{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:03:29Z","timestamp":1730221409982,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/euvip.2011.6045552","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T15:32:06Z","timestamp":1318951926000},"page":"192-198","source":"Crossref","is-referenced-by-count":2,"title":["Decryption of noisy encrypted images by statistical analysis"],"prefix":"10.1109","author":[{"given":"Naveed","family":"Islam","sequence":"first","affiliation":[]},{"given":"William","family":"Puech","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2004.1387397"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IOLTS.2005.51"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-008-9192-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.42"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190590"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/el:20080522"},{"key":"ref16","article-title":"Image quality assessment: From error measurement to structural similarity","volume":"13","author":"wang","year":"2004","journal-title":"IEEE Transactios on Image Processing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(89)90080-1"},{"key":"ref3","first-page":"68191e-1","article-title":"A Reversible Data Hiding Method for Encrypted Images","volume":"6819","author":"puech","year":"2008","journal-title":"Proc SPIE Electronic Imaging Security Forensics Steganography and Watermarking of Multimedia Contents X"},{"key":"ref6","first-page":"90","article-title":"Techniques for a Selective Encryption of Uncompressed and Compressed Images","author":"van droogenbroeck","year":"2002","journal-title":"Proc Advanced Concepts for Intelligent Vision Systems (ACIVS) 2002"},{"key":"ref5","article-title":"AES Proposal: The Rijndael Block Cipher","author":"daemen","year":"2002","journal-title":"Tech Rep Proton World Int l"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/78.852023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.819590"},{"journal-title":"Digital Watermarking and Steganography","year":"2008","author":"cox","key":"ref2"},{"journal-title":"Applied Cryptography","year":"1995","author":"schneier","key":"ref1"},{"journal-title":"Error Control Coding Fundamentals and Applications","year":"2004","author":"costello","key":"ref9"}],"event":{"name":"2011 3rd European Workshop on Visual Information Processing (EUVIP)","start":{"date-parts":[[2011,7,4]]},"location":"Paris, France","end":{"date-parts":[[2011,7,6]]}},"container-title":["3rd European Workshop on Visual Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6034619\/6045493\/06045552.pdf?arnumber=6045552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T07:46:24Z","timestamp":1490082384000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6045552\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/euvip.2011.6045552","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}