{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T19:50:02Z","timestamp":1760644202402,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T00:00:00Z","timestamp":1686528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"British Heart Foundation Accelerator Award, UK","award":["AA\/18\/3\/34220"],"award-info":[{"award-number":["AA\/18\/3\/34220"]}]},{"name":"Royal Society International Exchanges Cost Share Award, UK","award":["RP202G0230"],"award-info":[{"award-number":["RP202G0230"]}]},{"name":"Hope Foundation for Cancer Research, UK","award":["RM60G0680"],"award-info":[{"award-number":["RM60G0680"]}]},{"name":"Medical Research Council Confidence in Concept Award, UK","award":["MC_PC_17171"],"award-info":[{"award-number":["MC_PC_17171"]}]},{"name":"Sino-UK Industrial Fund, UK","award":["RP202G0289"],"award-info":[{"award-number":["RP202G0289"]}]},{"name":"Global Challenges Research Fund (GCRF), UK","award":["P202PF11"],"award-info":[{"award-number":["P202PF11"]}]},{"name":"LIAS Pioneering Partnerships award, UK","award":["P202ED10"],"award-info":[{"award-number":["P202ED10"]}]},{"name":"Data Science Enhancement Fund, UK","award":["P202RE237"],"award-info":[{"award-number":["P202RE237"]}]},{"DOI":"10.13039\/501100000615","name":"Fight for Sight, UK","doi-asserted-by":"crossref","award":["24NN201"],"award-info":[{"award-number":["24NN201"]}],"id":[{"id":"10.13039\/501100000615","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Sino-UK Education Fund, UK","award":["OP202006"],"award-info":[{"award-number":["OP202006"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11760-023-02610-2","type":"journal-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T14:02:12Z","timestamp":1686578532000},"page":"3821-3828","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Development of scalable coding on encrypted images using BTC for different non-overlapping block size"],"prefix":"10.1007","volume":"17","author":[{"given":"Jeya Bright","family":"Pankiraj","sequence":"first","affiliation":[]},{"given":"Vishnuvarthanan","family":"Govindaraj","sequence":"additional","affiliation":[]},{"given":"Yudong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Pallikonda Rajasekaran","family":"Murugan","sequence":"additional","affiliation":[]},{"given":"R.","family":"Kottaimalai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"2610_CR1","doi-asserted-by":"publisher","first-page":"117508","DOI":"10.1016\/j.eswa.2022.117508","volume":"203","author":"W Ma","year":"2022","unstructured":"Ma, W., Zhou, T., Qin, J., Xiang, X., Tan, Y., Cai, Z.: A privacy-preserving content-based image retrieval method based on deep learning in cloud computing. Expert Syst. Appl. 203, 117508 (2022)","journal-title":"Expert Syst. Appl."},{"key":"2610_CR2","unstructured":"Markovskyi, O., Nikos, D., Mirataei, A., Nikos, B.: Method of protecting data processed by the discrete Fourier transform in remote computer systems. In: 12th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, (2022)"},{"key":"2610_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.isatra.2022.01.002","volume":"127","author":"Y Sun","year":"2022","unstructured":"Sun, Y., Xiao, H., Ding, D., Liu, S.: Secure filtering under adaptive event-triggering protocols with memory mechanisms. ISA Trans. 127, 13\u201321 (2022)","journal-title":"ISA Trans."},{"issue":"1","key":"2610_CR4","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/TIFS.2009.2036230","volume":"5","author":"T Bianchi","year":"2010","unstructured":"Bianchi, T., Piva, A., Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transform. Inf. Forensics Secur. 5(1), 180\u2013187 (2010)","journal-title":"IEEE Transform. Inf. Forensics Secur."},{"key":"2610_CR5","doi-asserted-by":"publisher","first-page":"21417","DOI":"10.1007\/s11042-022-12550-7","volume":"81","author":"A Kumar","year":"2022","unstructured":"Kumar, A.: A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving. Multimedia Tools Appl. 81, 21417\u201321448 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"2610_CR6","doi-asserted-by":"crossref","unstructured":"Heino, J., Gupta, A., Hakkala, A., Virtanen, S.: On usability of hash fingerprinting for endpoint application identification. In: IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, (2022)","DOI":"10.1109\/CSR54599.2022.9850305"},{"issue":"10","key":"2610_CR7","doi-asserted-by":"publisher","first-page":"2992","DOI":"10.1109\/TSP.2004.833860","volume":"52","author":"M Johnson","year":"2004","unstructured":"Johnson, M., Ishwar, P., Prabhakaran, V.M., Schonberg, D., Ramchandran, K.: On compressing encrypted data. IEEE Trans. Signal Process. 52(10), 2992\u20133006 (2004)","journal-title":"IEEE Trans. Signal Process."},{"key":"2610_CR8","unstructured":"Schonberg, D., Draper, S. C., Ramchandran, K.: On blind compression of encrypted correlated data approaching the source entropy rate. In: 43rd Annual Allerton Conference, Allerton, IL, USA (2005)"},{"key":"2610_CR9","unstructured":"Lazzeretti, R., Barni, M.: Lossless compression of encrypted grey level and color images. In: 16th European Signal Processing Conference, Lausanne, Switzerland, pp. 1\u20135 (2008)"},{"issue":"2","key":"2610_CR10","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/JETCAS.2021.3074938","volume":"11","author":"L Xilin","year":"2021","unstructured":"Xilin, L., Andrew, G., Richardson, J., Vander, S.: An energy-efficient compressed sensing-based encryption scheme for wireless neural recording. IEEE J. Emerg. Sel. Top. Circuits Syst. 11(2), 405\u2013414 (2021)","journal-title":"IEEE J. Emerg. Sel. Top. Circuits Syst."},{"issue":"1","key":"2610_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/TIFS.2010.2099114","volume":"6","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Lossy compression and iterative reconstruction for encrypted image. IEEE Transform. Inf. Forensics Secur. 6(1), 53\u201358 (2011)","journal-title":"IEEE Transform. Inf. Forensics Secur."},{"issue":"11","key":"2610_CR12","doi-asserted-by":"publisher","first-page":"1972","DOI":"10.1109\/83.877218","volume":"9","author":"A Bilgin","year":"2000","unstructured":"Bilgin, A., Sementilli, P.J., Sheng, F., Marcellin, M.W.: Scalable image coding using reversible integer wavelet transforms. IEEE Trans. Image Process. 9(11), 1972\u20131977 (2000)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"2610_CR13","doi-asserted-by":"publisher","first-page":"1158","DOI":"10.1109\/83.847830","volume":"9","author":"D Taubman","year":"2000","unstructured":"Taubman, D.: High performance scalable image compression with EBCOT. IEEE Trans. Image Process. 9(7), 1158\u20131170 (2000)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"2610_CR14","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.1109\/TIP.2012.2187671","volume":"21","author":"X Zhang","year":"2012","unstructured":"Zhang, X., Feng, G., Ren, Y., Qian, Z.: Scalable coding of encrypted images. IEEE Trans. Image Process. 21(6), 3108\u20133114 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"9","key":"2610_CR15","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TCOM.1979.1094560","volume":"27","author":"JD Edward","year":"1979","unstructured":"Edward, J.D., Robert Mitchell, O.: Image coding using block truncation coding. IEEE Trans. Commun. 27(9), 1335\u20131342 (1979)","journal-title":"IEEE Trans. Commun."},{"key":"2610_CR16","doi-asserted-by":"crossref","unstructured":"Jeya Bright, P., Vishnuvarthanan, G.: Development of a scalable coding for the encryption of images using block truncation code. In: 3rd International Conference on Trends in Electronics and Informatics (ICOEI 2019), Tirunelveli, India, pp. 934\u2013938 (2019)","DOI":"10.1109\/ICOEI.2019.8862525"},{"issue":"1","key":"2610_CR17","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.14704\/WEB\/V19I1\/WEB19109","volume":"19","author":"JB Pankiraj","year":"2022","unstructured":"Pankiraj, J.B., Govindaraj, V., Yudong, Z., Murugan, P.R., Milton, A.: Development of a scalable coding of encrypted images using Enhanced block truncation code. Webology 19(1), 1620\u20131639 (2022)","journal-title":"Webology"},{"key":"2610_CR18","doi-asserted-by":"crossref","unstructured":"Welstead, S.T.: Fractal and wavelet image compression techniques. SPIE Publication, TT40, pp. 155\u2013156 (1999)","DOI":"10.1117\/3.353798"},{"key":"2610_CR19","first-page":"168","volume-title":"Fractal image compression-document and image compression","author":"H Raouf","year":"2006","unstructured":"Raouf, H., Dietmar, S.: Fractal image compression-document and image compression, pp. 168\u2013169. CRC Press (2006)"},{"issue":"4","key":"2610_CR20","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.bbe.2019.05.007","volume":"39","author":"A Saravanan","year":"2019","unstructured":"Saravanan, A., Kartheeban, K., Vishnuvarthanan, G.: Multi-channeled MR brain image segmentation: a new automated approach combining BAT and clustering technique for better identification of heterogeneous tumors. J. Biocybern. Biomed. Eng. 39(4), 1005\u20131035 (2019)","journal-title":"J. Biocybern. Biomed. Eng."},{"key":"2610_CR21","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.jvcir.2017.06.012","volume":"48","author":"Y Ching-Nung","year":"2017","unstructured":"Ching-Nung, Y., Xiaotian, W., Yung-Chien, C., Zhangjie, F.: Constructions of general (k, n) reversible AMBTC based visual cryptography with two decryption options. J. Vis. Commun. Image Represent. 48, 182\u2013194 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"2610_CR22","doi-asserted-by":"publisher","first-page":"148439","DOI":"10.1109\/ACCESS.2019.2943505","volume":"7","author":"Y Zhan","year":"2019","unstructured":"Zhan, Y., Chia-Chen, L., Chin-Chen, C., Guo-Dong, S.: BF-DH: an enhanced payload hybrid data hiding method based on a hybrid strategy and block features. IEEE Access 7, 148439\u2013148452 (2019)","journal-title":"IEEE Access"},{"issue":"4","key":"2610_CR23","first-page":"329","volume":"28","author":"JC Chuang","year":"2006","unstructured":"Chuang, J.C., Chang, C.C.: Using a simple and fast image compression algorithm to hide secret information. Int. J. Comput. Appl. 28(4), 329\u2013333 (2006)","journal-title":"Int. J. Comput. Appl."},{"issue":"21","key":"2610_CR24","doi-asserted-by":"publisher","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","volume":"74","author":"D Ou","year":"2014","unstructured":"Ou, D., Sun, W.: High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimedia Tools Appl. 74(21), 9117\u20139139 (2014)","journal-title":"Multimedia Tools Appl."},{"key":"2610_CR25","doi-asserted-by":"publisher","first-page":"14151","DOI":"10.1007\/s11042-016-3815-2","volume":"76","author":"A Malik","year":"2017","unstructured":"Malik, A., Sikka, G., Verma, H.K.: A high payload data hiding scheme based on modified AMBTC technique. Multimedia Tools Appl. 76, 14151\u201314167 (2017)","journal-title":"Multimedia Tools Appl."},{"issue":"11","key":"2610_CR26","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1109\/TIFS.2014.2352455","volume":"9","author":"J Zhou","year":"2014","unstructured":"Zhou, J., Au, O.C., Zhai, G., Tang, Y.Y.: Scalable compression of stream cipher encrypted images through context-adaptive sampling. IEEE Trans. Inf. Forensics Secur. 9(11), 1857\u20131868 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"2610_CR27","doi-asserted-by":"publisher","first-page":"3823","DOI":"10.1007\/s11042-013-1801-5","volume":"74","author":"C-C Lin","year":"2013","unstructured":"Lin, C.-C., Liu, X.-L., Tai, W.-L., Yuan, S.-M.: A novel reversible data hiding scheme based on AMBTC compression technique. Multimedia Tools Appl. 74(11), 3823\u20133842 (2013)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"2610_CR28","first-page":"1","volume":"10","author":"C-C Lin","year":"2021","unstructured":"Lin, C.-C., Lin, J., Chang, C.-C.: Reversible data hiding for AMBTC compressed images based on matrix and Hamming coding. MDPI-Electron. 10(3), 1\u201320 (2021)","journal-title":"MDPI-Electron."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02610-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02610-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02610-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T11:26:47Z","timestamp":1692271607000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02610-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,12]]},"references-count":28,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["2610"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02610-2","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2023,6,12]]},"assertion":[{"value":"11 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There are no competing interests regarding the subject matter\/core part of the research being proposed through this paper, and there are no direct\/indirect financial involvements or competing interests in relevance throughout the articulation\/preparation of this research paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research article does not require any ethical clearance or approval at any means, and the article is no way connected or not requires any of the testing\/trials to be done on human or animal subjects, and it is mere technological oriented study that intends to improve the quality of the image compression through encoding and decoding techniques to augment secure data transmission over the internet facility or via any other public domains.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}