{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:26:49Z","timestamp":1756636009676},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T00:00:00Z","timestamp":1671062400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s00530-022-01037-y","type":"journal-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T11:04:03Z","timestamp":1671102243000},"page":"1073-1087","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A multi-level approach with visual information for encrypted H.265\/HEVC videos"],"prefix":"10.1007","volume":"29","author":[{"given":"Wenying","family":"Wen","sequence":"first","affiliation":[]},{"given":"Rongxin","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,15]]},"reference":[{"key":"1037_CR1","doi-asserted-by":"crossref","unstructured":"Grois, D., Marpe, D., Mulayoff, A., et al.: Performance comparison of h. 265\/mpeg-hevc, vp9, and h. 264\/mpeg-avc encoders. In: 2013 Picture Coding Symposium (PCS). IEEE, pp. 394\u2013397 (2013)","DOI":"10.1109\/PCS.2013.6737766"},{"issue":"2","key":"1037_CR2","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1007\/s10489-020-01823-z","volume":"51","author":"O Elharrouss","year":"2021","unstructured":"Elharrouss, O., Almaadeed, N., Al-Maadeed, S., et al.: A combined multiple action recognition and summarization for surveillance video sequences. Appl. Intell. 51(2), 690\u2013712 (2021)","journal-title":"Appl. Intell."},{"issue":"12","key":"1037_CR3","doi-asserted-by":"publisher","first-page":"8065","DOI":"10.1007\/s00521-019-04312-8","volume":"32","author":"X Chai","year":"2020","unstructured":"Chai, X., Zheng, X., Gan, Z., et al.: Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput. Appl. 32(12), 8065\u20138088 (2020)","journal-title":"Neural Comput. Appl."},{"issue":"8","key":"1037_CR4","doi-asserted-by":"publisher","first-page":"3431","DOI":"10.1007\/s00521-018-3713-9","volume":"32","author":"J Hazarika","year":"2020","unstructured":"Hazarika, J., Dasgupta, R.: Neural correlates of action video game experience in a visuospatial working memory task. Neural Comput. Appl. 32(8), 3431\u20133440 (2020)","journal-title":"Neural Comput. Appl."},{"issue":"11","key":"1037_CR5","doi-asserted-by":"publisher","first-page":"9893","DOI":"10.1109\/TIE.2019.2956418","volume":"67","author":"Y Fang","year":"2019","unstructured":"Fang, Y., Ding, G., Wen, W., et al.: Salient object detection by spatiotemporal and semantic features in real-time video processing systems. IEEE Trans. Ind. Electron. 67(11), 9893\u20139903 (2019)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"12","key":"1037_CR6","doi-asserted-by":"publisher","first-page":"8828","DOI":"10.1007\/s10489-021-02329-y","volume":"51","author":"Z Gang","year":"2021","unstructured":"Gang, Z., Wenjuan, Z., Biling, H., et al.: A simple teacher behavior recognition method for massive teaching videos based on teacher set. Appl. Intell. 51(12), 8828\u20138849 (2021)","journal-title":"Appl. Intell."},{"issue":"2","key":"1037_CR7","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1007\/s11071-019-05378-8","volume":"99","author":"W Wen","year":"2020","unstructured":"Wen, W., Wei, K., Zhang, Y., et al.: Colour light field image encryption based on DNA sequences and chaotic systems. Nonlinear Dyn. 99(2), 1587\u20131600 (2020)","journal-title":"Nonlinear Dyn."},{"issue":"6","key":"1037_CR8","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1007\/s00521-020-05081-5","volume":"33","author":"A Kompella","year":"2021","unstructured":"Kompella, A., Kulkarni, R.V.: A semi-supervised recurrent neural network for video salient object detection. Neural Comput. Appl. 33(6), 2065\u20132083 (2021)","journal-title":"Neural Comput. Appl."},{"key":"1037_CR9","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.image.2019.08.010","volume":"78","author":"R Duvar","year":"2019","unstructured":"Duvar, R., Akbulut, O., Urhan, O.: Fast inter mode decision exploiting intra-block similarity in HEVC. Signal Process. Image Commun. 78, 503\u2013510 (2019)","journal-title":"Signal Process. Image Commun."},{"key":"1037_CR10","doi-asserted-by":"crossref","unstructured":"Teng, Y., Song, C., Wu, B.: Toward jointly understanding social relationships and characters from videos. Appl. Intell. 1\u201313 (2021)","DOI":"10.1007\/s10489-021-02738-z"},{"issue":"12","key":"1037_CR11","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1109\/TC.2002.1146712","volume":"51","author":"N Sklavos","year":"2002","unstructured":"Sklavos, N., Koufopavlou, O.: Architectures and VLSI implementations of the AES-proposal Rijndael. IEEE Trans. Comput. 51(12), 1454\u20131459 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"1037_CR12","unstructured":"Qiao, L., Nahrstedt, K.: A new algorithm for MPEG video encryption. In: Proc. of First International Conference on Imaging Science System and Technology, pp. 21\u201329 (1997)"},{"key":"1037_CR13","unstructured":"Shah, J., Saxena, D.: Video encryption: a survey. arXiv preprint arXiv:1104.0800, (2011)"},{"issue":"2","key":"1037_CR14","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1147\/sj.172.0106","volume":"17","author":"WF Ehrsam","year":"1978","unstructured":"Ehrsam, W.F., Matyas, S.M., Meyer, C.H., et al.: A cryptographic key management scheme for implementing the Data Encryption Standard. IBM Syst. J. 17(2), 106\u2013125 (1978)","journal-title":"IBM Syst. J."},{"issue":"2","key":"1037_CR15","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TCE.2006.1649688","volume":"52","author":"S Lian","year":"2006","unstructured":"Lian, S., Liu, Z., Ren, Z., et al.: Secure advanced video coding based on selective encryption algorithms. IEEE Trans. Consum. Electron. 52(2), 621\u2013629 (2006)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"1037_CR16","doi-asserted-by":"crossref","unstructured":"Van Wallendael, G., De Cock, J., Van Leuven S., et al.: Format-compliant encryption techniques for high efficiency video coding. In: 2013 IEEE International Conference on Image Processing. IEEE, pp. 4583\u20134587 (2013)","DOI":"10.1109\/ICIP.2013.6738944"},{"issue":"3","key":"1037_CR17","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1109\/TCE.2013.6626250","volume":"59","author":"G Van Wallendael","year":"2013","unstructured":"Van Wallendael, G., Boho, A., De Cock, J., et al.: Encryption for high efficiency video coding with video adaptation capabilities. IEEE Trans. Consum. Electron. 59(3), 634\u2013642 (2013)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"1037_CR18","unstructured":"Peng, F., Li, H.Y., Long, M.: An effective selective encryption scheme for HEVC based on rossler chaotic system. In: Proc. Int. Symp. Nonlinear Theory Appl., pp. 1\u20134 (2015)"},{"issue":"5","key":"1037_CR19","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TMM.2010.2050653","volume":"12","author":"W Wang","year":"2010","unstructured":"Wang, W., Hempel, M., Peng, D., et al.: On energy efficient encryption for video streaming in wireless sensor networks. IEEE Trans. Multimedia 12(5), 417\u2013426 (2010)","journal-title":"IEEE Trans. Multimedia"},{"key":"1037_CR20","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Zhuo, L., Niansheng, M., et al.: An object-based unequal encryption method for H. 264 compressed surveillance videos. In: 2012 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2012). IEEE, pp. 419\u2013424 (2012)","DOI":"10.1109\/ICSPCC.2012.6335618"},{"issue":"2","key":"1037_CR21","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/s11554-015-0509-3","volume":"12","author":"VA Memos","year":"2016","unstructured":"Memos, V.A., Psannis, K.E.: Encryption algorithm for efficient transmission of HEVC media. J. Real-Time Image Proc. 12(2), 473\u2013482 (2016)","journal-title":"J. Real-Time Image Proc."},{"issue":"4","key":"1037_CR22","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1109\/TCSVT.2015.2511879","volume":"27","author":"B Boyadjis","year":"2016","unstructured":"Boyadjis, B., Bergeron, C., Pesquet-Popescu, B., et al.: Extended selective encryption of H. 264\/AVC (CABAC)-and HEVC-encoded video streams. IEEE Trans. Circuits Syst. Video Technol. 27(4), 892\u2013906 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"1037_CR23","doi-asserted-by":"publisher","first-page":"2765","DOI":"10.1109\/TCSVT.2019.2924910","volume":"30","author":"F Peng","year":"2020","unstructured":"Peng, F., Zhang, X., Lin, Z.X., et al.: A tunable selective encryption scheme for H. 265\/HEVC based on chroma IPM and coefficient scrambling. IEEE Trans. Circuits Syst. Video Technol. 30(8), 2765\u20132780 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1037_CR24","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.image.2017.06.007","volume":"58","author":"W Hamidouche","year":"2017","unstructured":"Hamidouche, W., Farajallah, M., Sidaty, N., et al.: Real-time selective video encryption based on the chaos system in scalable HEVC extension. Signal Process. Image Commun. 58, 73\u201386 (2017)","journal-title":"Signal Process. Image Commun."},{"key":"1037_CR25","doi-asserted-by":"crossref","unstructured":"Tew, Y., Minemura, K., Wong, K.S.: HEVC selective encryption using transform skip signal and sign bin. In: 2015 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA). IEEE, pp. 963\u2013970 (2015)","DOI":"10.1109\/APSIPA.2015.7415415"},{"issue":"7","key":"1037_CR26","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1109\/TMM.2017.2777470","volume":"20","author":"AI Sallam","year":"2017","unstructured":"Sallam, A.I., Faragallah, O.S., El-Rabaie, E.S.M.: HEVC selective encryption using RC6 block cipher technique. IEEE Trans. Multimedia 20(7), 1636\u20131644 (2017)","journal-title":"IEEE Trans. Multimedia"},{"key":"1037_CR27","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.image.2017.05.006","volume":"57","author":"K Yang","year":"2017","unstructured":"Yang, K., Wan, S., Gong, Y., et al.: An efficient Lagrangian multiplier selection method based on temporal dependency for rate-distortion optimization in H. 265\/HEVC. Signal Process. Image Commun. 57, 68\u201375 (2017)","journal-title":"Signal Process. Image Commun."},{"key":"1037_CR28","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.optcom.2014.12.026","volume":"341","author":"W Wen","year":"2015","unstructured":"Wen, W., Zhang, Y., Fang, Z., et al.: Infrared target-based selective encryption by chaotic maps. Opt. Commun. 341, 131\u2013139 (2015)","journal-title":"Opt. Commun."},{"issue":"3","key":"1037_CR29","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s00521-016-2490-6","volume":"29","author":"W Wen","year":"2018","unstructured":"Wen, W., Zhang, Y., Fang, Y., et al.: Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput. Appl. 29(3), 653\u2013663 (2018)","journal-title":"Neural Comput. Appl."},{"issue":"10","key":"1037_CR30","doi-asserted-by":"publisher","first-page":"1688","DOI":"10.1109\/TIFS.2013.2259819","volume":"8","author":"F Peng","year":"2013","unstructured":"Peng, F., Zhu, X., Long, M.: An ROI privacy protection scheme for H. 264 video based on FMO and chaos. IEEE Trans. Inf. Forensics Secur. 8(10), 1688\u20131699 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"1037_CR31","doi-asserted-by":"publisher","first-page":"2309","DOI":"10.1109\/TCSVT.2016.2589742","volume":"27","author":"K Minemura","year":"2016","unstructured":"Minemura, K., Wong, K.S., Phan, R.C.W., et al.: A novel sketch attack for H 264\/AVC format-compliant encrypted video. IEEE Trans. Circuits Syst. Video Technol. 27(11), 2309\u20132321 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"1037_CR32","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1007\/s11042-016-3710-x","volume":"76","author":"F Peng","year":"2017","unstructured":"Peng, F., Gong, X., Long, M., et al.: A selective encryption scheme for protecting H. 264\/AVC video in multimedia social network. Multimedia Tools Appl. 76(3), 3235\u20133253 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"1037_CR33","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.image.2016.03.008","volume":"44","author":"M Gao","year":"2016","unstructured":"Gao, M., Fan, X., Zhao, D., et al.: An enhanced entropy coding scheme for HEVC. Signal Process. Image Commun. 44, 108\u2013123 (2016)","journal-title":"Signal Process. Image Commun."},{"issue":"6","key":"1037_CR34","doi-asserted-by":"publisher","first-page":"1022","DOI":"10.1109\/TMM.2016.2532606","volume":"18","author":"W Shen","year":"2016","unstructured":"Shen, W., Fan, Y., Bai, Y., et al.: A combined deblocking filter and SAO hardware architecture for HEVC. IEEE Trans. Multimedia 18(6), 1022\u20131033 (2016)","journal-title":"IEEE Trans. Multimedia"},{"key":"1037_CR35","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.image.2018.05.007","volume":"67","author":"S Jaballah","year":"2018","unstructured":"Jaballah, S., Larabi, M.C., Tahar, J.B.: Low complexity intra prediction mode decision for 3D-HEVC depth coding. Signal Process. Image Commun. 67, 34\u201347 (2018)","journal-title":"Signal Process. Image Commun."},{"key":"1037_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115644","volume":"80","author":"CH Fu","year":"2020","unstructured":"Fu, C.H., Chen, H., Chan, Y.L., et al.: Early termination for fast intra mode decision in depth map coding using DIS-inheritance. Signal Process. Image Commun. 80, 115644 (2020)","journal-title":"Signal Process. Image Commun."},{"key":"1037_CR37","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.image.2019.07.017","volume":"78","author":"NU Kim","year":"2019","unstructured":"Kim, N.U., Lim, S.C., Kang, J., et al.: Transform with residual rearrangement for HEVC intra coding. Signal Process. Image Commun. 78, 322\u2013330 (2019)","journal-title":"Signal Process. Image Commun."},{"key":"1037_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2019.106987","volume":"96","author":"Y Fang","year":"2019","unstructured":"Fang, Y., Zhang, X., Yuan, F., et al.: Video saliency detection by gestalt theory. Pattern Recogn. 96, 106987 (2019)","journal-title":"Pattern Recogn."},{"issue":"3","key":"1037_CR39","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1109\/TMM.2016.2625261","volume":"19","author":"DF de Souza","year":"2016","unstructured":"de Souza, D.F., Ilic, A., Roma, N., et al.: GHEVC: An efficient HEVC decoder for graphics processing units. IEEE Trans. Multimedia 19(3), 459\u2013474 (2016)","journal-title":"IEEE Trans. Multimedia"},{"key":"1037_CR40","unstructured":"Lipmaa, H., Rogaway, P., Wagner, D.: CTR-mode encryption. In: First NIST Workshop on Modes of Operation, p. 39 (2000)"},{"issue":"1","key":"1037_CR41","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/TMM.2013.2281029","volume":"16","author":"Z Shahid","year":"2013","unstructured":"Shahid, Z., Puech, W.: Visual protection of HEVC video by selective encryption of CABAC binstrings. IEEE Trans. Multimedia 16(1), 24\u201336 (2013)","journal-title":"IEEE Trans. Multimedia"},{"issue":"12","key":"1037_CR42","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/TCSVT.2012.2221191","volume":"22","author":"GJ Sullivan","year":"2012","unstructured":"Sullivan, G.J., Ohm, J.R., Han, W.J., et al.: Overview of the high efficiency video coding (HEVC) standard. IEEE Trans. Circuits Syst. Video Technol. 22(12), 1649\u20131668 (2012)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1037_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2019.07.003","volume":"130","author":"X Chang","year":"2020","unstructured":"Chang, X., Liang, X., Yan, Y., et al.: Guest editorial: image\/video understanding and analysis. Pattern Recogn. Lett. 130, 1\u20133 (2020)","journal-title":"Pattern Recogn. Lett."},{"issue":"4","key":"1037_CR44","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., et al.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"15","key":"1037_CR45","doi-asserted-by":"publisher","first-page":"11477","DOI":"10.1007\/s00521-019-04637-4","volume":"32","author":"C Lakshmi","year":"2020","unstructured":"Lakshmi, C., Thenmozhi, K., Rayappan, J.B.B., et al.: Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput. Appl. 32(15), 11477\u201311489 (2020)","journal-title":"Neural Comput. Appl."},{"key":"1037_CR46","doi-asserted-by":"crossref","unstructured":"Wen, W., Tu, R., Wei, K.: Video frames encryption based on DNA sequences and chaos. IN: Eleventh International Conference on Digital Image Processing (ICDIP 2019). International Society for Optics and Photonics, vol. 11179, p. 111792T (2019)","DOI":"10.1117\/12.2540057"},{"key":"1037_CR47","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237\u2013253 (2016)","journal-title":"Inf. Sci."},{"key":"1037_CR48","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.patcog.2018.03.023","volume":"81","author":"H Dong","year":"2018","unstructured":"Dong, H., Prasad, D.K., Chen, I.M.: Accurate detection of ellipses with false detection control at video rates using a gradient analysis. Pattern Recogn. 81, 112\u2013130 (2018)","journal-title":"Pattern Recogn."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-01037-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-022-01037-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-022-01037-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T14:10:47Z","timestamp":1685455847000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-022-01037-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,15]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["1037"],"URL":"https:\/\/doi.org\/10.1007\/s00530-022-01037-y","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,15]]},"assertion":[{"value":"29 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}