{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:06:12Z","timestamp":1769727972080,"version":"3.49.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319393926","type":"print"},{"value":"9783319393933","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39393-3_15","type":"book-chapter","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T15:24:36Z","timestamp":1463757876000},"page":"145-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Simultaneous Encryption and Compression of Digital Images Based on Secure-JPEG Encoding"],"prefix":"10.1007","author":[{"given":"Saqib","family":"Maqbool","sequence":"first","affiliation":[]},{"given":"Nisar","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Aslam","family":"Muhammad","sequence":"additional","affiliation":[]},{"given":"A. M.","family":"Martinez Enriquez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,21]]},"reference":[{"issue":"13","key":"15_CR1","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1016\/j.comnet.2008.05.006","volume":"52","author":"Q Lu","year":"2008","unstructured":"Lu, Q., et al.: Low-complexity and energy efficient image compression scheme for wireless sensor networks. Comput. Netw. 52(13), 2594\u20132603 (2008)","journal-title":"Comput. Netw."},{"key":"15_CR2","unstructured":"Lian, S., Kanellopoulos, D., Ruffo, G.: Recent advances in multimedia information system security. Informatica 33(1) (2009)"},{"issue":"2","key":"15_CR3","first-page":"1","volume":"6","author":"D Selent","year":"2010","unstructured":"Selent, D.: Advanced encryption standard. Rivier Acad. J. 6(2), 1\u201314 (2010)","journal-title":"Rivier Acad. J."},{"issue":"01","key":"15_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1112\/S0025579300009591","volume":"26","author":"DR Smith","year":"1979","unstructured":"Smith, D.R., Palmer, J.T.: Universal fixed messages and the Rivest-Shamir-Adleman cryptosystem. Mathematika 26(01), 44\u201352 (1979)","journal-title":"Mathematika"},{"key":"15_CR5","doi-asserted-by":"crossref","DOI":"10.1201\/9781420065282","volume-title":"Multimedia Content Encryption: Techniques and Applications","author":"S Lian","year":"2008","unstructured":"Lian, S.: Multimedia Content Encryption: Techniques and Applications. CRC Press, Boca Raton (2008)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Furht, B., Socek, D., Eskicioglu, A.M.: Fundamentals of multimedia encryption techniques. In: Multimedia Security Handbook, vol. 4 (2004)","DOI":"10.1201\/9781420038262.pt2"},{"key":"15_CR7","unstructured":"Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Advanced Concepts for Intelligent Vision Systems (ACIVS) (2002)"},{"issue":"4","key":"15_CR8","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/TCE.2005.1561845","volume":"51","author":"S Sudharsanan","year":"2005","unstructured":"Sudharsanan, S.: Shared key encryption of JPEG color images. IEEE Trans. Consum. Electron. 51(4), 1204\u20131211 (2005)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"2","key":"15_CR9","first-page":"71","volume":"52","author":"N Ahmed","year":"2015","unstructured":"Ahmed, N., et al.: A novel image encryption scheme based on orthogonal vectors. Nucleus 52(2), 71\u201378 (2015)","journal-title":"Nucleus"},{"key":"15_CR10","unstructured":"Grigoras, V., Grigoras, C.: Chaos encryption method based on large signal modulation in additive nonlinear discrete-time systems. In: Proceedings of the 5th WSEAS International Conference on Non-linear Analysis, Non-linear Systems and Chaos. World Scientific and Engineering Academy and Society (WSEAS) (2006)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Philip, M., Das, A.: Survey: image encryption using chaotic cryptography schemes. IJCA, 1\u20134 (2011). Special Issue on \u201cComputational Science-New Dimensions and Perspectives\u201d NCCSE","DOI":"10.5121\/ijcseit.2011.1507"},{"key":"15_CR12","unstructured":"Wei-bin, C., Xin, Z.: Image encryption algorithm based on Henon chaotic system. In: International Conference on Image Analysis and Signal Processing, 2009. IASP 2009. IEEE (2009)"},{"issue":"11","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1109\/TCSVT.2003.817360","volume":"13","author":"H-Y Shum","year":"2003","unstructured":"Shum, H.-Y., Kang, S.B., Chan, S.-C.: Survey of image-based representations and compression techniques. IEEE Trans. Circuits Syst. Video Technol. 13(11), 1020\u20131037 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"15_CR14","unstructured":"Hossein, M., Mahmud, S., Biswas, N.: Image compression and encryption. Int. J. ElectroComput. World Knowl. Interface 1(3) (2011)"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou, N., et al.: Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt. Commun. 343, 10\u201321 (2015)","journal-title":"Opt. Commun."},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.optcom.2014.10.020","volume":"338","author":"A Alfalou","year":"2015","unstructured":"Alfalou, A., Brosseau, C., Abdallah, N.: Simultaneous compression and encryption of color video images. Opt. Commun. 338, 371\u2013379 (2015)","journal-title":"Opt. Commun."},{"issue":"1\u20132","key":"15_CR17","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11071-012-0707-5","volume":"72","author":"X-J Tong","year":"2013","unstructured":"Tong, X.-J., et al.: A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dyn. 72(1\u20132), 229\u2013241 (2013)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","volume":"9","author":"J Zhou","year":"2014","unstructured":"Zhou, J., et al.: Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans. Inf. Forensics Secur. 9(1), 39\u201350 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Zhou, J., Liu, X., Au, O.C.: On the design of an efficient encryption-then-compression system. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE (2013)","DOI":"10.1109\/ICASSP.2013.6638182"},{"key":"15_CR20","unstructured":"Bansal, R., Sharma, M.R.: Designing an Efficient Image Encryption-Compression System Using a New Haar Wavelet (2014)"},{"issue":"6","key":"15_CR21","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.image.2013.02.004","volume":"28","author":"H Zhu","year":"2013","unstructured":"Zhu, H., Zhao, C., Zhang, X.: A novel image encryption\u2013compression scheme using hyper-chaos and Chinese remainder theorem. Sig. Process. Image Commun. 28(6), 670\u2013680 (2013)","journal-title":"Sig. Process. Image Commun."},{"issue":"19","key":"15_CR22","doi-asserted-by":"publisher","first-page":"22349","DOI":"10.1364\/OE.22.022349","volume":"22","author":"M Aldossari","year":"2014","unstructured":"Aldossari, M., Alfalou, A., Brosseau, C.: Simultaneous compression and encryption of closely resembling images: application to video sequences and polarimetric images. Opt. Express 22(19), 22349\u201322368 (2014)","journal-title":"Opt. Express"},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou, N., et al.: Novel image compression\u2013encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt. & Laser Technol. 62, 152\u2013160 (2014)","journal-title":"Opt. & Laser Technol."},{"issue":"1","key":"15_CR24","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/272991.272995","volume":"8","author":"M Matsumoto","year":"1998","unstructured":"Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform Pseudo-random number generator. ACM Trans. Model. Comput. Simul. (TOMACS) 8(1), 3\u201330 (1998)","journal-title":"ACM Trans. Model. Comput. Simul. (TOMACS)"},{"issue":"2","key":"15_CR25","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/0196-6774(85)90036-7","volume":"6","author":"DE Knuth","year":"1985","unstructured":"Knuth, D.E.: Dynamic Huffman coding. J. Algorithms 6(2), 163\u2013180 (1985)","journal-title":"J. Algorithms"},{"issue":"2","key":"15_CR26","first-page":"6","volume":"27","author":"A Naveed","year":"2015","unstructured":"Naveed, A., et al.: Performance evaluation and watermark security assessment of digital watermarking techniques. Sci. Int. Lahore 27(2), 6 (2015)","journal-title":"Sci. Int. Lahore"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39393-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T23:47:15Z","timestamp":1656460035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39393-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393926","9783319393933"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39393-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}