{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T19:25:02Z","timestamp":1748028302455},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T00:00:00Z","timestamp":1628640000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T00:00:00Z","timestamp":1628640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s42979-021-00793-4","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T18:02:33Z","timestamp":1628704953000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Real-Time Compressed Video Encryption: Based on Quasigroup on System on Chip (SOC)"],"prefix":"10.1007","volume":"2","author":[{"given":"Deepthi","family":"Haridas","sequence":"first","affiliation":[]},{"given":"D. Sree","family":"Kiran","sequence":"additional","affiliation":[]},{"given":"Shivi","family":"Patel","sequence":"additional","affiliation":[]},{"given":"K.","family":"Raghavendra","sequence":"additional","affiliation":[]},{"given":"Sarma","family":"Venkatraman","sequence":"additional","affiliation":[]},{"given":"Raghu","family":"Venkatraman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,11]]},"reference":[{"issue":"8","key":"793_CR1","doi-asserted-by":"publisher","first-page":"5092","DOI":"10.1016\/j.asoc.2011.05.050","volume":"11","author":"C-H Yuen","year":"2011","unstructured":"Yuen C-H, Wong K-W. A Class based joint image compression and encryption scheme using DCT and SHA-I. Appl Soft Comput. 2011;11(8):5092\u20138.","journal-title":"Appl Soft Comput"},{"issue":"3","key":"793_CR2","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract. 2004;21(3):749\u201361.","journal-title":"Chaos Solitons Fract"},{"doi-asserted-by":"crossref","unstructured":"Lian S, Jinsheng S, Zhiquan W, Yuewei D. A fast video encryption Scheme based on Chaos. In: ICARCV 2004.\u00a08th control, automataion, robotics and vision conference, vol. 1, pp. 126\u2013131, IEEE. 2004.","key":"793_CR3","DOI":"10.1109\/ICARCV.2004.1468810"},{"issue":"10","key":"793_CR4","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1016\/j.pnsc.2008.05.009","volume":"18","author":"S Yang","year":"2008","unstructured":"Yang S, Sun S. A video encryption method based on chaotic maps in DCT domain. Prog Nat Sci. 2008;18(10):1299\u2013304.","journal-title":"Prog Nat Sci"},{"key":"793_CR5","volume-title":"The essential guide to video processing","author":"AC Bovik","year":"2009","unstructured":"Bovik AC. The essential guide to video processing. Cambridge: Academic Press; 2009."},{"unstructured":"Seidel T, Daniel S, Michal S. Cryptanalysis of video encryption algorithms. In: Proceedings of The 3rd central european conference on cryptology TATRACRYPT. 2003.","key":"793_CR6"},{"issue":"4","key":"793_CR7","doi-asserted-by":"publisher","first-page":"043012","DOI":"10.1117\/1.2360697","volume":"15","author":"S Li","year":"2006","unstructured":"Li S, Li C, Lo K-T, Chen G. Cryptanalysis of an image encryption scheme. J Electron Imaging. 2006;15(4):043012.","journal-title":"J Electron Imaging"},{"issue":"5","key":"793_CR8","doi-asserted-by":"publisher","first-page":"2613","DOI":"10.1016\/j.chaos.2008.09.051","volume":"41","author":"D Arroyo","year":"2009","unstructured":"Arroyo D, Li C, Li S, Alvarez G, Halang WA. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos Solitons Fract. 2009;41(5):2613\u20136.","journal-title":"Chaos Solitons Fract"},{"doi-asserted-by":"crossref","unstructured":"Lijuan D, Dongkui Z, Fan X, Guoqin C. A novel video encryption method based on faster R-CNN. In: International conference on computer science, electronics and communication engineering (CSECE 2018), Advances in computer science research, vol 80. 2018.","key":"793_CR9","DOI":"10.2991\/csece-18.2018.21"},{"unstructured":"Yogita N, Ravindra P. K-mean clustering based video encryption technique. Int J Sci Eng Res. 2013;4:7.","key":"793_CR10"},{"unstructured":"Minal C, Rashmin P. Image encryption using chaotic based artificial neural network. Int J Sci Eng Res. 2014;5:6.","key":"793_CR11"},{"doi-asserted-by":"crossref","unstructured":"D\u00e9nes J, Keedwell AD. Latin squares: new developments in the theory and applications, vol 46. Berlin: Elsevier; 1991.","key":"793_CR12","DOI":"10.1016\/S0167-5060(08)70969-5"},{"issue":"4","key":"793_CR13","first-page":"559","volume":"12","author":"C Koscielny","year":"2002","unstructured":"Koscielny C. Generating quasigroups for cryptographic applications. Int J Appl Math Comput Sci. 2002;12(4):559\u201370.","journal-title":"Int J Appl Math Comput Sci"},{"unstructured":"Gligoroski D, Smile M, Markovski S. Cryptographic potentials of quasigroup transformations. 2003.","key":"793_CR14"},{"unstructured":"Shcherbacov V. Quasigroup based crypto-algorithms. 2012. arXiv:1201.3016","key":"793_CR15"},{"doi-asserted-by":"crossref","unstructured":"Markovski S, Danilo G, Ljupco K. Unbiased random sequences from quasigroup string transformations. In: International workshop on fast software encryption, pp. 163\u2013180. Berlin, Heidelberg: Springer; 2005.","key":"793_CR16","DOI":"10.1007\/11502760_11"},{"doi-asserted-by":"crossref","unstructured":"Chauhan D, Indivar G, Rahsmi V. Quasigroups and their applications in cryptography. Cryptologia. 2020;2020:1\u201339.","key":"793_CR17","DOI":"10.1080\/01611194.2020.1721615"},{"unstructured":"Deepthi H, Kiran DS, Raghvendre K, Sarma V, Raghu V. Digital video encryption by quasi-group on system on chip (SoC). In: the 5th IAPR international conference on computer vision & image processing (CVIP 2020) IIIT-Allahabad, Prayagraj, India. 2020.","key":"793_CR18"},{"unstructured":"Markovski S, Danilo G, Suzana S. Using quasigroups for one-one secure encoding. In: Proc. VIII Conf. Logic and Computer Science LIRA, vol. 97, pp. 157\u2013162. 1997.","key":"793_CR19"},{"key":"793_CR20","doi-asserted-by":"publisher","DOI":"10.1201\/9781315282497","volume-title":"Cryptography: theory and practice","author":"DR Stinson","year":"2018","unstructured":"Stinson DR, Paterson M. Cryptography: theory and practice. Hoboken: CRC Press; 2018."},{"key":"793_CR21","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.proeng.2017.09.669","volume":"201","author":"YD Vybornova","year":"2017","unstructured":"Vybornova YD. Password-based key derivation function as one of Blum-Blum-Shub pseudo-random generator applications. Procedia Eng. 2017;201:428\u201335.","journal-title":"Procedia Eng"},{"doi-asserted-by":"publisher","unstructured":"Hui X, Xiaojun T, Xianwen M. An efficient chaos pseudo-random number generator applied to video encryption. Optik Int J Light Electron Opt. 2016. https:\/\/doi.org\/10.1016\/j.ijleo.2016.07.024.","key":"793_CR22","DOI":"10.1016\/j.ijleo.2016.07.024"},{"unstructured":"https:\/\/mixkit.co\/free-stock-video\/.","key":"793_CR23"},{"unstructured":"Vesna D, Smile M. Classification of quasigroups by image patterns. In: Proceedings of the 5th international 152 conference on informatics and information technology, pp. 152\u2013160. 2015.","key":"793_CR24"},{"doi-asserted-by":"crossref","unstructured":"Artamonov VA, Chakrabarti S, Markov VT, Pal SK. Constructions of polynomially complete quasigroups of arbitrary order. J Algebra Appl. 2020.","key":"793_CR25","DOI":"10.1142\/S0219498821502364"},{"unstructured":"Marko H, Smile M. Differential cryptanalysis of the quasigroup cipher. In: Russia: proceedings of the finnish data processing week. 2004.","key":"793_CR26"},{"unstructured":"Maximum Transmission Unit. 2020.\u00a0https:\/\/en.wikipedia.org\/wiki\/Maximumtransmissionunit.","key":"793_CR27"},{"unstructured":"Tegra Nano Board. 2020. https:\/\/developer.nvidia.com\/embedded\/jetson-nano-developer-kit.","key":"793_CR28"},{"unstructured":"Hikvision camera. 2020. https:\/\/us.hikvision.com\/en\/products\/cameras.","key":"793_CR29"},{"unstructured":"Quasigroup. 2020. https:\/\/en.wikipedia.org\/wiki\/quasigroup.","key":"793_CR30"},{"unstructured":"Junod P. cryptographic secure pseudo random bits generation: the blum-blum shub generator. unpublished (August). 1999. http:\/\/tlapixqui.izt.uam.mu\/sem-cryipto\/Sucesiones\/CryptoRandomBits.pdf.","key":"793_CR31"},{"doi-asserted-by":"crossref","unstructured":"Wang Z, Alan CB, Hamid RS, Eero PS. Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process. 2004;13(4):600\u2013612.","key":"793_CR32","DOI":"10.1109\/TIP.2003.819861"},{"unstructured":"Rukin S, et al. A statistical test suite for random and pseudo random number generators for cryptographic applications. In: Special publication 800-22 revision 1a, revised april. 2010.","key":"793_CR33"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00793-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-021-00793-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-021-00793-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:25:11Z","timestamp":1725611111000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-021-00793-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,11]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["793"],"URL":"https:\/\/doi.org\/10.1007\/s42979-021-00793-4","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"type":"print","value":"2662-995X"},{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2021,8,11]]},"assertion":[{"value":"10 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"408"}}