{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:06:28Z","timestamp":1767006388577,"version":"3.37.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2009,8,30]],"date-time":"2009-08-30T00:00:00Z","timestamp":1251590400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s11760-009-0131-6","type":"journal-article","created":{"date-parts":[[2009,8,29]],"date-time":"2009-08-29T06:56:16Z","timestamp":1251528976000},"page":"419-427","source":"Crossref","is-referenced-by-count":24,"title":["JPEG image encryption using fuzzy PN sequences"],"prefix":"10.1007","volume":"4","author":[{"given":"B. K.","family":"ShreyamshaKumar","sequence":"first","affiliation":[]},{"given":"Chidamber R.","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,30]]},"reference":[{"key":"131_CR1","unstructured":"Yen, J.C., Guo, J.I.: A new image encryption system and its VLSI architecture. In: IEEE Workshop on Signal Processing Systems, Taipei, pp. 430\u2013437 (1999)"},{"key":"131_CR2","doi-asserted-by":"crossref","unstructured":"Balasubramanian, S.: Image encryption using infinite series convergence. In: Proceedings of the 18th International Conference on Systems Engineering (ISCEng), pp. 257\u2013262, August 2005","DOI":"10.1109\/ICSENG.2005.48"},{"key":"131_CR3","doi-asserted-by":"crossref","unstructured":"El-Khamy, S.E., Lotfy, M., Ali, A.H.: A new color image encryption technique utilizing fuzzy pseudo-random bit generator. In: Proceedings of 22nd National Radio Science Conference (NRSC), pp. 185\u2013194, March 2005","DOI":"10.1109\/NRSC.2005.194001"},{"issue":"2","key":"131_CR4","first-page":"127","volume":"1","author":"A. Mitra","year":"2006","unstructured":"Mitra A., Subba Rao Y.V., Prasanna S.R.M.: A new image encryption approach using combinational permutation techniques. Int. J. Comput. Sci. 1(2), 127\u2013131 (2006)","journal-title":"Int. J. Comput. Sci."},{"issue":"2","key":"131_CR5","first-page":"132","volume":"1","author":"S.R.M. Prasanna","year":"2006","unstructured":"Prasanna S.R.M., Subba Rao Y.V., Mitra A.: An image encryption method with magnitude and phase manipulation using carrier images. Int. J. Comput. Sci. 1(2), 132\u2013137 (2006)","journal-title":"Int. J. Comput. Sci."},{"issue":"6","key":"131_CR6","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N. Bourbakis","year":"1992","unstructured":"Bourbakis N., Alexopoulos C.: Picture data encryption using SCAN pattern. Pattern Recognit. 25(6), 567\u2013581 (1992)","journal-title":"Pattern Recognit."},{"key":"131_CR7","doi-asserted-by":"crossref","unstructured":"Chen, C.S., Chen, R.J.: Image encryption and decryption using SCAN methodology. In: Proceedings of seventh International Conference on Parallel and Distributed Computing, Application and Technologies (PDCAT\u201906), pp. 61\u201366 (2006)","DOI":"10.1109\/PDCAT.2006.71"},{"key":"131_CR8","unstructured":"Pichler, F., Scharinger, J.: Efficient image encryption based on chaotic maps. In: Proceedings of 20th Workshop of the Austrian Association for Pattern Recognition, pp. 159\u2013170. Leibnitz, Austria (1996, preprint)"},{"key":"131_CR9","unstructured":"Li, S.,Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS\u201902), vol. 2, pp. 708\u2013711 (2002)"},{"key":"131_CR10","doi-asserted-by":"crossref","unstructured":"Socek, D., Li, S., Magliveras, S.S., Furht, B.: Enhanced 1-D chaotic key-based algorithm for image encryption. In: IEEE Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM\u201905), pp. 406\u2013408, September 2005","DOI":"10.1109\/SECURECOMM.2005.39"},{"key":"131_CR11","doi-asserted-by":"crossref","unstructured":"Gu, G., Han, G.: An enhanced chaos based image encryption algorithm. In: IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC\u201906), vol. 1, pp. 492\u2013495, September 2006","DOI":"10.1109\/ICICIC.2006.46"},{"issue":"1","key":"131_CR12","first-page":"53","volume":"52","author":"J.A.M. Rodriguez","year":"2006","unstructured":"Rodriguez J.A.M., Rodriguez-Vera R.: Image encryption based on phase encoding by means of a fringe pattern and computational algorithms. Revista Mexicana De F\u2019Isica 52(1), 53\u201363 (2006)","journal-title":"Revista Mexicana De F\u2019Isica"},{"key":"131_CR13","doi-asserted-by":"crossref","unstructured":"Gurijala, A., Khayam, S.A., Radha, H., Deller, J.R. Jr.: On encryption-compression tradeoff pre\/post-filtered images. In: SPIE Conference on Mathematics of Data\/Image Coding, Compression and Encryption VIII with Applications, San Diego CA, vol. 5915, No. 1, pp. 591\u2013601, August 2005","DOI":"10.1117\/12.619896"},{"issue":"10","key":"131_CR14","doi-asserted-by":"crossref","first-page":"1485","DOI":"10.1109\/83.718488","volume":"7","author":"T.S. Chen","year":"1998","unstructured":"Chen T.S., Chang C.C., Hwang M.S.: A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process. 7(10), 1485\u20131488 (1998)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"131_CR15","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/78.852023","volume":"48","author":"H. Cheng","year":"2000","unstructured":"Cheng H., Li X.: Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 48(8), 2439\u20132451 (2000)","journal-title":"IEEE Trans. Signal Process."},{"key":"131_CR16","unstructured":"Droogenbroeck, M.V.: Partial encryption of images for real-time applications. In: Proceedings of fourth Benelux Signal Processing Symposium, pp. 11\u201315, April 2004"},{"key":"131_CR17","unstructured":"Puech, W., Rodrigues, J.M.: Crypto-compression of medical images by selective encryption of DCT. In: 13th European Signal Processing Conference, September 2005"},{"key":"131_CR18","unstructured":"Droogenbroeck, M.V., Benedett, R.: Techniques for a selective encryption of uncompressed and compressed images. In: Proceedings of Advanced Concepts for Intelligent Vision Systems (ACIVS\u201902), pp. 90\u201397, September 9\u201311, 2002"},{"key":"131_CR19","volume-title":"JPEG Still Image Compression Standard","author":"W.B. Pennebaker","year":"1993","unstructured":"Pennebaker W.B., Mitchell J.L.: JPEG Still Image Compression Standard. Van Nostrand Reinhold, New York (1993)"},{"key":"131_CR20","unstructured":"Lian, S., Sun, J., Wang, Z.: A novel image encryption scheme based-on JPEG encoding. In: Proceedings of the Eighth International Conference on Information Visualization, pp. 217\u2013220, July 2004"},{"issue":"1","key":"131_CR21","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TMM.2003.808817","volume":"5","author":"W. Zeng","year":"2003","unstructured":"Zeng W., Lei S.: Efficient frequency domain selective scrambling of digital video. IEEE Trans. Multimedia 5(1), 118\u2013129 (2003)","journal-title":"IEEE Trans. Multimedia"},{"key":"131_CR22","doi-asserted-by":"crossref","unstructured":"Dufaux, F., Ebrahimi, T.: Scrambling for video surveillance with privacy. In: Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW), pp. 160\u2013163, June 2006","DOI":"10.1109\/CVPRW.2006.184"},{"key":"131_CR23","doi-asserted-by":"crossref","unstructured":"Matias, Y., Shamir, A.: A video scrambling technique based on space filling curves. In: Proceedings of Advances in Cryptology\u2014CRYPTO\u201987. Springer LNCS, vol. 293, pp. 398\u2013417 (1987)","DOI":"10.1007\/3-540-48184-2_35"},{"issue":"10","key":"131_CR24","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1109\/12.5994","volume":"37","author":"L.T. Wang","year":"1988","unstructured":"Wang L.T., McCluskey E.J.: Linear feedback shift register design using cyclic codes. IEEE Trans. Comput. 37(10), 1302\u20131306 (1988)","journal-title":"IEEE Trans. Comput."},{"key":"131_CR25","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1016\/S0304-3975(00)00410-2","volume":"259","author":"A. Fuster","year":"2001","unstructured":"Fuster A., Garcia L.J.: An efficient algorithm to generate binary sequences for cryptographic purposes. Theor. Comput. Sci. 259, 679\u2013688 (2001)","journal-title":"Theor. Comput. Sci."},{"key":"131_CR26","doi-asserted-by":"crossref","unstructured":"El-Khamy, S.E., Lotfy, M., Ali, A.H.: A new fuzzy logic based pseudo-random bit generator for secure DS-CDMA Systems. In: 22nd URSI NRSC Conference, pp. 377\u2013384, March 2005","DOI":"10.1109\/NRSC.2005.194022"},{"key":"131_CR27","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, Ch. 8, pp. 409\u2013518. Pearson Education (Singapore) Pte. Ltd., Delhi, India (2004)"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-009-0131-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-009-0131-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-009-0131-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T22:32:53Z","timestamp":1739313173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-009-0131-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,30]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["131"],"URL":"https:\/\/doi.org\/10.1007\/s11760-009-0131-6","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2009,8,30]]}}}