{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:06:33Z","timestamp":1776107193548,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2015,7,28]],"date-time":"2015-07-28T00:00:00Z","timestamp":1438041600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"crossref","award":["104-2917-I-564- 068"],"award-info":[{"award-number":["104-2917-I-564- 068"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["101-2221-E-011-150-MY3"],"award-info":[{"award-number":["101-2221-E-011-150-MY3"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s00371-015-1143-6","type":"journal-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T15:26:06Z","timestamp":1438010766000},"page":"1593-1604","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Obfuscated volume rendering"],"prefix":"10.1007","volume":"32","author":[{"given":"Jia-Kai","family":"Chou","sequence":"first","affiliation":[]},{"given":"Chuan-Kai","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,28]]},"reference":[{"key":"1143_CR1","doi-asserted-by":"crossref","unstructured":"Chu, K.Y., Kuo, Y.H., Hsu, W.H.: Real-time privacy-preserving moving object detection in the cloud. In: Proceedings of the 21st ACM International Conference on Multimedia, MM \u201913, pp. 597\u2013600 (2013)","DOI":"10.1145\/2502081.2502157"},{"issue":"12","key":"1143_CR2","doi-asserted-by":"crossref","first-page":"2241","DOI":"10.1109\/TVCG.2011.163","volume":"17","author":"A Dasgupta","year":"2011","unstructured":"Dasgupta, A., Kosara, R.: Adaptive privacy-preserving visualization using parallel coordinates. IEEE Trans. Vis. Comput. Graph. 17(12), 2241\u20132248 (2011)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"1143_CR3","unstructured":"Dasgupta, A., Kosara, R.: Privacy-preserving data visualization using parallel coordinates, pp. 78,680O\u20131\u201378,680O\u201312 (2011)"},{"key":"1143_CR4","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s00373-007-0713-4","volume":"23","author":"ED Demaine","year":"2007","unstructured":"Demaine, E.D., Demaine, M.L.: Jigsaw puzzles, edge matching, and polyomino packing: connections and complexity. Graphs Comb. 23, 195\u2013208 (2007)","journal-title":"Graphs Comb."},{"key":"1143_CR5","volume-title":"Probability and statistics for engineering and the sciences","author":"JL Devore","year":"1987","unstructured":"Devore, J.L.: Probability and statistics for engineering and the sciences, 2nd edn. Brooks\/Cole Publishing Company, USA (1987)","edition":"2"},{"issue":"2","key":"1143_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2007\/78943","volume":"7","author":"Z Erkin","year":"2007","unstructured":"Erkin, Z., Piva, A., Katzenbeisser, S., Lagendijk, R.L., Shokrollahi, J., Neven, G., Barni, M.: Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J. Inf. Secur. 7(2), 1\u201320 (2007)","journal-title":"EURASIP J. Inf. Secur."},{"key":"1143_CR7","doi-asserted-by":"crossref","unstructured":"Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur (2007)","DOI":"10.1186\/1687-417X-2007-013801"},{"issue":"1","key":"1143_CR8","first-page":"90","volume":"8","author":"A Gautam","year":"2011","unstructured":"Gautam, A., Panwar, M., Gupta, P.: A new image encryption approach using block based transformation algorithm. Int. J. Adv. Eng. Sci. Technol. 8(1), 90\u201396 (2011)","journal-title":"Int. J. Adv. Eng. Sci. Technol."},{"issue":"3","key":"1143_CR9","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97\u2013105 (2010)","journal-title":"Commun. ACM"},{"issue":"2","key":"1143_CR10","first-page":"117","volume":"19","author":"A Jolfaei","year":"2010","unstructured":"Jolfaei, A., Mirghadri, A.: An image encryption approach using chaos and stream cipher. J. Theor. Appl. Inf. Technol. 19(2), 117\u2013125 (2010)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"3","key":"1143_CR11","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1145\/1015706.1015782","volume":"23","author":"D Koller","year":"2004","unstructured":"Koller, D., Turitzin, M., Levoy, M., Tarini, M., Croccia, G., Cignoni, P., Scopigno, R.: Protected interactive 3d graphics via remote rendering. ACM Trans. Graph. 23(3), 695\u2013703 (2004). doi: 10.1145\/1015706.1015782","journal-title":"ACM Trans. Graph."},{"issue":"3","key":"1143_CR12","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/38.511","volume":"8","author":"M Levoy","year":"1988","unstructured":"Levoy, M.: Display of surfaces from volume data. IEEE Comput. Graph. Appl. 8(3), 29\u201337 (1988)","journal-title":"IEEE Comput. Graph. Appl."},{"issue":"1","key":"1143_CR13","doi-asserted-by":"crossref","first-page":"73","DOI":"10.2967\/jnumed.113.121897","volume":"55","author":"SC Lin","year":"2013","unstructured":"Lin, S.C., Lin, K.J., Hsiao, I.T., Hsieh, C.J., Lin, W.Y., Lu, C.S., Wey, S.P., Yen, T.C., Kung, M.P., Weng, Y.H.: In vivo detection of monoaminergic degeneration in early Parkinson disease by 18F-9-fluoropropyl-(+)-dihydrotetrabenzazine PET. J. Nucl. Med. 55(1), 73\u201379 (2013)","journal-title":"J. Nucl. Med."},{"key":"1143_CR14","doi-asserted-by":"crossref","unstructured":"Liu, W., Zhao, C.: Digital watermarking for volume data based on 3D-DWT and 3D-DCT. In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, ICIS \u201909, pp. 352\u2013357 (2009)","DOI":"10.1145\/1655925.1655990"},{"key":"1143_CR15","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"2","key":"1143_CR16","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/MSP.2012.2230219","volume":"30","author":"CA Melchor","year":"2013","unstructured":"Melchor, C.A., Fau, S., Fontaine, C., Gogniat, G., Sirdey, R.: Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Signal Process. Mag. 30(2), 108\u2013117 (2013)","journal-title":"IEEE Signal Process. Mag."},{"issue":"1","key":"1143_CR17","first-page":"127","volume":"1","author":"A Mitra","year":"2006","unstructured":"Mitra, A., Rao, Y.V.S., Prasanna, S.R.M.: A new image encryption approach using combinational permutation techniques. J. Comput. Sci. 1(1), 127\u2013131 (2006)","journal-title":"J. Comput. Sci."},{"key":"1143_CR18","doi-asserted-by":"crossref","unstructured":"Mohanty, M., Atrey, P., Ooi, W.T.: Secure cloud-based medical data visualization. In: Proceedings of the 20th ACM International Conference on Multimedia, MM \u201912, pp. 1105\u20131108 (2012)","DOI":"10.1145\/2393347.2396394"},{"key":"1143_CR19","first-page":"531","volume":"1","author":"M Mohanty","year":"2013","unstructured":"Mohanty, M., Ooi, W.T., Atrey, P.K.: Secure cloud-based volume ray-casting. CloudCom 1, 531\u2013538 (2013)","journal-title":"CloudCom"},{"key":"1143_CR20","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW \u201911, pp. 113\u2013124 (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"1143_CR21","unstructured":"Pitman, J.: Probability. Springer (texts in statistics) (1993)"},{"issue":"11","key":"1143_CR22","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"5","key":"1143_CR23","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"1143_CR24","unstructured":"Wu, Y., Guan, X., Kankanhalli, M.S., Huang, Z.: Robust invisible watermarking of volume data using the 3D DCT. In: Computer Graphics International 2001, CGI \u201901, pp. 359\u2013362 (2001)"},{"key":"1143_CR25","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS \u201982, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"issue":"4","key":"1143_CR26","first-page":"191","volume":"8","author":"MAB Younes","year":"2008","unstructured":"Younes, M.A.B., Jantan, A.: An image encryption approach using a combination of permutation technique followed by encryption. Int. J. Comput. Sci. Netw. Secur. 8(4), 191\u2013197 (2008)","journal-title":"Int. J. Comput. Sci. Netw. Secur."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-015-1143-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00371-015-1143-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-015-1143-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-015-1143-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T10:58:14Z","timestamp":1559041094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00371-015-1143-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,28]]},"references-count":26,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["1143"],"URL":"https:\/\/doi.org\/10.1007\/s00371-015-1143-6","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,28]]}}}