{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T20:43:52Z","timestamp":1700599432991},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1007\/s11042-006-5117-6","type":"journal-article","created":{"date-parts":[[2006,2,10]],"date-time":"2006-02-10T04:34:50Z","timestamp":1139546090000},"page":"5-22","source":"Crossref","is-referenced-by-count":17,"title":["Improving the compression and encryption of images using FPGA-based cryptosystems"],"prefix":"10.1007","volume":"28","author":[{"given":"Shih-Ching","family":"Ou","sequence":"first","affiliation":[]},{"given":"Hung-Yuan","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Wen-Tsai","family":"Sung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5117_CR1","unstructured":"A JAVA servlet implementation, by Cass Crockatt., A Visual Basic implementation, by P. Fresle, An implementation in C++, by Gerhard Wesp."},{"issue":"6","key":"5117_CR2","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1109\/83.766856","volume":"8","author":"Bing-Bing Chai","year":"June 1999","unstructured":"Bing-Bing Chai, J. Vass, and Xinhua Zhuang \u201cSignificance-linked connected component analysis for wavelet image coding,\u201d IEEE Transactions on Image Processing, Vol. 8, Issue: 6, pp. 774\u2013784, June 1999.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"8","key":"5117_CR3","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H. Cheng","year":"Aug. 2000","unstructured":"H. Cheng, Xiaobo Li, \u201cPartial encryption of compressed images and videos\u201d, IEEE Transactions on Signal Processing, Vol. 48, Issue: 8, pp. 2439 \u20132451, Aug. 2000.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5117_CR4","unstructured":"J. Daemen, V. Rijmen, AES Proposal: Rijndael,\u201d September 1999r."},{"issue":"3","key":"5117_CR5","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/30.883383","volume":"46","author":"Philip P. Dang","year":"Aug. 2000","unstructured":"Philip P. Dang and Paul M.Chau, \u201cImage encryption for secure internet multimedia applications,\u201d IEEE Transactions on Consumer Electronics, Vol. 46, Issue 3, pp. 395\u2013403, Aug. 2000.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"5117_CR6","unstructured":"K. Gaj and P. Chodowiec, Implementations of the AES Candidate Algorithms using FPGA Devices\u201d Technical Report, George Mason University, April 2000."},{"key":"5117_CR7","unstructured":"Benjamin Leperchey and Charles Hymans, \u201cFPGA implementation of the Rijndael algorithm\u201d June 16, 2000."},{"issue":"11\u201313","key":"5117_CR8","first-page":"1253","volume":"18","author":"X. Li","year":"Nov. 1997","unstructured":"X. Li, J. Knipe, and H. Cheng, \u201cImage compression and encryption using tree structures,\u201d Patt. Recogn. Lett., Vol.18, No. 11\u201313, pp.1253\u20131259, Nov. 1997.","journal-title":"Patt. Recogn. Lett."},{"key":"5117_CR9","unstructured":"Piotr Mroczkowski \u201cImplementation of the block cipher Rijndael using Altera FPGA\u201d."},{"issue":"3","key":"5117_CR10","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/4233.788579","volume":"3","author":"A. Munteanu","year":"Sept. 1999","unstructured":"A. Munteanu, J. Cornelis, G. Van Der Auwera, and P. Cristea, \u201cWavelet image compression\u2014the quadtree coding approach,\u201d IEEE Transactions on Information Technology in Biomedicine, Vol. 3, Issue: 3, pp. 176 \u2013185, Sept. 1999.","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"5117_CR11","unstructured":"National Bureau of Standards, Data Encryption Standard, U. S. Department of Commerce, FIPS pub.46, January 1997."},{"issue":"2","key":"5117_CR12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"Feb. 1978","unstructured":"R. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public key cryptosystems,\u201d Communications of the ACM, Vol. 21, No. 2, pp. 120\u2013126, Feb. 1978.","journal-title":"Communications of the ACM"},{"issue":"3","key":"5117_CR13","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/76.499834","volume":"6","author":"A. Said","year":"June 1996","unstructured":"A. Said, W.A. Pearlman, \u201cA new, fast, and efficient image codec based on set partitioning in hierarchical trees,\u201d IEEE Transactions on Circuits and Systems for Video Technology, Vol. 6, Issue: 3, pp. 243 \u2013250, June 1996.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"5117_CR14","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"C.E. Shannon, \u201cA mathematical theory of communication,\u201d Bell system technical journal, Vol. 27, No. 3, pp. 379, 1948.","journal-title":"Bell system technical journal"},{"issue":"12","key":"5117_CR15","doi-asserted-by":"crossref","first-page":"3445","DOI":"10.1109\/78.258085","volume":"41","author":"J.M. Shapiro","year":"Dec. 1993","unstructured":"Shapiro, J.M., \u201cEmbedded image coding using zerotrees of wavelet coefficients,\u201d IEEE Transactions on Signal Processing, Vol. 41, Issue: 12, pp. 3445\u20133462, Dec. 1993.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"5117_CR16","first-page":"530","volume":"1","author":"S.D. Servetto","year":"1995","unstructured":"S.D. Servetto, K. Ramchandran, and M.T. Orchard, \u201cWavelet based image coding via morphological prediction of significance,\u201d International Conference on Image Processing, 1995. Proceedings., Vol. 1, pp. 530\u2013533, 1995.","journal-title":"International Conference on Image Processing, 1995. Proceedings."},{"issue":"4","key":"5117_CR17","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1049\/ip-vis:19990556","volume":"146","author":"J.M. Zhong","year":"Aug. 1999","unstructured":"J.M. Zhong, C.H. Leung, and Tang, Y.Y., \u201cWavelet image coding based on significance extraction using morphological operations,\u201d Vision, Image and Signal Processing, IEE Proceedings-, Vol. 146 Issue: 4, pp. 206\u2013210, Aug. 1999.","journal-title":"Vision, Image and Signal Processing, IEE Proceedings-"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-006-5117-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-006-5117-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-006-5117-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T23:27:46Z","timestamp":1559345266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-006-5117-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["5117"],"URL":"https:\/\/doi.org\/10.1007\/s11042-006-5117-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,1]]}}}