{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:36:03Z","timestamp":1725564963570},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642164439"},{"type":"electronic","value":"9783642164446"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16444-6_19","type":"book-chapter","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T23:19:29Z","timestamp":1283987969000},"page":"139-148","source":"Crossref","is-referenced-by-count":0,"title":["An Attack on Wavelet Tree Shuffling Encryption Schemes"],"prefix":"10.1007","author":[{"given":"Samuel","family":"Assegie","sequence":"first","affiliation":[]},{"given":"Paul","family":"Salama","sequence":"additional","affiliation":[]},{"given":"Brian","family":"King","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Recommendation for Key Management, Special Publication 800-57 Part 1, NIST, 03\/2007"},{"key":"19_CR2","unstructured":"Keylength - Cryptographic Key Length Recommendation, \n                  \n                    http:\/\/www.keylength.com"},{"volume-title":"Multimedia Security Handbook","year":"2004","key":"19_CR3","unstructured":"Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton (2004)"},{"key":"19_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1007\/11596981_164","volume-title":"Computational Intelligence and Security","author":"G. Kwon","year":"2005","unstructured":"Kwon, G., Lee, T., Kim, K., Jin, J., Ko, S.: Multimedia digital right management using selective scrambling for mobile handset. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03802, pp. 1098\u20131103. Springer, Heidelberg (2005)"},{"issue":"3","key":"19_CR5","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/76.911157","volume":"11","author":"W. Li","year":"2001","unstructured":"Li, W.: Overview of Fine Granularity Scalability in MPEG-4 Video Standard. IEEE Trans. on Circuits & Systems for Video Technology\u00a011(3), 301\u2013317 (2001)","journal-title":"IEEE Trans. on Circuits & Systems for Video Technology"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., Quisquater, J.: Overview on selective encryption of image and video: challenges and perspectives. EURASIP J. Inf. Security, 1\u201318 (2008)","DOI":"10.1155\/2008\/179290"},{"key":"19_CR7","volume-title":"Proceedings of the 22nd Annual Symposium on Theory of Computing","author":"M. Naor","year":"1990","unstructured":"Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: Proceedings of the 22nd Annual Symposium on Theory of Computing. ACM, New York (1990)"},{"issue":"7","key":"19_CR8","doi-asserted-by":"publisher","first-page":"2061","DOI":"10.1109\/TIP.2006.873426","volume":"15","author":"Y. Mao","year":"2006","unstructured":"Mao, Y., Wu, M.: A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans. Image Processing\u00a015(7), 2061\u20132075 (2006)","journal-title":"IEEE Trans. Image Processing"},{"key":"19_CR9","unstructured":"Norcen, R., Uhl, A.: Encryption of wavelet-coded imagery using random permutations. In: Proceedings of the IEEE International Conference on Image Processing (ICIP\u0160 2004), Singapore. IEEE Signal Processing Society (October 2004)"},{"key":"19_CR10","unstructured":"Podesser, M., Schmidt, H., Uhl, A.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of the 5th Nordic Signal Processing Symposium, NORSIG 2002 (2002)"},{"issue":"3","key":"19_CR11","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s00530-003-0099-y","volume":"9","author":"A. Pommer","year":"2003","unstructured":"Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: efficiency and security. Multimedia Systems\u00a09(3), 279\u2013287 (2003)","journal-title":"Multimedia Systems"},{"issue":"3","key":"19_CR12","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/76.499834","volume":"6","author":"A. Said","year":"1996","unstructured":"Said, A., Pearlman, W.A.: A new, fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans. Circuits and Systems for Video Technology\u00a06(3), 243\u2013250 (1996)","journal-title":"IEEE Trans. Circuits and Systems for Video Technology"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Salama, P., King, B.: Efficient secure image transmission: compression integrated with encryption. In: Proc. SPIE, vol.\u00a0SPIE-5681, pp. 47\u201358 (2005)","DOI":"10.1117\/12.587011"},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"3445","DOI":"10.1109\/78.258085","volume":"41","author":"M. Shapiro","year":"1993","unstructured":"Shapiro, M.: Embedded Image Coding using Zerotrees of Wavelet Coefficients. IEEE Trans. Signal Processing\u00a041, 3445\u20133462 (1993)","journal-title":"IEEE Trans. Signal Processing"},{"issue":"11","key":"19_CR15","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Comm. of ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Comm. of ACM"},{"key":"19_CR16","volume-title":"Cryptography: theory and practice","author":"D. Stinson","year":"2002","unstructured":"Stinson, D.: Cryptography: theory and practice, 2nd edn. CRC Press, Boca Raton (2002)","edition":"2"},{"key":"19_CR17","unstructured":"Uehara, T., Safavi-Naini, R., Ogunbona, P.: Securing wavelet compression with random permutations. In: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, pp. 332\u2013335. IEEE Signal Processing Society (December 2000)"},{"key":"19_CR18","volume-title":"Image and Video Encryption: From Digital Rights Management to Secured Personal Communication","author":"A. Uhl","year":"2005","unstructured":"Uhl, A., Pommer, A.: Image and Video Encryption: From Digital Rights Management to Secured Personal Communication. Springer, Boston (2005)"},{"key":"19_CR19","unstructured":"Valens, C.: As appeared in (1999), \n                  \n                    http:\/\/pagesperso-orange.fr\/polyvalens\/clemens\/ezw\/ezw.html"},{"issue":"1","key":"19_CR20","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/TMM.2003.808817","volume":"5","author":"W. Zeng","year":"2003","unstructured":"Zeng, W., Lei, S.: Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia\u00a05(1), 118\u2013129 (2003)","journal-title":"IEEE Transactions on Multimedia"}],"container-title":["Communications in Computer and Information Science","Security-Enriched Urban Computing and Smart Grid"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16444-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,20]],"date-time":"2019-03-20T02:12:44Z","timestamp":1553047964000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16444-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642164439","9783642164446"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16444-6_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}