{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:09:46Z","timestamp":1744898986538},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319546087"},{"type":"electronic","value":"9783319546094"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54609-4_18","type":"book-chapter","created":{"date-parts":[[2017,3,8]],"date-time":"2017-03-08T23:23:26Z","timestamp":1489015406000},"page":"241-250","source":"Crossref","is-referenced-by-count":1,"title":["Scrambling Cryptography Using Programmable SLM-Based Filter for Video Streaming Over a WDM Network"],"prefix":"10.1007","author":[{"given":"Yao-Tang","family":"Chang","sequence":"first","affiliation":[]},{"given":"Yih-Chuan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yu-Chang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yan-Tai","family":"Liou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,10]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norman, K.: The Secure Real-Time Transport Protocol (SRTP), IETF RFC 3711, March 2004","DOI":"10.17487\/rfc3711"},{"issue":"15","key":"18_CR2","first-page":"1931","volume":"74","author":"Y-T Chang","year":"2016","unstructured":"Chang, Y.-T., Lin, Y.-C.: Dynamic reconfigurable encryption and decryption with chaos\/M-sequence mapping algorithm for secure H.264\/AVC video streaming over OCDMA passive optical network. Multimedia Tools Appl. 74(15), 1931\u20131948 (2016). [and 75(16), 9837\u20139859]","journal-title":"Multimedia Tools Appl."},{"issue":"8","key":"18_CR3","doi-asserted-by":"crossref","first-page":"1931","DOI":"10.1109\/JLT.2007.901333","volume":"25","author":"Y-T Chang","year":"2007","unstructured":"Chang, Y.-T., Sue, C.-C., Huang, J.-F.: Robust design for reconfigurable coder\/decoders to protect against eavesdropping in spectral amplitude coding optical CDMA networks. IEEE J. Lightwave Technol. 25(8), 1931\u20131948 (2007)","journal-title":"IEEE J. Lightwave Technol."},{"issue":"1","key":"18_CR4","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.compeleceng.2015.07.004","volume":"49","author":"Y-T Chang","year":"2016","unstructured":"Chang, Y.-T., Tsailin, C.W.: Dynamic scrambling scheme of arrayed-waveguide grating-based encryptors and decryptors for protection against eavesdropping. Comput. Electr. Eng. 49(1), 184\u2013197 (2016)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"18_CR5","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/TCE.2003.1196410","volume":"48","author":"F Chiaraluce","year":"2002","unstructured":"Chiaraluce, F., Ciccarelli, L., Gambi, E., Pierleoni, P., Reginelli, M.: A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 48(4), 838\u2013844 (2002)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"7","key":"18_CR6","doi-asserted-by":"crossref","first-page":"2061","DOI":"10.1109\/TIP.2006.873426","volume":"15","author":"Y Mao","year":"2006","unstructured":"Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Process. 15(7), 2061\u20132075 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"18_CR7","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/50.701404","volume":"16","author":"MC Parker","year":"1998","unstructured":"Parker, M.C., Cohen, A.D., Mears, R.J.: Dynamic digital holographic wavelength filtering. J. Lightwave Technol. 16(7), 1259\u20131270 (1998)","journal-title":"J. Lightwave Technol."},{"key":"18_CR8","volume-title":"Programming Windows\u00ae","author":"C Petzold","year":"1998","unstructured":"Petzold, C.: Programming Windows\u00ae, 5th edn. Microsoft Press, Redmond (1998)","edition":"5"},{"issue":"2","key":"18_CR9","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/JLT.2004.838844","volume":"23","author":"TH Shake","year":"2005","unstructured":"Shake, T.H.: Security performance of optical CDMA against eavesdropping. IEEE J. Lightwave Technol. 23(2), 655\u2013670 (2005)","journal-title":"IEEE J. Lightwave Technol."},{"issue":"4","key":"18_CR10","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1109\/JLT.2005.844504","volume":"23","author":"TH Shake","year":"2005","unstructured":"Shake, T.H.: Confidentiality performance of spectral-phase-encoded optical CDMA. IEEE J. Lightwave Technol. 23(4), 1652\u20131663 (2005)","journal-title":"IEEE J. Lightwave Technol."},{"key":"18_CR11","unstructured":"S\u00fchring, K.: H.264\/AVC Reference Software Group, January 2009. http:\/\/iphome.hhi.de\/suehring\/tml\/ , Joint Model 12.2 (JM12.2)"},{"key":"18_CR12","volume-title":"Video Processing and Communications","author":"Y Wang","year":"2001","unstructured":"Wang, Y., Ostermann, J., Zhang, Y.Q.: Video Processing and Communications. Prentice Hall, Upper Saddle River (2001)"},{"key":"18_CR13","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.image.2015.04.013","volume":"35","author":"Y Wang","year":"2015","unstructured":"Wang, Y., O\u2019Neill, M., Kurugollu, F., O\u2019Sullivan, E.: Privacy region protection for H.264\/AVC with enhanced scrambling effect and a low bitrate overhead. Signal Process. Image Commun. 35, 71\u201384 (2015)","journal-title":"Signal Process. Image Commun."},{"key":"18_CR14","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T Wiegand","year":"2003","unstructured":"Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264\/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13, 560\u2013576 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"9","key":"18_CR15","doi-asserted-by":"crossref","first-page":"3738","DOI":"10.1364\/OE.14.003738","volume":"14","author":"BB Wu","year":"2006","unstructured":"Wu, B.B., Narimanov, E.E.: A method for secure communications over a public fiber-optical network. Opt. Express 14(9), 3738\u20133751 (2006)","journal-title":"Opt. Express"}],"container-title":["Lecture Notes in Computer Science","Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54609-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T09:55:59Z","timestamp":1568886959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54609-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319546087","9783319546094"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54609-4_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}