{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T03:09:18Z","timestamp":1771038558022,"version":"3.50.1"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3062403","type":"journal-article","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T20:48:46Z","timestamp":1614372526000},"page":"35004-35026","source":"Crossref","is-referenced-by-count":56,"title":["Optical Bit-Plane-Based 3D-JST Cryptography Algorithm With Cascaded 2D-FrFT Encryption for Efficient and Secure HEVC Communication"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7509-2120","authenticated-orcid":false,"given":"Walid","family":"El-Shafai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4639-516X","authenticated-orcid":false,"given":"Iman M.","family":"Almomani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7685-2689","authenticated-orcid":false,"given":"Aala","family":"Alkhayer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.35706\/sys.v2i1.3635"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102257"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.115994"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-020-00648-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography4020018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2281029"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"14053","DOI":"10.1007\/s11042-019-08462-8","article-title":"Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption","volume":"79","author":"ibrahim","year":"2020","journal-title":"Multimedia Tools Appl"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1364\/OL.20.000767"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/photonics6040121"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1117\/1.1906240"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s19051228"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553038"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2924910"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2008.10.019"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7448-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2980256"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INTECH.2016.7845082"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983330"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.06.007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019840"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2808174"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-TW.2016.7520709"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1117\/1.OE.59.10.102411"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.164653"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09881-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008644"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PuneCon46936.2019.9105666"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879857"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08190-z"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127420502338"},{"key":"ref15","first-page":"454","article-title":"Investigating the use of encryption techniques and different speech coders with multimedia streaming","volume":"14","author":"almomani","year":"2016","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106437"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6036-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974226"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.02.017"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14311\/NNW.2011.21.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3478"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4936-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-015-0064-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5814-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-015-0042-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2903264"},{"key":"ref9","first-page":"146","article-title":"Statistical speech quality prediction in voip networks","volume":"2","author":"almomani","year":"2008","journal-title":"Proc Int Conf Commun Comput"},{"key":"ref46","author":"umbaugh","year":"2010","journal-title":"Digital Image Processing and Analysis Human and Computer Vision Applications with CVIPtools"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/66.3.605"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1147\/rd.383.0243"},{"key":"ref47","first-page":"537","article-title":"Edge detection techniques&#x2014;An overview","volume":"8","author":"ziou","year":"1998","journal-title":"Pattern Recognition and Image Analysis C\/C of Raspoznavaniye Obrazov I Analiz Izobrazhenit"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20347-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1364\/AO.50.001805"},{"key":"ref44","first-page":"513","article-title":"An asymptotically optimal histogram selection rule","volume":"2","author":"stone","year":"1984","journal-title":"Proc Berkeley Conf Honor Jerzy Neyman Jack Kiefer"},{"key":"ref43","author":"taylor","year":"1997","journal-title":"Introduction to error analysis the study of uncertainties in physical measurements"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09363886.pdf?arnumber=9363886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:25Z","timestamp":1639771045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9363886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3062403","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}