{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:22Z","timestamp":1740122842136,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:00:00Z","timestamp":1669766400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100002742","name":"Banaras Hindu University","doi-asserted-by":"publisher","award":["R\/Dev\/D\/IoE\/Seed Grant\/2020-21\/6031"],"award-info":[{"award-number":["R\/Dev\/D\/IoE\/Seed Grant\/2020-21\/6031"]}],"id":[{"id":"10.13039\/501100002742","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11042-022-14275-z","type":"journal-article","created":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T07:07:55Z","timestamp":1669792075000},"page":"18781-18797","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Joint image compression and encryption using set partitioning in hierarchical tree in MSVD domain"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2479-1153","authenticated-orcid":false,"given":"Ankita","family":"Vaish","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,30]]},"reference":[{"issue":"3","key":"14275_CR1","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1364\/AOP.1.000589","volume":"1","author":"A Alfalou","year":"2009","unstructured":"Alfalou A, Brosseau C (2009) Optical image compression and encryption methods. Adv Optics Photonics 1(3):589","journal-title":"Adv Optics Photonics"},{"key":"14275_CR2","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.optcom.2013.05.053","volume":"307","author":"A Alfalou","year":"2013","unstructured":"Alfalou A, Brosseau C (2013) Implementing compression and encryption of phase-shifting digital holograms for three-dimensional object reconstruction. Opt Commun 307:67\u201372","journal-title":"Opt Commun"},{"key":"14275_CR3","doi-asserted-by":"crossref","unstructured":"Alfalou A, Brosseau C, Abdallah N, Jridi M (2013) Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. Submitted to IEEE Trans Inf Theory:167\u2013175","DOI":"10.1364\/OE.21.008025"},{"key":"14275_CR4","doi-asserted-by":"crossref","unstructured":"Alfalou A, Elbouz M, Mansour A, Keryer G (2010) New spectral image compression method based on an optimal phase coding and the RMS duration principle. J Opt:12","DOI":"10.1088\/2040-8978\/12\/11\/115403"},{"key":"14275_CR5","doi-asserted-by":"crossref","unstructured":"Alfalou A, Mansour A, Elbouz M, Brosseau C (2011) Optical compression scheme to multiplex and simultaneously encode images. Optical Digital Image Process Fund Appl Wiley, NewYork:463","DOI":"10.1002\/9783527635245.ch21"},{"key":"14275_CR6","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.procs.2020.03.218","volume":"167","author":"P Chaudhary","year":"2020","unstructured":"Chaudhary P, Gupta R, Singh A, Majumder P (2020) A. Pandey, Joint image compression and encryption using a novel column-wise scanning and optimization algorithm. Procedia Comput Sci 167:244\u2013253","journal-title":"Procedia Comput Sci"},{"key":"14275_CR7","doi-asserted-by":"crossref","unstructured":"Gallager RG (1963) Low density parity check codes. Ph.D dissertation, 1963: MIT","DOI":"10.7551\/mitpress\/4347.001.0001"},{"key":"14275_CR8","doi-asserted-by":"crossref","unstructured":"Huang R, Rhee KH, Uchida S (2012) A parallel image encryption method based on compressive sensing. Multimed Tools Appl:123","DOI":"10.1007\/s11042-012-1337-0"},{"issue":"10","key":"14275_CR9","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1109\/TSP.2004.833860","volume":"52","author":"M Johnson","year":"2004","unstructured":"Johnson M, Ishwar P, Prabhakaran VM, Schonberg D, Ramchandran K (2004) On compressing encrypted data. IEEE Trans Signal Process 52 (10):2992\u20133006","journal-title":"IEEE Trans Signal Process"},{"issue":"25","key":"14275_CR10","doi-asserted-by":"publisher","first-page":"2102","DOI":"10.1049\/el:19971444","volume":"33","author":"P Jung","year":"1997","unstructured":"Jung P, Plechinger J (1997) Performance of rate compatible punctured turbo-codes for mobile radio applications. Electron Lett 33(25):2102\u20132103","journal-title":"Electron Lett"},{"key":"14275_CR11","unstructured":"Kamm JL (1998) SVD-based methods for signal and image restoration (Ph.D.thesis)"},{"key":"14275_CR12","unstructured":"Kang W, Liu N (2000) Compressing encrypted data and permutation cipher. Sub to IEEE Trans Inf Theory:167\u2013175"},{"issue":"11","key":"14275_CR13","doi-asserted-by":"publisher","first-page":"6989","DOI":"10.1109\/TIT.2012.2210752","volume":"58","author":"D Klinc","year":"2012","unstructured":"Klinc D, Hazay C, Jagmohan A, Krawczyk H, Rabin T (2012) On compression of data encrypted with block ciphers. IEEE Trans Inf Theory 58(11):6989\u20137001","journal-title":"IEEE Trans Inf Theory"},{"key":"14275_CR14","unstructured":"Kumar A, Makur A (2008) Distributed source coding based encryption and lossless compression of gray scale and color images. Proc MMSP:760\u2013764"},{"issue":"1","key":"14275_CR15","first-page":"1","volume":"C-23","author":"A Kumar","year":"2009","unstructured":"Kumar A, Makur A (2009) Lossy compression of encrypted image by compressing sensing technique. Proc TENCON 2009 IEEE Region 10 Conf C-23(1):1\u20136","journal-title":"Proc TENCON 2009 IEEE Region 10 Conf"},{"issue":"4","key":"14275_CR16","first-page":"729","volume":"436","author":"M Kumar","year":"2016","unstructured":"Kumar M, Vaish A (2016) An efficient compression of encrypted images using WDR coding. SocPros-2015 Springer Series Adv Intell Syst Comput 436 (4):729\u2013741","journal-title":"SocPros-2015 Springer Series Adv Intell Syst Comput"},{"key":"14275_CR17","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.dsp.2016.08.011","volume":"60","author":"M Kumar","year":"2017","unstructured":"Kumar M, Vaish A (2017) An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Process 60:81\u201389","journal-title":"Digital Signal Process"},{"key":"14275_CR18","unstructured":"Lazzeretti R, Barni M (2008) Lossless compression of encrypted gray-level and color images. Proc 16th Eur Signal Process Conf:1\u20135"},{"issue":"19","key":"14275_CR19","doi-asserted-by":"publisher","first-page":"1570","DOI":"10.1080\/09500340.2014.946565","volume":"61","author":"XB Liu","year":"2014","unstructured":"Liu XB, Mei WB, Du HQ (2014) Optical image encryption based on compressive sensing and chaos in the fractional fourier domain. J Mod Opt 61(19):1570\u20131577","journal-title":"J Mod Opt"},{"issue":"4","key":"14275_CR20","first-page":"1097","volume":"19","author":"W Liu","year":"2010","unstructured":"Liu W, Zeng W, Dong L, Yao Q (2010) Efficient compression of encrypted gray scale images. IEEE Trans Signal Process 19(4):1097\u20131102","journal-title":"IEEE Trans Signal Process"},{"key":"14275_CR21","doi-asserted-by":"publisher","first-page":"2514","DOI":"10.1016\/j.ijleo.2012.08.017","volume":"124","author":"P Lu","year":"2013","unstructured":"Lu P, Xu Z, Lu X, Liu X (2013) Digital image information encryption based on compressive sensing and double random-phase encoding technique. Optik 124:2514\u20132518","journal-title":"Optik"},{"key":"14275_CR22","first-page":"1708","volume":"46","author":"S Malini","year":"2015","unstructured":"Malini S, Moni RS (2015) Image denoising using multiresolution singular value decomposition transform. ICICT 46:1708\u20131715","journal-title":"ICICT"},{"key":"14275_CR23","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/26.46532","volume":"38","author":"MW Marcellin","year":"1990","unstructured":"Marcellin MW, Fischer TR (1990) Trellis coded quantization of memoryless and Gauss-Markov sources. IEEE Trans Commun 38:82\u201393","journal-title":"IEEE Trans Commun"},{"key":"14275_CR24","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1109\/TIT.2002.808103","volume":"49","author":"SS Pradhan","year":"2003","unstructured":"Pradhan SS, Ramchandran K (2003) Distributed source coding using syndromes (DISCUS): design and construction. IEEE Trans Inform Theory 49:626\u2013643","journal-title":"IEEE Trans Inform Theory"},{"issue":"6","key":"14275_CR25","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1016\/j.imavis.2006.07.004","volume":"25","author":"A Ranade","year":"2007","unstructured":"Ranade A, Mahabalarao SS, Kale S (2007) A variation on SVD based image compression. Image Vis Comput 25(6):771\u2013777","journal-title":"Image Vis Comput"},{"key":"14275_CR26","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Opt Lett 20:767\u2013769","journal-title":"Opt Lett"},{"issue":"3","key":"14275_CR27","first-page":"242","volume":"7","author":"A Said","year":"1996","unstructured":"Said A, Pearlman WA (1996) A new, fast and efficienct image codec based on set partitioning in hierarchical trees. IEEE Trans Circuit Syst Video Technol 7(3):242\u2013250","journal-title":"IEEE Trans Circuit Syst Video Technol"},{"issue":"3","key":"14275_CR28","first-page":"112","volume":"128","author":"D Schonberg","year":"1987","unstructured":"Schonberg D, Draper SC, Ramchandran K (1987) On compression of encrypted images. Proc IEEE Int Conf Image Process 128(3):112\u2013124","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"14275_CR29","unstructured":"Schonberg D, Draper SC, Ramchandran K (2005) On blind compression of encrypted correlated data approaching the source entropy rate. Proc 43rd Annu Allerton Conf Allerton, IL, USA"},{"issue":"4","key":"14275_CR30","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/TIFS.2008.2007244","volume":"3","author":"D Schonberg","year":"2008","unstructured":"Schonberg D, Draper SC, Yeo C, Ramchandran K (2008) Toward compression of encrypted images and video sequences. IEEE Trans Inf Forensics Secur 3(4):749\u2013762","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"14275_CR31","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/TIT.1973.1055037","volume":"IT-19","author":"D Slepian","year":"1973","unstructured":"Slepian D, Wolf JK (1973) Noiseless coding of correlated information sources. IEEE Trans Inform Theory IT-19:471\u2013480","journal-title":"IEEE Trans Inform Theory"},{"key":"14275_CR32","doi-asserted-by":"crossref","unstructured":"Vaish A, Kumar M (2015) Prediction error based compression of encrypted images, ICCCT-2015, ACM Digital Library:228\u2013232","DOI":"10.1145\/2818567.2818611"},{"key":"14275_CR33","doi-asserted-by":"crossref","unstructured":"Vaish A, Patel S (2022) A sparse representation based compression of fused images using WDR coding. J King Saud Univ - Comput Inf Sci Press","DOI":"10.1016\/j.jksuci.2022.02.002"},{"issue":"4","key":"14275_CR34","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"14275_CR35","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.image.2015.09.009","volume":"39","author":"C Wang","year":"2014","unstructured":"Wang C, Ni J, Huang Q (2014) A new encryption-then-compression algorithm using the ratedistortion optimization. Signal Process Image Commun 39:141\u2013150","journal-title":"Signal Process Image Commun"},{"key":"14275_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIT.1976.1055508","volume":"IT-22","author":"A Wyner","year":"1976","unstructured":"Wyner A, Ziv J (1976) The rate-distortion function for source coding with side information at the decoder. IEEE Trans Inform Theory IT-22:1\u201310","journal-title":"IEEE Trans Inform Theory"},{"issue":"8","key":"14275_CR37","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1080\/09720529.2021.2011102","volume":"24","author":"A Yadav","year":"2021","unstructured":"Yadav A, Saini B, Verma V, Pal V (2021) A joint medical image compression and encryption using AMBTC and hybrid chaotic system. J Discret Math Sci Cryptogr 24(8):2233\u20132244","journal-title":"J Discret Math Sci Cryptogr"},{"issue":"1","key":"14275_CR38","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/TIFS.2010.2099114","volume":"6","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Lossy compression and iterative reconstruction for encrypted image. IEEE Trans Inf Forensics Secur 6(1):53\u201358","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"14275_CR39","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.1109\/TIP.2012.2187671","volume":"21","author":"X Zhang","year":"2012","unstructured":"Zhang X, Feng G, Ren Y, Qian Z (2012) Scalable coding of encrypted images. IEEE Trans Image Process 21(6):3108\u20133114","journal-title":"IEEE Trans Image Process"},{"key":"14275_CR40","doi-asserted-by":"crossref","unstructured":"Zhang X, Ren Y, Feng G, Qian Z (2011) Compressing encrypted image using compressive sensing. IEEE Conf Intell Inf Hiding Multimed Signal Process:222\u2013225","DOI":"10.1109\/IIHMSP.2011.12"},{"key":"14275_CR41","doi-asserted-by":"crossref","unstructured":"Zhang X, Ren Y, Feng G, Qian Z (2011) Compressing encrypted image using compressive sensing. Seventh Int Conf Intell Inf Hiding Multimedias Signal Process (IIH-MSP):222\u2013225","DOI":"10.1109\/IIHMSP.2011.12"},{"issue":"5","key":"14275_CR42","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/TMM.2014.2315974","volume":"16","author":"X Zhang","year":"2014","unstructured":"Zhang X, Ren Y, Shen L, Qian Z, Feng G (2014) Compressing encrypted images with auxiliary information. IEEE Trans Multimed 16(5):1327\u20131336","journal-title":"IEEE Trans Multimed"},{"key":"14275_CR43","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/s11042-013-1392-1","volume":"72","author":"X Zhang","year":"2014","unstructured":"Zhang X, Sun G, Shen L, Qin C (2014) Compression of encrypted images with multilayer decomposition. Multimed Tools Appl 72:489\u2013502","journal-title":"Multimed Tools Appl"},{"key":"14275_CR44","doi-asserted-by":"publisher","first-page":"40838","DOI":"10.1109\/ACCESS.2020.2976798","volume":"8","author":"M Zhang","year":"2020","unstructured":"Zhang M, Tong X, Liu J, Wang Z, Liu J, Liu B, Ma J (2020) Image compression and encryption scheme based on compressive sensing and fourier transform. IEEE Access 8:40838\u201340849","journal-title":"IEEE Access"},{"key":"14275_CR45","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access:2507\u20132519","DOI":"10.1109\/ACCESS.2016.2569421"},{"key":"14275_CR46","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.optcom.2014.12.084","volume":"343","author":"N Zhou","year":"2015","unstructured":"Zhou N, Li H, Wang D, Pan S, Zhou Z (2015) Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform. Opt Commun 343:10\u201321","journal-title":"Opt Commun"},{"issue":"1","key":"14275_CR47","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TIFS.2013.2291625","volume":"9","author":"J Zhou","year":"2014","unstructured":"Zhou J, Liu X, Oscar CA, Tang YY (2014) Design an efficient encryption then compression system via prediction error clustering and random permutation. IEEE Trans Inf Forensic Secur 9(1):39\u201350","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"14275_CR48","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.optlastec.2016.02.018","volume":"82","author":"N Zhou","year":"2016","unstructured":"Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compressionencryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121\u2013133","journal-title":"Opt Laser Technol"},{"key":"14275_CR49","doi-asserted-by":"publisher","first-page":"5075","DOI":"10.1016\/j.ijleo.2014.06.054","volume":"125","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Wu J, Pei D, Yang Y (2014) Novel hybrid image compression-encryption algorithm based on compressive sensing. Optik 125:5075\u20135080","journal-title":"Optik"},{"key":"14275_CR50","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.optlastec.2014.02.015","volume":"62","author":"N Zhou","year":"2014","unstructured":"Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compressionencryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics Laser Technol 62:152\u201396160","journal-title":"Optics Laser Technol"},{"key":"14275_CR51","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.image.2013.02.004","volume":"28","author":"HG Zhu","year":"2013","unstructured":"Zhu HG, Zhao C, Zhang XD (2013) A novel image encryption-compression scheme using hyper-chaos and chinese remainder theorem. Signal Process-Image 28:670\u2013680","journal-title":"Signal Process-Image"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14275-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14275-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14275-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T15:10:49Z","timestamp":1682003449000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14275-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,30]]},"references-count":51,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["14275"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14275-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,11,30]]},"assertion":[{"value":"24 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}