{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T21:40:08Z","timestamp":1751233208492,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811078491"},{"type":"electronic","value":"9789811078507"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7850-7_8","type":"book-chapter","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T11:12:16Z","timestamp":1516014736000},"page":"80-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication"],"prefix":"10.1007","author":[{"given":"M.","family":"Sridevi","sequence":"first","affiliation":[]},{"given":"C.","family":"Mala","sequence":"additional","affiliation":[]},{"given":"S. Lakshmi","family":"Prabha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,16]]},"reference":[{"issue":"9","key":"8_CR1","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1016\/j.sigpro.2010.03.022","volume":"90","author":"X Liao","year":"2010","unstructured":"Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on adaptive wave transmission. Sig. Process. 90(9), 2714\u20132722 (2010). Elsevier","journal-title":"Sig. Process."},{"key":"8_CR2","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/978-3-642-31552-7_86","volume-title":"Advances in Computing and Information Technology","author":"HSS Kumar","year":"2013","unstructured":"Kumar, H.S.S., Panduranga, H.T., Kumar, S.K.N.: A two stage combinational approach for image encryption. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds.) Advances in Computing and Information Technology. AISC, vol. 177, pp. 843\u2013849. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-31552-7_86"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Wong, P.W.: A public key watermark for image verification and authentication. In: International Conference on Image Processing, Chicago, vol. 1, pp. 455\u2013459 (1998)","DOI":"10.1109\/ICIP.1998.723526"},{"issue":"4","key":"8_CR4","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1016\/j.dsp.2013.01.005","volume":"23","author":"NK Pareek","year":"2013","unstructured":"Pareek, N.K., Patider, V., Sud, K.K.: Diffusion substitution based gray image encryption scheme. Digit. Signal Proc. 23(4), 894\u2013901 (2013). Elsevier","journal-title":"Digit. Signal Proc."},{"issue":"6","key":"8_CR5","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/j.optlaseng.2013.01.001","volume":"51","author":"A Hakhshandeh","year":"2013","unstructured":"Hakhshandeh, A., Eslami, Z.: An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt. Lasers Eng. 51(6), 665\u2013673 (2013). Elsevier","journal-title":"Opt. Lasers Eng."},{"issue":"1","key":"8_CR6","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.asoc.2009.12.011","volume":"11","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos based fast encryption algorithm. Appl. Soft Comput. 11(1), 514\u2013522 (2011). Elsevier","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"8_CR7","first-page":"349","volume":"8","author":"J Shah","year":"2011","unstructured":"Shah, J., Saxena, V.: Performance study on image encryption schemes. Int. J. Comput. Sci. 8(1), 349\u2013356 (2011)","journal-title":"Int. J. Comput. Sci."},{"issue":"5","key":"8_CR8","first-page":"41","volume":"13","author":"S Charles","year":"2013","unstructured":"Charles, S., Govardhan, A., Sultana, F.: A tamper proof noise resilient end to end image based authentication system over wireless transmission with AWGN channel using wavelet based templates and AES. Int. J. Comput. Sci. Netw. Secur. 13(5), 41\u201349 (2013)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"8","key":"8_CR9","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H Cheng","year":"2000","unstructured":"Cheng, H., Li, X.: Partial encryption of compressed images and videos. IEEE Trans. Sig. Process. 48(8), 2439\u20132451 (2000)","journal-title":"IEEE Trans. Sig. Process."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Kulkarni, N.S., Gupta, I., Kulkarni, S.N.: A robust image encryption technique based on random vector. In: International Conference on Emerging Trend in Engineering and Technology (ICETET), 16\u201318 July 2008, pp. 15\u201319 (2008)","DOI":"10.1109\/ICETET.2008.274"},{"key":"8_CR11","unstructured":"Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS), Ghent, Belgium, 9\u201311 September 2002, pp. 90\u201397 (2002)"},{"issue":"2","key":"8_CR12","first-page":"126","volume":"1","author":"H Shuihua","year":"2005","unstructured":"Shuihua, H., Shuangyan, Y.: An asymmetric image encryption based on matrix transformation. ECTI Trans. Comput. Inf. Technol. 1(2), 126\u2013133 (2005)","journal-title":"ECTI Trans. Comput. Inf. Technol."},{"key":"8_CR13","unstructured":"Odibat, O.M., Abdallah, M.H., Al-Zoubi, M.B.R.: New techniques in the implementation of partial image encryption. In: International Multi-conference on Computer Science and Information Technology, Amman (2006)"},{"key":"8_CR14","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-03107-1_28","volume-title":"ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I","author":"A Khamrui","year":"2014","unstructured":"Khamrui, A., Mandal, J.K.: A wavelet transform based image authentication approach using genetic algorithm (AWTIAGA). In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds.) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I. AISC, vol. 248, pp. 251\u2013258. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-03107-1_28"},{"key":"8_CR15","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","volume-title":"Insider Attack and Cyber Security","author":"MB Salem","year":"2008","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Stolfo, S.J., Bellovin, S.M., Keromytis, A.D., Hershkop, S., Smith, S.W., Sinclair, S. (eds.) Insider Attack and Cyber Security. Advances in Information Security, vol. 39, pp. 69\u201390. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-77322-3_5"},{"key":"8_CR16","unstructured":"Li, M.: Analysis of the insider attack issue in the movie, banking, and computer industries. Compsci 725 SC 05 team paper, pp. 1\u201313 (2005)"},{"key":"8_CR17","doi-asserted-by":"crossref","first-page":"3329","DOI":"10.1016\/j.ijleo.2012.11.002","volume":"124","author":"C-Y Songa","year":"2013","unstructured":"Songa, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Optik 124, 3329\u20133334 (2013). Elsevier","journal-title":"Optik"},{"key":"8_CR18","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1016\/j.compbiomed.2013.05.005","volume":"43","author":"C Fu","year":"2013","unstructured":"Fu, C., Meng, W., Zhan, Y., Zhu, Z., Lau, F.C.M., Tse, C.K., Ma, H.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43, 1000\u20131010 (2013). Elsevier","journal-title":"Comput. Biol. Med."},{"issue":"5","key":"8_CR19","first-page":"471","volume":"9","author":"S Tedmodi","year":"2012","unstructured":"Tedmodi, S., Al-Najdawi, N.: Loseless image cryptograph algorithm based on Discrete Cosine Transform. Int. Arab J. Inf. Technol. 9(5), 471\u2013478 (2012)","journal-title":"Int. Arab J. Inf. Technol."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Kumar, P.P.P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Steg-OFDM blend for highly secure multi-user communication. In: Wireless VITAE, IEEE Conference Proceedings, pp. 1\u20135 (2011)","DOI":"10.1109\/WIRELESSVITAE.2011.5940918"},{"key":"8_CR21","volume-title":"Digital Image Processing","author":"RC Gonzalez","year":"2008","unstructured":"Gonzalez, R.C., Woods, R.E., Eddins, S.L.: Digital Image Processing, 3rd edn. Pearson, Upper Saddle River (2008)","edition":"3"},{"key":"8_CR22","volume-title":"Cryptography and Network Security","author":"W Stallings","year":"2006","unstructured":"Stallings, W.: Cryptography and Network Security, 4th edn. Pearson, Noida (2006)","edition":"4"},{"issue":"2","key":"8_CR23","first-page":"23","volume":"6","author":"C Chen","year":"2016","unstructured":"Chen, C., Anada, H., Kawamoto, J., Sakurai, K.: A hybrid encryption scheme with key-cloning protection: user\/terminal double authentication via attributes and fingerprints. J. Internet Serv. Inf. Secur. (JISIS) 6(2), 23\u201336 (2016)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"4","key":"8_CR24","first-page":"1","volume":"6","author":"C Gritti","year":"2016","unstructured":"Gritti, C., Susilo, W., Plantard, T.: Certificate-based encryption with keyword search enabling secure authorization in electronic health record. J. Internet Serv. Inf. Secur. (JISIS) 6(4), 1\u201334 (2016)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"issue":"4","key":"8_CR25","first-page":"20","volume":"7","author":"E Carniani","year":"2016","unstructured":"Carniani, E., Costantino, G., Marino, F., Martinelli, F., Mori, P.: Enhancing video surveillance with usage control and privacy-preserving solutions. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(4), 20\u201340 (2016)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"issue":"1","key":"8_CR26","first-page":"97","volume":"7","author":"W Casey","year":"2016","unstructured":"Casey, W., Morales, J.A., Mishra, B.: Threats from inside: dynamic utility (mis)alignments in an agent based model. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(1), 97\u2013117 (2016)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7850-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T21:19:23Z","timestamp":1751231963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7850-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811078491","9789811078507"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7850-7_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}