{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:12:19Z","timestamp":1760202739527,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319537320"},{"type":"electronic","value":"9783319537337"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53733-7_10","type":"book-chapter","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T05:39:21Z","timestamp":1487137161000},"page":"143-154","source":"Crossref","is-referenced-by-count":2,"title":["Integrated Encryption in Dynamic Arithmetic Compression"],"prefix":"10.1007","author":[{"given":"Shmuel T.","family":"Klein","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dana","family":"Shapira","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"issue":"5","key":"10_CR1","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/0167-4048(92)90011-F","volume":"11","author":"HA Bergen","year":"1992","unstructured":"Bergen, H.A., Hogan, J.M.: Data security in a fixed-model arithmetic coding compression algorithm. Comput. Secur. 11(5), 445\u2013461 (1992)","journal-title":"Comput. Secur."},{"issue":"4","key":"10_CR2","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1016\/j.ipm.2003.08.008","volume":"41","author":"ST Klein","year":"2005","unstructured":"Klein, S.T., Shapira, D.: Pattern matching in Huffman encoded texts. Inf. Process. Manage. 41(4), 829\u2013841 (2005)","journal-title":"Inf. Process. Manage."},{"issue":"11","key":"10_CR3","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TCSII.2008.2002565","volume":"55","author":"K Wong","year":"2008","unstructured":"Wong, K., Yuen, C.H.: Embedding compression in chaos based cryptography. IEEE Trans. Circuits Syst.-II Expr. Briefs 55(11), 1193\u20131197 (2008)","journal-title":"IEEE Trans. Circuits Syst.-II Expr. Briefs"},{"key":"10_CR4","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TIT.1981.1056356","volume":"27","author":"CB Jones","year":"1981","unstructured":"Jones, C.B.: An efficient coding system for long source sequences. IEEE Trans. Inf. Theory 27, 280\u2013291 (1981)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"10_CR5","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/0167-4048(88)90580-9","volume":"7","author":"IH Witten","year":"1988","unstructured":"Witten, I.H., Cleary, J.G.: On the privacy afforded by adaptive text compression. Comput. Secur. 7(4), 397\u2013408 (1988)","journal-title":"Comput. Secur."},{"issue":"2","key":"10_CR6","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/0167-4048(93)90099-Q","volume":"12","author":"HA Bergen","year":"1993","unstructured":"Bergen, H.A., Hogan, J.M.: A chosen plaintext attack on an adaptive arithmetic coding compression algorithm. Comput. Secur. 12(2), 157\u2013167 (1993)","journal-title":"Comput. Secur."},{"issue":"2","key":"10_CR7","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/LSP.2005.861589","volume":"13","author":"J Wen","year":"2006","unstructured":"Wen, J., Kim, H., Villasenor, J.: Binary arithmetic coding with key based interval splitting. IEEE Trans. Signal Process. Lett. 13(2), 69\u201372 (2006)","journal-title":"IEEE Trans. Signal Process. Lett."},{"issue":"3","key":"10_CR8","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1109\/TMM.2008.917355","volume":"10","author":"G Jakimoski","year":"2008","unstructured":"Jakimoski, G., Subbalakshmi, K.: Cryptanalysis of some multimedia encryption schemes. IEEE Trans. Multimed. 10(3), 330\u2013338 (2008)","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"10_CR9","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1109\/TIFS.2012.2187514","volume":"7","author":"RS Katti","year":"2012","unstructured":"Katti, R.S., Vosoughi, A.: On the security of key based interval splitting arithmetic coding with respect to message indistinguishability. IEEE Trans. Inf. Forensics Secur. 7(3), 895\u2013903 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10_CR10","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TMM.2006.879919","volume":"8","author":"M Grangetto","year":"2006","unstructured":"Grangetto, M., Magli, E., Olmo, G.: Multimedia selective encryption by means of randomized arithmetic coding. IEEE Trans. Multimed. 8(5), 905\u2013917 (2006)","journal-title":"IEEE Trans. Multimed."},{"issue":"2","key":"10_CR11","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/TCSII.2010.2040315","volume":"57","author":"K Wong","year":"2010","unstructured":"Wong, K., Lin, Q., Chen, J.: Simultaneous arithmetic coding and encryption using chaotic maps. IEEE Trans. Circuits Syst.-II Expr. Briefs 57(2), 146\u2013150 (2010)","journal-title":"IEEE Trans. Circuits Syst.-II Expr. Briefs"},{"issue":"3","key":"10_CR12","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1145\/65943.65946","volume":"7","author":"ST Klein","year":"1989","unstructured":"Klein, S.T., Bookstein, A., Deerwester, S.: Storing text retrieval systems on cd-rom: compression and encryption considerations. ACM Trans. Inf. Syst. 7(3), 230\u2013245 (1989)","journal-title":"ACM Trans. Inf. Syst."},{"issue":"4","key":"10_CR13","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/BF01185434","volume":"12","author":"AS Fraenkel","year":"1994","unstructured":"Fraenkel, A.S., Klein, S.T.: Complexity aspects of guessing prefix codes. Algorithmica 12(4), 409\u2013419 (1994)","journal-title":"Algorithmica"},{"issue":"6","key":"10_CR14","first-page":"473","volume":"3","author":"TM Mahmoud","year":"2009","unstructured":"Mahmoud, T.M., Abdel-Latef, B.A., Ahmed, A.A., Mahfouz, A.M.: Hybrid compression encryption technique for securing sms. Int. J. Comput. Sci. Secur. (IJCSS) 3(6), 473\u2013481 (2009)","journal-title":"Int. J. Comput. Sci. Secur. (IJCSS)"},{"issue":"12","key":"10_CR15","first-page":"7112","volume":"2","author":"DB Ojha","year":"2010","unstructured":"Ojha, D.B., Sharma, A., Dwivedi, A., Pande, N., Kumar, A.: Space age approach to transmit medical image with code base cryptosystem over noisy channel. Int. J. Eng. Sci. Technol. 2(12), 7112\u20137117 (2010)","journal-title":"Int. J. Eng. Sci. Technol."},{"issue":"3","key":"10_CR16","first-page":"58","volume":"3","author":"A Singh","year":"2011","unstructured":"Singh, A., Gilhotra, R.: Data security using private key encryption system based on arithmetic coding. Int. J. Netw. Secur. Appl. (IJNSA) 3(3), 58\u201367 (2011)","journal-title":"Int. J. Netw. Secur. Appl. (IJNSA)"},{"issue":"2","key":"10_CR17","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0167-4048(95)97050-K","volume":"14","author":"JG Cleary","year":"1995","unstructured":"Cleary, J.G., Irvine, S.A., Rinsma-Melchert, I.: On the insecurity of arithmetic coding. Comput. Secur. 14(2), 167\u2013180 (1995)","journal-title":"Comput. Secur."},{"issue":"6","key":"10_CR18","doi-asserted-by":"crossref","first-page":"2554","DOI":"10.1016\/j.cnsns.2010.09.012","volume":"16","author":"L Duan","year":"2011","unstructured":"Duan, L., Liao, X., Xiang, T.: A secure arithmetic coding based on Markov model. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2554\u20132562 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"10_CR19","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/978-94-017-2535-4_19","volume-title":"Parallel Text Processing","author":"J V\u00e9ronis","year":"2000","unstructured":"V\u00e9ronis, J., Langlais, P.: Evaluation of parallel text alignment systems: the ARCADE project. In: V\u00e9ronis, J. (ed.) Parallel Text Processing, pp. 369\u2013388. Kluwer Academic Publishers, Dordrecht (2000)"}],"container-title":["Lecture Notes in Computer Science","Language and Automata Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53733-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:35:54Z","timestamp":1498372554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-53733-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319537320","9783319537337"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53733-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}