{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:15:44Z","timestamp":1725491744538},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748267"},{"type":"electronic","value":"9783540748274"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74827-4_29","type":"book-chapter","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T23:35:16Z","timestamp":1189553716000},"page":"225-232","source":"Crossref","is-referenced-by-count":0,"title":["Practice of Video Encryption Algorithms Based on Chaotic Sequence and Scan Pattern"],"prefix":"10.1007","author":[{"given":"Qian","family":"Li","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Committee Draft Standard ISO 11172: ISO\/MPEG90\/176. Coding of moving Fig.s and associated audio"},{"key":"29_CR2","unstructured":"ITU-T Rec. H. 263, Video coding for narrow telecommunication channels at< 64kbit\/s"},{"key":"29_CR3","unstructured":"Qiao, L., Nahrstedt, K.: A new algorithm for MPEG video encryption. In: CISST\u201997, 1997th edn. Proceeding of the First International Conference on Imaging Science, Systems and technology, Las Vegas, Nevada, pp. 21\u201329 (July 1997)"},{"key":"29_CR4","first-page":"226","volume-title":"IEEE International Symposium on Consumer Electronics","author":"L. Qiao","year":"1997","unstructured":"Qiao, L., Nahrstedt, K., Tam, I.: Is MPEG encryption by using random list instead of zigzag order secure. In: IEEE International Symposium on Consumer Electronics, Singapore, pp. 226\u2013229. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"29_CR5","first-page":"192","volume-title":"ACM Multimedia\u201996","author":"L. Tang","year":"1996","unstructured":"Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: ACM Multimedia\u201996. Proceedings of the Fourth ACM International Multimedia Conference, Boston, MA, pp. 192\u2013230. ACM Press, New York (1996)"},{"key":"29_CR6","first-page":"430","volume-title":"IEEE Work shop on Signal Processing Systems","author":"J.C. Yen","year":"1999","unstructured":"Yen, J.C., Guo, Y.J.: A new MPEG encryption system and its VLSI architecture. In: IEEE Work shop on Signal Processing Systems, Taipei, pp. 430\u2013437. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"29_CR7","first-page":"119","volume-title":"IEEE International Conference on Multimedia and Expo","author":"S.T. Ali","year":"2000","unstructured":"Ali, S.T., Feng, W.-C.: Efficient multi-layer coding and encryption of MPEG video streams. In: IEEE International Conference on Multimedia and Expo, New York, 30, July-2, Aug, vol.\u00a01, pp. 119\u2013122. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Wu Chun-Ping, C., Jay Kuo, C.: Efficient multimedia encryption via entropy code design. In: Proceedings of SPIE International Symposium on Electronic Imaging 2001, SanJose, CA, USA, vol.\u00a04314, pp. 128\u2013138 (2001)","DOI":"10.1117\/12.435392"},{"key":"29_CR9","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/j.patcog.2003.08.011","volume":"37","author":"S.S. Maniccama","year":"2004","unstructured":"Maniccama, S.S., Bourbakisa, N.G.: Image and video encryption using SCAN patterns. Pattern Recognition\u00a037, 725\u2013737 (2004)","journal-title":"Pattern Recognition"},{"issue":"5","key":"29_CR10","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/S0167-8655(98)00017-8","volume":"19","author":"L. Chang","year":"1998","unstructured":"Chang, L.: Large encrypting of binary images with higher security. Pattern Recognition Lett.\u00a019(5), 461\u2013468 (1998)","journal-title":"Pattern Recognition Lett."}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74827-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T01:05:04Z","timestamp":1556845504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74827-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748267","9783540748274"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74827-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}