{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:55:41Z","timestamp":1774965341186,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T00:00:00Z","timestamp":1443657600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11704-015-3362-4","type":"journal-article","created":{"date-parts":[[2015,3,6]],"date-time":"2015-03-06T16:46:07Z","timestamp":1425660367000},"page":"765-777","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A new encryption scheme for surveillance videos"],"prefix":"10.1007","volume":"9","author":[{"given":"Xiaochun","family":"Cao","sequence":"first","affiliation":[]},{"given":"Meili","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaojie","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Du","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,9]]},"reference":[{"key":"3362_CR1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1099396.1099399","volume-title":"Proceedings of the 3rd ACM International Workshop on Video Surveillance & Sensor Networks","author":"R Cucchiara","year":"2005","unstructured":"Cucchiara R. Multimedia surveillance systems. In: Proceedings of the 3rd ACM International Workshop on Video Surveillance & Sensor Networks. 2005: 3\u201310"},{"issue":"8","key":"3362_CR2","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1109\/TPAMI.2000.868676","volume":"22","author":"L Lee","year":"2000","unstructured":"Lee L, Romano R, Stein G. Introduction to the special section on video surveillance. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22(8): 745\u2013746","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"3362_CR3","first-page":"319","volume-title":"Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition","author":"I Cohen","year":"1999","unstructured":"Cohen I, Medioni G. Detecting and tracking moving objects for video surveillance. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 1999: 319\u2013325"},{"issue":"2","key":"3362_CR4","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MC.2006.55","volume":"39","author":"M Bramberger","year":"2006","unstructured":"Bramberger M, Doblander A, Maier A, Rinner B, Schwabach H. Distributed embedded smart cameras for surveillance applications. Computer, 2006, 39(2): 68\u201375","journal-title":"Computer"},{"key":"3362_CR5","volume-title":"Method for scrambling and unscrambling a video signal","author":"A Kudelski","year":"1994","unstructured":"Kudelski A. Method for scrambling and unscrambling a video signal. US Patent 5375168, 1994"},{"key":"3362_CR6","volume-title":"Video scrambling apparatus and method based on space filling curves","author":"Y Matias","year":"1991","unstructured":"Matias Y, Shamir A. Video scrambling apparatus and method based on space filling curves. US Patent 5058158, 1991"},{"issue":"1","key":"3362_CR7","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TMM.2003.808817","volume":"5","author":"W Zeng","year":"2003","unstructured":"Zeng W, Lei S. Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia, 2003, 5(1): 118\u2013129","journal-title":"IEEE Transactions on Multimedia"},{"issue":"4","key":"3362_CR8","first-page":"279","volume":"10","author":"H K C Chang","year":"1997","unstructured":"Chang H K C, Liu J L. A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication, 1997, 10(4): 279\u2013290","journal-title":"Signal Processing: Image Communication"},{"issue":"8","key":"3362_CR9","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H Cheng","year":"2000","unstructured":"Cheng H, Li X. Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 2000, 48(8): 2439\u20132451","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"7","key":"3362_CR10","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1364\/OL.20.000767","volume":"20","author":"P Refregier","year":"1995","unstructured":"Refregier P, Javidi B. Optical image encryption based on input plane and Fourier plane random encoding. Optics Letters, 1995, 20(7): 767\u2013769","journal-title":"Optics Letters"},{"issue":"6","key":"3362_CR11","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N Bourbakis","year":"1992","unstructured":"Bourbakis N, Alexopoulos C. Picture data encryption using SCAN patterns. Pattern Recognition, 1992, 25(6): 567\u2013581","journal-title":"Pattern Recognition"},{"issue":"2","key":"3362_CR12","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/S0164-1212(01)00029-2","volume":"58","author":"C C Chang","year":"2001","unstructured":"Chang C C, Hwang M S, Chen T S. A new encryption algorithm for image cryptosystems. Journal of Systems and Software, 2001, 58(2): 83\u201391","journal-title":"Journal of Systems and Software"},{"issue":"11","key":"3362_CR13","doi-asserted-by":"crossref","first-page":"12033","DOI":"10.1364\/OE.18.012033","volume":"18","author":"Z Liu","year":"2010","unstructured":"Liu Z, Guo Q, Xu L, Ahmad M A, Liu S. Double image encryption by using iterative random binary encoding in gyrator domains. Opt. Express, 2010, 18(11): 12033\u201312043","journal-title":"Express"},{"key":"3362_CR14","first-page":"577","volume-title":"Proceedings of the 2011 ACM International Conference on Communication, Computing & Security","author":"A K Acharya","year":"2011","unstructured":"Acharya A K. Image encryption using a new chaos based encryption algorithm. In: Proceedings of the 2011 ACM International Conference on Communication, Computing & Security. 2011: 577\u2013581"},{"issue":"08","key":"3362_CR15","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S. Some basic cryptographic requirements for chaosbased cryptosystems. International Journal of Bifurcation and Chaos, 2006, 16(08): 2129\u20132151","journal-title":"International Journal of Bifurcation and Chaos"},{"issue":"2","key":"3362_CR16","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1117\/1.482647","volume":"7","author":"J Scharinger","year":"1998","unstructured":"Scharinger J. Fast encryption of image data using chaotic Kolmogorov flows. Journal of Electronic Imaging, 1998, 7(2): 318\u2013325","journal-title":"Journal of Electronic Imaging"},{"issue":"3","key":"3362_CR17","first-page":"249","volume":"27","author":"M Fran\u00e7ois","year":"2012","unstructured":"Fran\u00e7ois M, Grosges T, Barchiesi D, Erra R. A new image encryption scheme based on a chaotic function. Signal Processing: Image Communication, 2012, 27(3): 249\u2013259","journal-title":"Signal Processing: Image Communication"},{"key":"3362_CR18","first-page":"21","volume-title":"Proceedings of the 1st International Conference on Imaging Science System and Technology","author":"L Qiao","year":"1997","unstructured":"Qiao L, Nahrstedt K. A new algorithm for MPEG video encryption. In: Proceedings of the 1st International Conference on Imaging Science System and Technology. 1997: 21\u201329"},{"key":"3362_CR19","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/ITCC.2001.918783","volume-title":"Proceedings of the IEEE International Conference Information Technology: Coding and Computing","author":"A S Tosun","year":"2001","unstructured":"Tosun A S, Feng W. Lightweight security mechanisms for wireless video transmission. In: Proceedings of the IEEE International Conference Information Technology: Coding and Computing. 2001, 157\u2013161"},{"key":"3362_CR20","first-page":"12","volume":"FIPS-197","author":"N Aes","year":"2001","unstructured":"Aes N. Advanced encryption standard. Federal Information Processing Standard, 2001, FIPS-197: 12","journal-title":"Federal Information Processing Standard"},{"key":"3362_CR21","first-page":"64","volume-title":"Proceedings of the 10th IEEE International Conference on Multimedia Modelling","author":"Z Liu","year":"2004","unstructured":"Liu Z, Li X. Motion vector encryption in multimedia streaming. In: Proceedings of the 10th IEEE International Conference on Multimedia Modelling. 2004: 64\u201371"},{"issue":"1","key":"3362_CR22","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TMM.2003.808817","volume":"5","author":"W Zeng","year":"2003","unstructured":"Zeng W, Lei S. Efficient frequency domain selective scrambling of digital video. IEEE Transactions on Multimedia, 2003, 5(1): 118\u2013129","journal-title":"IEEE Transactions on Multimedia"},{"key":"3362_CR23","volume-title":"Proceedings of the IEEE International Conference on Image Processing","author":"W Zeng","year":"2004","unstructured":"Zeng W, Zhuang X, Lan J. Network friendly media security: rationals, solutions, and open issues. In: Proceedings of the IEEE International Conference on Image Processing. 2004"},{"issue":"6","key":"3362_CR24","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1109\/TCSVT.2002.800321","volume":"12","author":"J Wen","year":"2002","unstructured":"Wen J, Severa M, Zeng W, Luttrell M H, Jin W. A format-compliant configurable encryption framework for access control of video. IEEE Transactions on Circuits and Systems for Video Technology, 2002, 12(6): 545\u2013557","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"4","key":"3362_CR25","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/S0097-8493(98)00033-8","volume":"22","author":"L Qiao","year":"1998","unstructured":"Qiao L, Nahrstedt K. Comparison of MPEG encryption algorithms. Computers & Graphics, 1998, 22(4): 437\u2013448","journal-title":"Computers & Graphics"},{"issue":"1","key":"3362_CR26","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1023\/B:MTAP.0000033983.62130.00","volume":"24","author":"B Bhargava","year":"2004","unstructured":"Bhargava B, Shi C, Wang S Y. MPEG video encryption algorithms. Multimedia Tools and Applications, 2004, 24(1): 57\u201379","journal-title":"Multimedia Tools and Applications"},{"key":"3362_CR27","first-page":"8","volume-title":"Proceedings of the IEEE International Symposium on Multimedia","author":"Z Liu","year":"2005","unstructured":"Liu Z, Peng D, Zheng Y, Liu J. Communication protection in IP-based video surveillance systems. In: Proceedings of the IEEE International Symposium on Multimedia. 2005, 8"},{"key":"3362_CR28","first-page":"II-1110","volume":"2","author":"K S Ntalianis","year":"2005","unstructured":"Ntalianis K S, Kollias S D. Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant Sboxes. In: Proceedings of the IEEE International Conference on Image Processing. IEEE, 2005, 2: II-1110\u201313","journal-title":"Proceedings of the IEEE International Conference on Image Processing"},{"key":"3362_CR29","first-page":"60","volume-title":"Proceedings of the International Conference on Multimedia and Ubiquitons Engineering","author":"E Choo","year":"2007","unstructured":"Choo E, Lee J, Lee H, Nam G. SRMT: a lightweight Encryption scheme for secure real-time multimedia Transmission. In: Proceedings of the International Conference on Multimedia and Ubiquitons Engineering. 2007, 60\u201365"},{"key":"3362_CR30","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1145\/2502081.2502145","volume-title":"Proceedings of the 21st ACM International Conference or Multimedia","author":"X Guo","year":"2013","unstructured":"Guo X, Li S, Cao X. Motion matters: a novel framework for compressing surveillance videos. In: Proceedings of the 21st ACM International Conference or Multimedia. 2013, 549\u2013552"},{"issue":"3","key":"3362_CR31","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1970392.1970395","volume":"58","author":"E J Cand\u00e8s","year":"2011","unstructured":"Cand\u00e8s E J, Li X, Ma Y, Wright J. Robust principal component analysis? Journal of the ACM (JACM), 2011, 58(3): 11","journal-title":"Journal of the ACM (JACM)"},{"key":"3362_CR32","first-page":"33","volume-title":"Proceedings of the 28th International Conference on Machine Learning","author":"T Zhou","year":"2011","unstructured":"Zhou T, Tao D. Godec: randomized low-rank & sparse matrix decomposition in noisy case. In: Proceedings of the 28th International Conference on Machine Learning. 2011: 33\u201340"},{"key":"3362_CR33","volume-title":"The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices","author":"Z Lin","year":"2010","unstructured":"Lin Z, Chen M, Ma Y. The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. 2010, arXiv:1009.5055"},{"key":"3362_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0055716","volume":"1462","author":"D Bleichenbacher","year":"1998","unstructured":"Bleichenbacher D. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1. Lecture Notes in Computer Science, 1998, 1462: 1\u201312","journal-title":"Lecture Notes in Computer Science"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-015-3362-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-015-3362-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-015-3362-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T18:46:11Z","timestamp":1566413171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-015-3362-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":34,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["3362"],"URL":"https:\/\/doi.org\/10.1007\/s11704-015-3362-4","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10]]}}}