{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:37:39Z","timestamp":1743086259346,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540928911"},{"type":"electronic","value":"9783540928928"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-540-92892-8_7","type":"book-chapter","created":{"date-parts":[[2009,1,6]],"date-time":"2009-01-06T02:03:30Z","timestamp":1231207410000},"page":"51-62","source":"Crossref","is-referenced-by-count":1,"title":["A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams"],"prefix":"10.1007","author":[{"given":"Yang","family":"Ou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chul","family":"Sur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kyung Hyune","family":"Rhee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Engel, D., St\u00fctz, T., Uhl, A.: Format-compliant JPEG2000 Encryption in JPSEC: Security, Applicability and the Impact of Compression Parameters. EURASIP Journal on Information Security, Article ID 94565 (2007)","DOI":"10.1155\/2007\/94565"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Engel, D., St\u00fctz, T., Uhl, A.: Format-Compliant JPEG2000 Encryption with Combined Packet Header and Packet Body Protection. In: Multimedia and Security Workshop, ACM Multimedia, pp. 87\u201395 (2007)","DOI":"10.1145\/1288869.1288882"},{"issue":"5","key":"7_CR3","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TMM.2006.879919","volume":"8","author":"M. Grangetto","year":"2006","unstructured":"Grangetto, M., Magli, E., Olmo, G.: Multimedia Selective Encryption by Means of Randomized Arithmetic Coding. IEEE Transactions on Multimedia\u00a08(5), 905\u2013917 (2006)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/TIP.2005.863953","volume":"15","author":"M. Grangetto","year":"2006","unstructured":"Grangetto, M., Magli, E., Olmo, G.: A Syntax-preserving Error Resilience Tool for JPEG2000 Based on Error Correcting Arithmetic Coding. IEEE Transactions on Image processing\u00a015(4), 807\u2013818 (2006)","journal-title":"IEEE Transactions on Image processing"},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TMM.2008.917355","volume":"10","author":"G. Jakimoski","year":"2008","unstructured":"Jakimoski, G., Subbalakshmi, K.P.: Cryptanalysis of Some Multimedia Encryption Schemes. IEEE Transactions on Multimedia\u00a010(3), 330\u2013338 (2008)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"5","key":"7_CR6","doi-asserted-by":"publisher","first-page":"2263","DOI":"10.1109\/TSP.2007.892710","volume":"55","author":"H. Kim","year":"2007","unstructured":"Kim, H., Wen, J., Villasenor, J.D.: Secure Arithmetic Coding. IEEE Transactions on Signal processing\u00a055(5), 2263\u20132272 (2007)","journal-title":"IEEE Transactions on Signal processing"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-30542-2_9","volume-title":"Advances in Multimedia Information Processing - PCM 2004","author":"S. Lian","year":"2004","unstructured":"Lian, S., Sun, J., Zhang, D., Wang, Z.: A Selective Image Encryption Scheme Based on JPEG2000 Codec. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol.\u00a03332, pp. 65\u201372. Springer, Heidelberg (2004)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-540-45184-6_16","volume-title":"Communications and Multimedia Security. Advanced Techniques for Network and Data Protection","author":"R. Norcen","year":"2003","unstructured":"Norcen, R., Uhl, A.: Selective Encryption of the JPEG2000 Bitstream. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol.\u00a02828, pp. 194\u2013204. Springer, Heidelberg (2003)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Said, A.: Measuring the Strength of Partial Encryption Schemes. In: IEEE International Conference on Image Processing (ICIP), pp. 1126\u20131129 (2005)","DOI":"10.1109\/ICIP.2005.1530258"},{"key":"7_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0799-4","volume-title":"JPEG2000 Image Compression Fundamentals, Standards and Practice","author":"D. Taubman","year":"2002","unstructured":"Taubman, D., Marcellin, M.: JPEG2000 Image Compression Fundamentals, Standards and Practice. Kluwer Academic Publishers, Boston (2002)"},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/LSP.2005.861589","volume":"13","author":"J. Wen","year":"2006","unstructured":"Wen, J., Kim, H., Villasenor, J.D.: Binary Arithmetic Coding with Key-based Interval Splitting. IEEE Signal Processing Letters\u00a013(2), 69\u201372 (2006)","journal-title":"IEEE Signal Processing Letters"},{"key":"7_CR12","unstructured":"Wu, Y., Deng, R.H.: Compliant Encryption of JPEG2000 Codestreams. In: IEEE International Conference on Image Processing, pp. 3439\u20133442 (2004)"},{"issue":"5","key":"7_CR13","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TMM.2005.854469","volume":"7","author":"C.P. Wu","year":"2005","unstructured":"Wu, C.P., Kuo, C.C.J.: Design of Integrated Multimedia Compression and Encryption Systems. IEEE Transactions on Multimedia\u00a07(5), 828\u2013839 (2005)","journal-title":"IEEE Transactions on Multimedia"},{"key":"7_CR14","unstructured":"JJ2000-Java Implementation of JPEG2000, http:\/\/jpeg2000.epfl.ch\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92892-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T19:44:46Z","timestamp":1738871086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92892-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540928911","9783540928928"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92892-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}