{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:09:53Z","timestamp":1744898993409},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2017,4,13]],"date-time":"2017-04-13T00:00:00Z","timestamp":1492041600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11042-017-4525-0","type":"journal-article","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T22:28:58Z","timestamp":1492036138000},"page":"25421-25453","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Scrambling-based cryptography with a programmable SLM-based filter-triggered chaotic tent\/hologram mapping algorithm for secure H.264\/AVC video streaming over a WDM network"],"prefix":"10.1007","volume":"76","author":[{"given":"Yao-Tang","family":"Chang","sequence":"first","affiliation":[]},{"given":"Yih-Chuan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yu-Chang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei-Siang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,13]]},"reference":[{"issue":"18","key":"4525_CR1","first-page":"25","volume":"42","author":"S Ahadpour","year":"2012","unstructured":"Ahadpour S, Sadra Y, ArastehFrad Z (2012) A novel chaotic image encryption using generalized threshold function. Int J Comput Appl 42(18):25\u201331","journal-title":"Int J Comput Appl"},{"issue":"1","key":"4525_CR2","first-page":"449","volume":"9","author":"S Ahadpour","year":"2012","unstructured":"Ahadpour S, Sadra Y, ArastehFrad Z (2012) A novel chaotic encryption scheme based on pseudorandom bit padding. IJCSI Int J Comput Sci Issues 9(1):449\u2013456","journal-title":"IJCSI Int J Comput Sci Issues"},{"key":"4525_CR3","doi-asserted-by":"crossref","unstructured":"Baugher M, McGrew D, Naslund M, Carrara E, Norrman K (2004) The Secure Real-Time Transport Protocol (SRTP). IETF RFC 3711","DOI":"10.17487\/rfc3711"},{"issue":"8","key":"4525_CR4","doi-asserted-by":"crossref","first-page":"1931","DOI":"10.1109\/JLT.2007.901333","volume":"25","author":"Y-T Chang","year":"2007","unstructured":"Chang Y-T, Chuan-Ching S, Jen-Fa H (2007) Robust design for reconfigurable coder\/decoders to protect against eavesdropping in spectral amplitude coding optical CDMA networks. IEEE J Lightwave Technol 25(8):1931\u20131948","journal-title":"IEEE J Lightwave Technol"},{"key":"4525_CR5","doi-asserted-by":"crossref","unstructured":"Chang Y-T, Lin Y-C (2015) Dynamic reconfigurable encryption and decryption with chaos\/M-sequence mapping algorithm for secure H.264\/AVC video streaming over OCDMA passive optical network. Multimedia Tools Appl 75(16):9837\u20139859","DOI":"10.1007\/s11042-015-2784-1"},{"key":"4525_CR6","doi-asserted-by":"crossref","unstructured":"Chang YT, Tsailin CW (2015) Dynamic scrambling scheme of arrayed-waveguide grating-based encryptors and decryptors for protection against eavesdropping. Comput Electr Eng","DOI":"10.1016\/j.compeleceng.2015.07.004"},{"key":"4525_CR7","doi-asserted-by":"crossref","unstructured":"Chang Y-T, Lin Y-C, Chen Y-C, Liou Y-T (2017) Scrambling cryptography using programmable SLM-Based filter for video streaming over a WDM network. In: Barneva RP, Brimkov VE, Tavares JMR (eds) Computational modeling of objects presented in images fundamentals, methods, and applications, LNCS, vol. 10149. Springer International Publishing, Cham","DOI":"10.1007\/978-3-319-54609-4_18"},{"issue":"8","key":"4525_CR8","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H Cheng","year":"2000","unstructured":"Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48(8):2439\u20132451","journal-title":"IEEE Trans Signal Process"},{"issue":"4","key":"4525_CR9","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/TCE.2003.1196410","volume":"48","author":"F Chiaraluce","year":"2002","unstructured":"Chiaraluce F, Ciccarelli L, Gambi E, Pierleoni P, Reginelli M (2002) A new chaotic algorithm for video encryption. IEEE Trans Consum Electron 48(4):838\u2013844","journal-title":"IEEE Trans Consum Electron"},{"key":"4525_CR10","volume-title":"An introduction to chaotic dynamical systems","author":"R Devaney","year":"1989","unstructured":"Devaney R (1989) An introduction to chaotic dynamical systems, 2nd edn. Addison-Wesley, Redwood City","edition":"2"},{"key":"4525_CR11","doi-asserted-by":"crossref","DOI":"10.1002\/0471478342","volume-title":"IP over WDM: building the next-generation optical internet","author":"S Dixit","year":"2003","unstructured":"Dixit S (2003) IP over WDM: building the next-generation optical internet. John Wiley and Sons, Inc., New Jersey"},{"issue":"8","key":"4525_CR12","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1109\/TCSVT.2008.928225","volume":"18","author":"F Dufaux","year":"2008","unstructured":"Dufaux F, Ebrahimi T (2008) Scrambling for privacy protection in video surveillance systems. IEEE Trans Circ Syst Video Technol 18(8):1168\u20131174","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"4525_CR13","doi-asserted-by":"crossref","first-page":"773","DOI":"10.4236\/am.2015.65073","volume":"6","author":"S Etemadi Borujeni","year":"2015","unstructured":"Etemadi Borujeni S, Ehsani MS (2015) Modified logistic maps for cryptographic application. Appl Math 6:773\u2013782","journal-title":"Appl Math"},{"key":"4525_CR14","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.procs.2014.07.024","volume":"34","author":"J-F Huang","year":"2014","unstructured":"Huang J-F, Meng S-H, Lin Y-C, Chen K-S, Huang A-C (2014) Using wavelength\/time signature scrambling to realize cryptographic coded-WDM data network. Procedia Comput Sci 34:39\u201346","journal-title":"Procedia Comput Sci"},{"issue":"11","key":"4525_CR15","doi-asserted-by":"crossref","first-page":"115101","DOI":"10.1117\/1.OE.53.11.115101","volume":"53","author":"J-F Huang","year":"2014","unstructured":"Huang J-F, Meng S-H, Lin Y-C (2014) Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration. Opt Eng 53(11):115101","journal-title":"Opt Eng"},{"issue":"2","key":"4525_CR16","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1006\/ofte.1996.0017","volume":"2","author":"N Karafolas","year":"1996","unstructured":"Karafolas N, Uttamchandani D (1996) Optical fiber code division multiple access networks: a review. Opt Fiber Technol 2(2):149\u2013168","journal-title":"Opt Fiber Technol"},{"key":"4525_CR17","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/50.372451","volume":"13","author":"M Kavehrad","year":"1995","unstructured":"Kavehrad M, Zaccarin D (1995) Optical code-division-multiplexed systems based on spectral encoding of noncoherent sources. IEEE J Lightwave Technol 13:534\u2013545","journal-title":"IEEE J Lightwave Technol"},{"key":"4525_CR18","doi-asserted-by":"crossref","unstructured":"Kim KS (2003) On the evolution of PON-based FTTH solutions. Inf Sci 149:21\u201330","DOI":"10.1016\/S0020-0255(02)00241-4"},{"issue":"4","key":"4525_CR19","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1109\/JLT.2006.871030","volume":"24","author":"K Kitayama","year":"2006","unstructured":"Kitayama K, Wang X, Wada N (2006) OCDMA over WDM PON\u2014solution path to gigabit-symmetric FTTH. J Lightwave Technol 24(4):1654\u20131662","journal-title":"J Lightwave Technol"},{"key":"4525_CR20","doi-asserted-by":"crossref","unstructured":"Kocarev L, Lian S (eds) (2011) Chaos-based cryptography-theory, algorithm and application. Springer, Heidelberg","DOI":"10.1007\/978-3-642-20542-2"},{"key":"4525_CR21","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/35.983910","volume":"40","author":"G Kramer","year":"2002","unstructured":"Kramer G, Pesavento G (2002) Ethernet passive optical network (EPON): building a next-generation optical access network. IEEE Commun Mag 40:66\u201373","journal-title":"IEEE Commun Mag"},{"issue":"10","key":"4525_CR22","doi-asserted-by":"crossref","first-page":"985","DOI":"10.2307\/2318254","volume":"82","author":"TY Li","year":"1975","unstructured":"Li TY, Yorke JA (1975) Period three implies chaos. Am Math Mon 82(10):985\u2013992","journal-title":"Am Math Mon"},{"issue":"8","key":"4525_CR23","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1109\/26.231965","volume":"41","author":"SV Marhic","year":"1993","unstructured":"Marhic SV, Kostic ZI, Titlebaum EL (1993) A new family of optical code sequences for use in spread spectrum fiber-optic local area networks. IEEE Trans Commun 41(8):1217\u20131221","journal-title":"IEEE Trans Commun"},{"key":"4525_CR24","doi-asserted-by":"crossref","unstructured":"Massoudi A, Lefebvre F, De Vleeschouwer C, Macq B, Quisquater J-J (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Sec, Article ID 179290, 18 pages","DOI":"10.1155\/2008\/179290"},{"issue":"5560","key":"4525_CR25","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1038\/261459a0","volume":"261","author":"RM May","year":"1976","unstructured":"May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459\u2013467","journal-title":"Nature"},{"key":"4525_CR26","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.imavis.2006.02.021","volume":"24","author":"NK Pareek","year":"2006","unstructured":"Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vision Comput 24:926\u2013934","journal-title":"Image Vision Comput"},{"key":"4525_CR27","doi-asserted-by":"crossref","unstructured":"Parker MC, Cohen AD, Mears RJ (1998) Dynamic digital holographic wavelength filtering. J Lightwave Technol 16(7)","DOI":"10.1109\/50.701404"},{"key":"4525_CR28","unstructured":"Petzold C (1998) Programming Windows\u00ae, 5th edn. Microsoft Press"},{"key":"4525_CR29","unstructured":"Sakthidasan@Sankaran K, Santhosh Krishna BV (2011) A new chaotic algorithm for image encryption and decryption of digital color images. Int J Inf Educ Technol 1(2):137\u2013141"},{"issue":"8","key":"4525_CR30","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1109\/26.31181","volume":"37","author":"JA Salehi","year":"1989","unstructured":"Salehi JA (1989) Code division multiple-access techniques in optical fiber networks\u2014part I: fundamental principles. IEEE Trans Commun 37(8):824\u2013833","journal-title":"IEEE Trans Commun"},{"key":"4525_CR31","doi-asserted-by":"crossref","unstructured":"Shake TH (2005) Security performance of optical CDMA Against eavesdropping. J IEEE J Lightwave Technol 23(2):655\u2013670","DOI":"10.1109\/JLT.2004.838844"},{"issue":"4","key":"4525_CR32","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1109\/JLT.2005.844504","volume":"23","author":"TH Shake","year":"2005","unstructured":"Shake TH (2005) Confidentiality performance of spectral-phase-encoded optical CDMA. IEEE J Lightwave Technol 23(4):1652\u20131663","journal-title":"IEEE J Lightwave Technol"},{"key":"4525_CR33","unstructured":"S\u00fchring K (2009) H.264\/AVC reference software group [On-line]. Available: http:\/\/iphome.hhi.de\/suehring\/tml\/ Joint Model 12.2 (JM12.2)"},{"key":"4525_CR34","doi-asserted-by":"crossref","unstructured":"Tseng SP, Wu J (2011) The SAC OCDMA PON with super perfect difference code. IEEE Int Conf Commun","DOI":"10.1109\/icc.2011.5962485"},{"key":"4525_CR35","unstructured":"Wiegand T, Sullivan GJ, Bjontegaard G, Luthra A (2003) Overview of the H.264\/AVC video coding standard. IEEE Trans Circuits Syst Video Technol 13(7):560,576"},{"issue":"9","key":"4525_CR36","doi-asserted-by":"crossref","first-page":"3738","DOI":"10.1364\/OE.14.003738","volume":"14","author":"BB Wu","year":"2006","unstructured":"Wu BB, Narimanov EE (2006) A method for secure communications over a public fiber-optical network. Opt Express 14(9):3738\u20133751","journal-title":"Opt Express"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4525-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4525-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4525-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T20:57:42Z","timestamp":1569013062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4525-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,13]]},"references-count":36,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["4525"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4525-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,13]]}}}