption based on 2D zigzag confusion and dynamic diffusion. Secur. Commun. Netw. 7, 1\u201323 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"140876","DOI":"10.1109\/ACCESS.2020.3012912","volume":"8","author":"A Qayyum","year":"2020","unstructured":"Qayyum, A., et al.: Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 8, 140876\u2013140895 (2020)","journal-title":"IEEE Access"},{"issue":"7","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e21070656","volume":"21","author":"P Ramasamy","year":"2019","unstructured":"Ramasamy, P., et al.: An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic-tent map. Entropy 21(7), 1\u201317 (2019)","journal-title":"Entropy"},{"key":"15_CR11","first-page":"383","volume":"4","author":"CC Wei","year":"2022","unstructured":"Wei, C.C., Boon, C.N., Ahmad, N.S., et al.: Modeling and simulation for transient thermal analyses using a voltage-in-current latency insertion method. J. Electron. Sci. Technol. 4, 383\u2013395 (2022)","journal-title":"J. Electron. Sci. Technol."},{"issue":"10","key":"15_CR12","doi-asserted-by":"publisher","first-page":"2350097","DOI":"10.1142\/S0217979223500972","volume":"37","author":"M Partohaghighi","year":"2022","unstructured":"Partohaghighi, M., et al.: Numerical simulation of the fractional diffusion equation. Int. J. Mod. Phys. B 37(10), 2350097 (2022)","journal-title":"Int. J. Mod. Phys. B"},{"key":"15_CR13","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1016\/j.matcom.2021.10.031","volume":"193","author":"AN Win","year":"2022","unstructured":"Win, A.N., Li, M.M.: Numerical method based on fiber bundle for solving Lyapunov matrix equation. Math. Comput. Simul. 193, 556\u2013566 (2022)","journal-title":"Math. Comput. Simul."},{"issue":"3","key":"15_CR14","first-page":"0311003","volume":"50","author":"J Su","year":"2021","unstructured":"Su, J., Zhai, A.P., Zhao, W.J., et al.: Hadamard single-pixel imaging using adaptive oblique zigzag sampling. Acta Photonica Sinica 50(3), 0311003 (2021)","journal-title":"Acta Photonica Sinica"},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"411","DOI":"10.37188\/OPE.20212902.0411","volume":"29","author":"Y Guo","year":"2021","unstructured":"Guo, Y., Wang, C.: Improved Zigzag traversal and Lorenz chaotic construction of hash. Opt. Precis. Eng. 29(2), 411\u2013419 (2021)","journal-title":"Opt. Precis. Eng."},{"issue":"10","key":"15_CR16","first-page":"323","volume":"36","author":"HP Wen","year":"2019","unstructured":"Wen, H.P.: Cracking a color image encryption scheme based on Zigzag transformation and chaos. Comput. Appl. Softw. 36(10), 323\u2013333 (2019)","journal-title":"Comput. Appl. Softw."},{"key":"15_CR17","unstructured":"CSDN, https:\/\/blog.csdn.net\/Shenpibaipao\/article\/details\/78877294. Last accessed 20 Mar 2023"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Wang, X., Chen, X.: An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos, Solitons and Fractals 147(C), 1\u201322 (2021)","DOI":"10.1016\/j.chaos.2021.110962"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Milosavljevic, N., Morozov, D., Skraba, P.: Zigzag Persistent Homology in Matrix Multiplication Time. In: Proceedings of the 27th annual symposium on computational geometry (SoGC\u201911), pp. 216\u2013225. ACM, New York, NY (2011)","DOI":"10.1145\/1998196.1998229"},{"issue":"15","key":"15_CR20","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.comcom.2021.10.040","volume":"182","author":"J Zheng","year":"2022","unstructured":"Zheng, J., et al.: ZM-CTC: covert timing channel construction method based on zigzag matrix. Comput. Commun. 182(15), 212\u2013222 (2022)","journal-title":"Comput. Commun."},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"10","DOI":"10.14445\/22312803\/IJCTT-V61P102","volume":"61","author":"M Rakotomalala","year":"2018","unstructured":"Rakotomalala, M., Rakotondraina, T.E., Rakotodramanana, S.: Contribution for improvement of image scrambling technique based on zigzag matrix reodering. Int. J. Comput. Trends Technol. 61(1), 10\u201317 (2018)","journal-title":"Int. J. Comput. Trends Technol."},{"key":"15_CR22","unstructured":"Thefreedictionary, Raster Scan. https:\/\/encyclopedia.thefreedictionary.com\/raster+scan. Last accessed 20 Mar 2023"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Kinoshita, J., et al.: Nonuniformity measurement of image resolution under effect of color speckle for raster-scan RGB laser mobile projector. IEICE Trans. Electr. E105\/C(2), 86\u201394 (2022)","DOI":"10.1587\/transele.2021DIP0001"},{"issue":"2","key":"15_CR24","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1016\/j.gltp.2021.08.055","volume":"2","author":"P Rashmi","year":"2021","unstructured":"Rashmi, P., Supriya, M.C.: Optimized Chaotic encrypted image based on continuous raster scan method. Global Transitions Proc. 2(2), 589\u2013593 (2021)","journal-title":"Global Transitions Proc."},{"issue":"1","key":"15_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105837","volume":"124","author":"X Chai","year":"2020","unstructured":"Chai, X., Wu, H., Gan, Z., et al.: An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding. Opt. Lasers Eng. 124(1), 105837 (2020)","journal-title":"Opt. Lasers Eng."},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.sigpro.2018.10.001","volume":"155","author":"H Wang","year":"2019","unstructured":"Wang, H., Xiao, D., Li, M., et al.: A visually secure image encryption scheme based on parallel compressive sensing. Signal Process. 155, 218\u2013232 (2019)","journal-title":"Signal Process."},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-319-03731-8_33","volume-title":"Advances in Multimedia Information Processing \u2013 PCM 2013","author":"T Cui","year":"2013","unstructured":"Cui, T., et al.: An efficient zigzag scanning and entropy coding architecture design. In: Huet, B., Ngo, C.-W., Tang, J., Zhou, Z.-H., Hauptmann, A.G., Yan, S. (eds.) PCM 2013. LNCS, vol. 8294, pp. 350\u2013358. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-319-03731-8_33"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-642-17829-0_24","volume-title":"Advances in Multimedia Modeling","author":"J-J Ding","year":"2011","unstructured":"Ding, J.-J., Lin, P., Chen, H.: Generalized zigzag scanning algorithm for non-square blocks. In: Lee, K.-T., Tsai, W.-H., Mark Liao, H.-Y., Chen, T., Hsieh, J.-W., Tseng, C.-C. (eds.) MMM 2011. LNCS, vol. 6524, pp. 252\u2013262. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-17829-0_24"},{"key":"15_CR29","unstructured":"Thefreedictionary, parallel processing. https:\/\/www.thefreedictionary.com\/parallel+processing. Last accessed 20 Mar 2023"},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Sur, S., Koop, M., Panda, D.: High-performance and scalable mpi over infiniband with reduced memory usage: an in-depth performance analysis. In: Proceedings of the 2006 ACM\/IEEE Conference on Supercomputing, pp. 105\u2013117. ACM, New York, NY (2006)","DOI":"10.1109\/SC.2006.34"},{"key":"15_CR31","unstructured":"Thefreedictionary, OpenMP. https:\/\/encyclopedia.thefreedictionary.com\/OpenMP. Last accessed 20 Mar 2023"},{"key":"15_CR32","unstructured":"Openmp.org, OpenMP Compilers & Tools. https:\/\/www.openmp.org\/resources\/openmp-compilers-tools\/. Last accessed 20 Mar 2023"},{"key":"15_CR33","unstructured":"An, D., et al.: A novel fast DCT coefficient scan architecture. In: Proceedings of the 27th Conference on Picture Coding Symposium, pp. 273\u2013276. ACM, New York, NY (2009)"},{"issue":"6","key":"15_CR34","first-page":"1652","volume":"41","author":"T Gu","year":"2020","unstructured":"Gu, T.: Compression algorithm for electric field data based on two-dimensional lifting wavelet-discrete cosine transform. Comput. Eng. Des. 41(6), 1652\u20131657 (2020)","journal-title":"Comput. Eng. Des."},{"issue":"7","key":"15_CR35","first-page":"445","volume":"2","author":"K Ramanjaneyulu","year":"2013","unstructured":"Ramanjaneyulu, K., et al.: Robust and oblivious watermarking based on swapping of DCT coefficients. Int. J. Appl. Innov. Eng. Manag. 2(7), 445\u2013452 (2013)","journal-title":"Int. J. Appl. Innov. Eng. Manag."},{"issue":"2","key":"15_CR36","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TMI.2022.3219284","volume":"42","author":"F Kong","year":"2022","unstructured":"Kong, F., et al.: Learning whole heart mesh generation from patient images for computational simulations. IEEE Trans. Med. Imaging 42(2), 533\u2013545 (2022)","journal-title":"IEEE Trans. Med. Imaging"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks and Machine Learning \u2013 ICANN 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44216-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T07:04:57Z","timestamp":1695279897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44216-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031442155","9783031442162"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44216-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icann2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/e-nns.org\/icann2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easyacademia.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"947","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"426","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"type of other papers accepted  : 9 Abstract","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}