{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:16:57Z","timestamp":1753521417744,"version":"3.40.4"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,10,27]],"date-time":"2012-10-27T00:00:00Z","timestamp":1351296000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11554-012-0282-5","type":"journal-article","created":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T06:51:44Z","timestamp":1351234304000},"page":"551-559","source":"Crossref","is-referenced-by-count":11,"title":["FPGA based simple and fast JPEG encryptor"],"prefix":"10.1007","volume":"10","author":[{"given":"B.","family":"Kishore","sequence":"first","affiliation":[]},{"given":"B. K.","family":"Shreyamsha Kumar","sequence":"additional","affiliation":[]},{"given":"Chidamber R.","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,27]]},"reference":[{"key":"282_CR1","doi-asserted-by":"crossref","unstructured":"Balasubramanian, S.: Image encryption using infinite series convergence. In: Proceedings of the 18th international conference on systems engineering (ISCEng), pp. 257\u2013262 (2005)","DOI":"10.1109\/ICSENG.2005.48"},{"issue":"6","key":"282_CR2","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N Bourbakis","year":"1992","unstructured":"Bourbakis, N., Alexopoulos, C.: Picture data encryption using SCAN pattern. Pattern Recognit 25(6), 567\u2013581 (1992)","journal-title":"Pattern Recognit"},{"key":"282_CR3","doi-asserted-by":"crossref","unstructured":"Chen, C.S., Chen, R.J.: Image encryption and decryption using SCAN methodology. In: Proceedings of seventh international conference on parallel and distributed computing, application and technologies (PDCAT\u201906), pp. 61\u201366 (2006)","DOI":"10.1109\/PDCAT.2006.71"},{"key":"282_CR4","doi-asserted-by":"crossref","unstructured":"Gu, G., Han, G.: An enhanced chaos based image encryption algorithm. In: IEEE proceedings of the first international conference on innovative computing, information and control (ICICIC\u201906), vol. 1, pp. 492\u2013495 (2006)","DOI":"10.1109\/ICICIC.2006.46"},{"key":"282_CR5","unstructured":"Pichler, F., Scharinger, J.: Efficient image encryption based on chaotic maps. In: Proceedings of 20th workshop of the Austrian Association for pattern recognition, pp. 159\u2013170, Leibnitz, Austria (1996)"},{"key":"282_CR6","doi-asserted-by":"crossref","unstructured":"Socek, D., Li, S., Magliveras, S.S., Furht, B.: Enhanced 1-D chaotic key-based algorithm for image encryption. In: IEEE proceedings of the first international conference on security and privacy for emerging areas in communications networks, pp. 406\u2013408 (2005)","DOI":"10.1109\/SECURECOMM.2005.39"},{"issue":"2","key":"282_CR7","first-page":"127","volume":"1","author":"A Mitra","year":"2006","unstructured":"Mitra, A., Subba Rao, Y.V., Prasanna, S.R.M.: A new image encryption approach using combinational permutation techniques. Int J Comput Sci 1(2), 127\u2013131 (2006)","journal-title":"Int J Comput Sci"},{"issue":"2","key":"282_CR8","first-page":"132","volume":"1","author":"SRM Prasanna","year":"2006","unstructured":"Prasanna, S.R.M., Subba Rao, Y.V., Mitra, A.: An image encryption method with magnitude and phase manipulation using carrier images. Int J Comput Sci 1(2), 132\u2013137 (2006)","journal-title":"Int J Comput Sci"},{"key":"282_CR9","unstructured":"Yen, J.C., Guo, J.I.: A new image encryption system and its VLSI architecture. In: IEEE workshop on signal processing systems, pp. 430\u2013437\u00b8 Taipei (1999)"},{"issue":"1","key":"282_CR10","first-page":"53","volume":"52","author":"JAM Rodriguez","year":"2006","unstructured":"Rodriguez, J.A.M., Rodriguez-Vera, R.: Image encryption based on phase encoding by means of a fringe pattern and computational algorithms. Revista Mexicana De F\u2032Isica 52(1), 53\u201363 (2006)","journal-title":"Revista Mexicana De F\u2032Isica"},{"key":"282_CR11","unstructured":"Droogenbroeck, M.V.: Partial encryption of images for real-time applications. In: Proceedings of fourth benelux signal processing symposium, pp. 11\u201315 (2004)"},{"key":"282_CR12","doi-asserted-by":"crossref","unstructured":"Gurijala, A., Khayam, S.A., Radha H., Deller, J.R., Jr.: On encryption-compression tradeoff pre\/post-filtered images. In: SPIE conference on mathematics of data\/image coding, compression and encryption VIII with applications, vol. 5915, no. 1, pp. 591\u2013601, San Diego (2005)","DOI":"10.1117\/12.619896"},{"issue":"10","key":"282_CR13","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1109\/83.718488","volume":"7","author":"TS Chen","year":"1998","unstructured":"Chen, T.S., Chang, C.C., Hwang, M.S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans Image Process 7(10), 1485\u20131488 (1998)","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"282_CR14","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H Cheng","year":"2000","unstructured":"Cheng, H., Li Partial, X.: Encryption of compressed images and videos. IEEE Trans Signal Process 48(8), 2439\u20132451 (2000)","journal-title":"IEEE Trans Signal Process"},{"key":"282_CR15","unstructured":"Puech, W., Rodriguesm, J.M.: Crypto-compression of medical images by selective encryption of DCT. In: 13th European signal processing conference, pp. 1\u20134 (2005)"},{"key":"282_CR16","unstructured":"Droogenbroeck, M.V., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of advanced concepts for intelligent vision systems (ACIVS\u201902), pp. 90\u201397 (2002)"},{"key":"282_CR17","volume-title":"JPEG still image compression standard","author":"WB Pennebaker","year":"1993","unstructured":"Pennebaker, W.B., Mitchell, J.L.: JPEG still image compression standard. Van Nostrand Reinhold, New York (1993)"},{"key":"282_CR18","doi-asserted-by":"crossref","unstructured":"Ken, C., Xiaoying, L., Chuanju, L.: SOPC based flexible architecture for JPEG encoder. In: Proceedings of 4th international conference on computer science and education, pp. 1151\u20131154 (2009)","DOI":"10.1109\/ICCSE.2009.5228486"},{"key":"282_CR19","unstructured":"Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of the eighth international conference on information visualization, pp. 217\u2013220 (2004)"},{"key":"282_CR20","doi-asserted-by":"crossref","unstructured":"Yang, B., Zhou, C.-Q., Busch, C., Niu, X.-M.: Transparent and perceptually enhanced JPEG image encryption. In: 16th international conference on digital signal processing (DSP), pp. 1\u20136 (2009)","DOI":"10.1109\/ICDSP.2009.5201075"},{"issue":"10","key":"282_CR21","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1109\/12.5994","volume":"37","author":"LT Wang","year":"1988","unstructured":"Wang, L.T., McCluskey, E.J.: Linear feedback shift register design using cyclic codes. IEEE Trans Comput 37(10), 1302\u20131306 (1988)","journal-title":"IEEE Trans Comput"},{"key":"282_CR22","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1016\/S0304-3975(00)00410-2","volume":"259","author":"A Fuster","year":"2001","unstructured":"Fuster, A., Garcia, L.J.: An efficient algorithm to generate binary sequences for cryptographic purposes. Theoret Comput Sci 259, 679\u2013688 (2001)","journal-title":"Theoret Comput Sci"},{"key":"282_CR23","doi-asserted-by":"crossref","unstructured":"El-Khamy, S.E., Lotfy M., Ali, A.H.: A new color image encryption technique utilizing fuzzy pseudo-random bit generator. In: Proceedings of 22nd national radio science conference (NRSC), pp. 185\u2013194 (2005)","DOI":"10.1109\/NRSC.2005.194001"},{"key":"282_CR24","doi-asserted-by":"crossref","unstructured":"El-Khamy, S.E.\u00b8 Lotfy, M., Ali, A.H.: A new fuzzy logic based pseudo-random bit generator for secure DS-CDMA systems. In: Proceedings of 22nd national radio science conference (NRSC), pp. 377\u2013384 (2005)","DOI":"10.1109\/NRSC.2005.194022"},{"issue":"4","key":"282_CR25","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/s11760-009-0131-6","volume":"4","author":"BK Shreyamsha Kumar","year":"2009","unstructured":"Shreyamsha Kumar, B.K., Patil, C.R.: JPEG image encryption using fuzzy PN sequences. SIViP 4(4), 419\u2013427 (2009)","journal-title":"SIViP"},{"key":"282_CR26","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital image processing. Pearson Education (Singapore) Pte. Ltd., Delhi, India, Ch. 8, pp. 409\u2013518 (2004)"},{"key":"282_CR27","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s11554-006-0012-y","volume":"1","author":"WV Dyck","year":"2006","unstructured":"Dyck, W.V., Smodic, R., Hufnagl, H., Berndorfer, T.: High-speed JPEG coder implementation for a smart camera. J Real-Time Image Process 1, 63\u201368 (2006). doi: 10.1007\/s11554-006-0012-y","journal-title":"J Real-Time Image Process"},{"key":"282_CR28","unstructured":"Agostini, L., Bampi, S.: Integrated digital architecture for JPEG image compression. In: European conference on circuit theory and design-III, Espoo, Finland, pp. 181\u2013184 (2001)"},{"key":"282_CR29","unstructured":"http:\/\/www.opencores.org"},{"issue":"9","key":"282_CR30","first-page":"371","volume":"9","author":"J Ahmad","year":"2009","unstructured":"Ahmad, J., Ebrahim, M.: FPGA based implementation of baseline JPEG decoder. Int J Electr Comput Sci 9(9), 371\u2013377 (2009)","journal-title":"Int J Electr Comput Sci"},{"key":"282_CR31","unstructured":"http:\/\/www.barcodesignservices.com"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-012-0282-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-012-0282-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-012-0282-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T18:17:40Z","timestamp":1745086660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-012-0282-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,27]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["282"],"URL":"https:\/\/doi.org\/10.1007\/s11554-012-0282-5","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2012,10,27]]}}}