{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:35:09Z","timestamp":1725798909256},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662448922"},{"type":"electronic","value":"9783662448939"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44893-9_2","type":"book-chapter","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T03:15:08Z","timestamp":1408504508000},"page":"12-22","source":"Crossref","is-referenced-by-count":0,"title":["Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count of a Pair"],"prefix":"10.1007","author":[{"given":"Marek","family":"Parfieniuk","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Jankowski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdcf.2013070101","volume":"5","author":"S. Auer","year":"2013","unstructured":"Auer, S., Bliem, A., Engel, D., Uhl, A., Unterweger, A.: Bitstream-based JPEG encryption in real-time. Int. J. Digital Crime Forensics\u00a05(3), 1\u201314 (2013)","journal-title":"Int. J. Digital Crime Forensics"},{"issue":"10","key":"2_CR2","doi-asserted-by":"publisher","first-page":"2987","DOI":"10.1016\/j.cnsns.2009.11.022","volume":"15","author":"H. Hermassi","year":"2010","unstructured":"Hermassi, H., Rhouma, R., Belghith, S.: Joint compression and encryption using chaotically mutated Huffman trees. Commun. Nonlinear. Sci. Numer. Simul.\u00a015(10), 2987\u20132999 (2010)","journal-title":"Commun. Nonlinear. Sci. Numer. Simul."},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"D. Huffman","year":"1952","unstructured":"Huffman, D.: A method for the construction of minimum redundancy codes. Proc. IRE\u00a040, 1098\u20131101 (1952)","journal-title":"Proc. IRE"},{"issue":"3","key":"2_CR4","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TMM.2008.917355","volume":"10","author":"G. Jakimoski","year":"2008","unstructured":"Jakimoski, G., Subbalakshmi, K.P.: Cryptanalysis of some multimedia encryption schemes. IEEE Trans. Multimedia\u00a010(3), 330\u2013338 (2008)","journal-title":"IEEE Trans. Multimedia"},{"unstructured":"Kailasananathan, C., Safavi-Naini, R., Ogunbona, P.: Secure compression using adaptive Huffman coding. In: Proc. 1st IEEE Pacific-Rim Conference on Multimedia (IEEE-PCM), Sydney, Australia, pp. 336\u2013339 (2000)","key":"2_CR5"},{"doi-asserted-by":"crossref","unstructured":"Kulekci, M.: A method to ensure the confidentiality of the compressed data. In: Proc. 1st Int. Conf. Data Compression, Communications, Processing (CCP), Palinuro, Italy, pp. 203\u2013209 (2011)","key":"2_CR6","DOI":"10.1109\/CCP.2011.28"},{"key":"2_CR7","series-title":"SCI","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/978-3-642-24806-1_30","volume-title":"Autonomous Systems: Developments and Trends","author":"S. Li","year":"2012","unstructured":"Li, S.: On the performance of secret entropy coding: A perspective beyond security. In: Unger, H., Kyamaky, K., Kacprzyk, J. (eds.) Autonomous Systems: Developments and Trends. SCI, vol.\u00a0391, pp. 389\u2013402. Springer, Heidelberg (2012)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2008\/179290","volume":"2008","author":"A. Massoudi","year":"2008","unstructured":"Massoudi, A., Lefebvre, F., De Vleeschouwer, C., Macq, B., Quisquater, J.J.: Overview on selective encryption of image and video: Challenges and perspectives. EURASIP. J. Inf. Secur.\u00a02008, 5:1\u20135:18 (2008)","journal-title":"EURASIP. J. Inf. Secur."},{"doi-asserted-by":"crossref","unstructured":"Tseng, K.K., Jiang, J., Pan, J.-S., Tang, L., Hsu, C.Y., Chen, C.C.: Enhanced Huffman coding with encryption for wireless data broadcasting system. In: Proc. Int. Symp. Computer, Consumer, Control, Taichung, Taiwan, pp. 622\u2013625 (2012)","key":"2_CR9","DOI":"10.1109\/IS3C.2012.162"},{"doi-asserted-by":"crossref","unstructured":"Wu, C.P., Kuo, C.C.J.: Fast encryption methods for audiovisual data confidentiality. In: Multimedia Systems and Applications III. Proc. SPIE, Boston, MA, vol.\u00a04209, pp. 284\u2013295 (2000)","key":"2_CR10","DOI":"10.1117\/12.420829"},{"issue":"5","key":"2_CR11","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TMM.2005.854469","volume":"7","author":"C.P. Wu","year":"2005","unstructured":"Wu, C.P., Kuo, C.C.: Design of integrated multimedia compression and encryption systems. IEEE Trans. Multimedia\u00a07(5), 828\u2013839 (2005)","journal-title":"IEEE Trans. Multimedia"},{"issue":"5","key":"2_CR12","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/TSP.2009.2013901","volume":"57","author":"J. Zhou","year":"2009","unstructured":"Zhou, J., Au, O., Wong, P.W.: Adaptive chosed-ciphertext attack on secure arithmetic coding. IEEE Trans. Signal Process.\u00a057(5), 1825\u20131838 (2009)","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"2_CR13","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/LSP.2006.884012","volume":"14","author":"J. Zhou","year":"2007","unstructured":"Zhou, J., Liang, Z., Chen, Y., Au, O.: Security analysis of multimedia encryption schemes based on multiple huffman table. IEEE Signal Process. Lett.\u00a014(3), 201\u2013204 (2007)","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"2_CR14","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.jvcir.2010.10.007","volume":"22","author":"Q. Zhou","year":"2011","unstructured":"Zhou, Q., Wong, K.W., Liao, X., Hu, Y.: On the security of multiple Huffman table based encryption. J. Vis. Comun. Image Represent.\u00a022(1), 85\u201392 (2011)","journal-title":"J. Vis. Comun. Image Represent."}],"container-title":["Communications in Computer and Information Science","Cryptography and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44893-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T02:58:00Z","timestamp":1558407480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44893-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662448922","9783662448939"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44893-9_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}