{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:20:22Z","timestamp":1760955622923,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811004476"},{"type":"electronic","value":"9789811004483"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0448-3_61","type":"book-chapter","created":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T03:34:03Z","timestamp":1458358443000},"page":"729-741","source":"Crossref","is-referenced-by-count":8,"title":["An Efficient Compression of Encrypted Images Using WDR Coding"],"prefix":"10.1007","author":[{"family":"Manoj Kumar","sequence":"first","affiliation":[]},{"family":"Ankita Vaish","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"issue":"4","key":"61_CR1","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/TIT.1973.1055037","volume":"19","author":"D. Slepian","year":"1973","unstructured":"Slepian, D., Wolf, J.K.: Noiseless coding of correlated information sources. IEEE Trans. Inf. Theory IT-19, 471\u2013480 (1973)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"61_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIT.1976.1055508","volume":"22","author":"A. Wyner","year":"1976","unstructured":"Wyner, A., Ziv, J.: The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory IT-22, 1\u201310 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"61_CR3","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1109\/TIT.2002.808103","volume":"49","author":"S.S. Pradhan","year":"2003","unstructured":"Pradhan, S.S., Ramchandran, K.: Distributed source coding using syndromes (DISCUS): design and construction. IEEE Trans. Inf. Theory 49, 626\u2013643 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"key":"61_CR4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low-Density Parity-Check Codes","author":"Robert G. Gallager","year":"1963","unstructured":"Gallager, R.G.: Low density parity check codes. Ph.D dissertation, MIT (1963)"},{"issue":"4","key":"61_CR5","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1109\/TIFS.2008.2007244","volume":"3","author":"Daniel Schonberg","year":"2008","unstructured":"Schonberg, D., Draper, S.C., Yeo, C., Ramchandran, K.: Toward compression of encrypted images and video sequences. IEEE Trans. Inf. Forensics Secur. 3(4), 749\u2013762 (2008)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"10","key":"61_CR6","doi-asserted-by":"crossref","first-page":"2992","DOI":"10.1109\/TSP.2004.833860","volume":"52","author":"M. Johnson","year":"2004","unstructured":"Johnson, M., Ishwar, P., Prabhakaran, V. M., Schonberg, D., Ramchandran, K.: On compressing encrypted data. IEEE Trans. Signal Process. 52(10), 2992\u20133006 (2004)","journal-title":"IEEE Transactions on Signal Processing"},{"unstructured":"Schonberg, D., Draper, S.C., Ramchandran, K.: On compression of encrypted images. Proc. IEEE Int. Conf. Image Process. 128(3), 112\u2013124 (1987)","key":"61_CR7"},{"unstructured":"Schonberg, D., Draper, S.C., Ramchandran, K.: On blind compression of encrypted correlated data approaching the source entropy rate. In: Proceedings of 43rd Annual Allerton Conference, Allerton, IL, USA (2005)","key":"61_CR8"},{"unstructured":"Lazzeretti, R., Barni, M.: Lossless compression of encrypted gray-level and color images. In: Proceedings of 16th European Signal Processing Conference, pp. 1\u20135 (2008)","key":"61_CR9"},{"doi-asserted-by":"crossref","unstructured":"Kumar, A., Makur, A.: Distributed source coding based encryption and lossless compression of gray scale and color images. In: Proceedings of MMSP, pp. 760\u2013764 (2008)","key":"61_CR10","DOI":"10.1109\/MMSP.2008.4665176"},{"unstructured":"Liu, W., Zeng, W., Dong, L., Yao, Q.: Efficient compression of encrypted gray scale images. IEEE Trans. Signal Process. 19(4), 1097\u20131102 (2010)","key":"61_CR11"},{"issue":"11","key":"61_CR12","doi-asserted-by":"crossref","first-page":"6989","DOI":"10.1109\/TIT.2012.2210752","volume":"58","author":"Demijan Klinc","year":"2012","unstructured":"Klinc, D., Hazay, C., Jagmohan, A., Krawczyk, H., Rabin, T.: On compression of data encrypted with block ciphers. IEEE Trans. Inf. Theory 58(11) 6989\u20137001 (2012)","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Kumar, A., Makur, A.: Lossy compression of encrypted image by compressing sensing technique. In: Proceedings of TENCON2009 IEEE Region 10 Conference, vol. C-23, no. 1, pp. 1\u20136 (2009)","key":"61_CR13","DOI":"10.1109\/TENCON.2009.5395999"},{"issue":"1","key":"61_CR14","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/TIFS.2010.2099114","volume":"6","author":"Xinpeng Zhang","year":"2011","unstructured":"Zhang, X.: Lossy compression and iterative reconstruction for encrypted image. IEEE Trans. Inf. Forensics Secur. 6(1), 53\u201358 (2011)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"61_CR15","doi-asserted-by":"crossref","first-page":"3108","DOI":"10.1109\/TIP.2012.2187671","volume":"21","author":"Xinpeng Zhang","year":"2012","unstructured":"Zhang, X., Feng, G., Ren, Y., Qian, Z.: Scalable coding of encrypted images. IEEE Trans. Image Process. 21(6), 3108\u20133114 (2012)","journal-title":"IEEE Transactions on Image Processing"},{"unstructured":"Zhang, X., Sun, G., Shen, L., Qin, C.: Compression of encrypted images with multilayer decomposition. IEEE Trans. Signal Process. 78(3), 1\u201313 (2013)","key":"61_CR16"},{"issue":"5","key":"61_CR17","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1109\/TMM.2014.2315974","volume":"16","author":"Xinpeng Zhang","year":"2014","unstructured":"Zhang, X., Ren, Y., Shen, L., Qian, Z., Feng, G.: Compressing encrypted images with auxiliary information. IEEE Trans. Multimedia 16(5), 1327\u20131336 (2014)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"1","key":"61_CR18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","volume":"9","author":"Jiantao Zhou","year":"2014","unstructured":"Zhou, J., Liu, X., Rao, K.R.: Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation. IEEE Trans. Inf. Forensics Secur. 9(1), 39\u201350 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"crossref","unstructured":"Tian, J., Wells, R.O., Jr.: Image data processing in the compressed wavelet domain. In: Yuan, B. Tang, X. (eds.) Proceedings of 3rd International Conference on Signal Processing, vol. 147, no. 2, pp. 978\u2013981 (1996)","key":"61_CR19","DOI":"10.1109\/ICSIGP.1996.566254"},{"doi-asserted-by":"crossref","unstructured":"Vaish, A., Kumar, M.: WDR coding based image compression technique using PCA. In: IEEE International Conference of Signal Processing and Communication, pp. 356\u2013361 (2015)","key":"61_CR20","DOI":"10.1109\/ICSPCom.2015.7150677"},{"doi-asserted-by":"crossref","unstructured":"Tian, J., Wells, R.O., Jr.: Embedded image coding using wavelet difference reduction. In: Topiwala, P. (ed.) Wavelet Image and Video Compression. Kluwer Academic Publication, pp. 289\u2013301 (1998)","key":"61_CR21","DOI":"10.1007\/0-306-47043-8_17"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fifth International Conference on Soft Computing for Problem Solving"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0448-3_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:18:00Z","timestamp":1748812680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0448-3_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811004476","9789811004483"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0448-3_61","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}