{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:53:51Z","timestamp":1770285231283,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/icassp.2015.7178165","type":"proceedings-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T22:45:43Z","timestamp":1439419543000},"page":"1226-1230","source":"Crossref","is-referenced-by-count":47,"title":["An Encryption-then-Compression system for JPEG 2000 standard"],"prefix":"10.1109","author":[{"given":"Osamu","family":"Watanabe","sequence":"first","affiliation":[]},{"given":"Akira","family":"Uchida","sequence":"additional","affiliation":[]},{"given":"Takahiro","family":"Fukuhara","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.833860"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2038773"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2099114"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6855035"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2291625"},{"key":"ref15","article-title":"Information technology - JPEG 2000 image coding system - Part 1: Core coding system","year":"2000","journal-title":"nternational Standard ISO\/IEC IS-15444&#x2013;1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-008-0150-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1247217"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5414285"},{"key":"ref19","year":"0","journal-title":"Kakadu Software"},{"key":"ref4","first-page":"6","article-title":"Article: A survey based on designing an efficient image encryption-then-compression system","volume":"xplore","author":"kalyani","year":"2014","journal-title":"IJCA Proceedings on National Level Technical Conference X-PLORE 2014"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1186\/1687-417X-2007-078943","article-title":"Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing","volume":"2007","author":"erkin","year":"2007","journal-title":"EURASIP Journal on Information Security"},{"key":"ref6","article-title":"Image matching between scrambled images for secure data management","author":"kiya","year":"2008","journal-title":"Proc of the 16th Eur Sig Proc Conf"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4711743"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.808817"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2009-841045"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2600918.2600943"},{"key":"ref1","article-title":"Use cases and requirements for JPEG Privacy","year":"2013","journal-title":"ISO\/IEC JTC 1\/SC 29\/WG 1 N6402"},{"key":"ref9","first-page":"1","article-title":"Efficient image encryption with block shuffling and chaotic map","author":"tang","year":"2014","journal-title":"Multimedia Tools and Applications"},{"key":"ref20","article-title":"Digital Cinema Initiatives, LLC Technology Committee","year":"2010","journal-title":"StEM Access Procedures"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2109730"}],"event":{"name":"ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"South Brisbane, Queensland, Australia","start":{"date-parts":[[2015,4,19]]},"end":{"date-parts":[[2015,4,24]]}},"container-title":["2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7158221\/7177909\/07178165.pdf?arnumber=7178165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T17:32:36Z","timestamp":1498239156000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7178165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icassp.2015.7178165","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}