{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:02:29Z","timestamp":1758268949678},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44654-6_62","type":"book-chapter","created":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T01:13:21Z","timestamp":1410743601000},"page":"624-633","source":"Crossref","is-referenced-by-count":6,"title":["Visual Security Evaluation Based on SIFT Object Recognition"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Jenisch","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Jenisch, S., Uhl, A.: A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed images. EURASIP Journal on Information Security\u00a0(6) (2014)","DOI":"10.1186\/1687-417X-2014-6"},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"Au Yeung, S.K., Zhu, S., Zeng, B.: Quality assessment for a perceptual video encryption system. In: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), pp. 102\u2013106 (June 2010)","DOI":"10.1109\/WCINS.2010.5541898"},{"key":"62_CR3","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-642-17641-8_26","volume-title":"Signal Processing and Multimedia","author":"M.I. Khan","year":"2010","unstructured":"Khan, M.I., Jeoti, V., Malik, A.S.: On perceptual encryption: Variants of DCT block scrambling scheme for JPEG compressed images. In: Kim, T.-h., Pal, S.K., Grosky, W.I., Pissinou, N., Shih, T.K., \u015al\u0119zak, D. (eds.) SIP\/MulGraB 2010. CCIS, vol.\u00a0123, pp. 212\u2013223. Springer, Heidelberg (2010)"},{"key":"62_CR4","unstructured":"Droogenbroeck, M.V., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of ACIVS (Advanced Concepts for Intelligent Vision Systems), Ghent University, Belgium, pp. 90\u201397 (September 2002)"},{"issue":"10","key":"62_CR5","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1109\/LSP.2009.2026109","volume":"16","author":"S.K.A. Yeung","year":"2009","unstructured":"Yeung, S.K.A., Zhu, S., Zeng, B.: Partial video encryption based on alternating transforms. IEEE Signal Processing Letters\u00a016(10), 893\u2013896 (2009)","journal-title":"IEEE Signal Processing Letters"},{"key":"62_CR6","first-page":"835","volume-title":"Proceedings of the International Conference on Multimedia, MM 2010","author":"L. Tong","year":"2010","unstructured":"Tong, L., Dai, F., Zhang, Y., Li, J.: Visual security evaluation for video encryption. In: Proceedings of the International Conference on Multimedia, MM 2010, pp. 835\u2013838. ACM, New York (2010)"},{"key":"62_CR7","unstructured":"Mao, Y., Wu, M.: Security evaluation for communication-friendly encryption of multimedia. In: Proceedings of the IEEE International Conference on Image Processing (ICIP 2004). IEEE Signal Processing Society, Singapore (2004)"},{"issue":"1","key":"62_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11042-010-0491-5","volume":"53","author":"J. Sun","year":"2011","unstructured":"Sun, J., Xu, Z., Liu, J., Yao, Y.: An objective visual security assessment for cipher-images based on local entropy. Multimedia Tools and Applications\u00a053(1), 75\u201395 (2011)","journal-title":"Multimedia Tools and Applications"},{"key":"62_CR9","first-page":"69","volume":"33","author":"Y. Yao","year":"2009","unstructured":"Yao, Y., Xu, Z., Sun, J.: Visual security assessment for cipher-images based on neighborhood similarity. Informatica\u00a033, 69\u201376 (2009)","journal-title":"Informatica"},{"issue":"2","key":"62_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"D.G. Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision\u00a060(2), 91\u2013110 (2004)","journal-title":"International Journal of Computer Vision"},{"key":"62_CR11","unstructured":"Chen, T.Y., Huang, C.H., Chen, T.H., Liu, C.C.: Authentication of lossy compressed video data by semi-fragile watermarking. In: Proceedings of the IEEE International Conference on Image Processing, ICIP 2004. IEEE, Singapore (2004)"},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"Huang, L., Zhou, W., Jiang, R., Li, A.: Data quality inspection of watermarked GIS vector map. In: Proceedings of the 18th International Conference on Geoinformatics, Beijing, China (June 2010)","DOI":"10.1109\/GEOINFORMATICS.2010.5567694"},{"issue":"2","key":"62_CR13","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/TCSVT.2011.2106250","volume":"21","author":"H. Sohn","year":"2011","unstructured":"Sohn, H., De Neve, W., Ro, Y.M.: Privacy Protection in Video Surveillance Systems: Analysis of Subband-Adaptive Scrambling in JPEG XR. IEEE Transactions on Circuits and Systems for Video Technology\u00a021(2), 170\u2013177 (2011)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"62_CR14","doi-asserted-by":"crossref","unstructured":"Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the ACM Multimedia 1996, Boston, USA, pp. 219\u2013229 (November 1996)","DOI":"10.1145\/244130.244209"},{"key":"62_CR15","doi-asserted-by":"crossref","unstructured":"Sohn, H., DeNeeve, W., Ro, Y.: Region-of-interest scrambling for scalable surveillance video using JPEG XR. In: ACM Multimedia 2009, Beijing, China, pp. 861\u2013864 (October 2009)","DOI":"10.1145\/1631272.1631433"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44654-6_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T23:49:31Z","timestamp":1565826571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44654-6_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44654-6_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}