{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:31:32Z","timestamp":1729650692325,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/icip.2005.1530472","type":"proceedings-article","created":{"date-parts":[[2005,11,15]],"date-time":"2005-11-15T10:48:27Z","timestamp":1132051707000},"page":"III-636","source":"Crossref","is-referenced-by-count":7,"title":["JPEG 2000 syntax-compliant encryption preserving full scalability"],"prefix":"10.1109","author":[{"given":"B.B.","family":"Zhu","sequence":"first","affiliation":[]},{"family":"Yang Yang","sequence":"additional","affiliation":[]},{"family":"Shipeng Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Advanced Encryption Standard (AES)","year":"2001","key":"17"},{"year":"0","key":"15"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C 2 nd Ed","year":"1996","author":"schneier","key":"16"},{"journal-title":"Locally Iterative Encryption","year":"2005","author":"zhu","key":"13"},{"year":"0","key":"14"},{"journal-title":"JPSEC Commission Draft 2 0","year":"2004","key":"11"},{"journal-title":"Ciphertext Switching Encryption","year":"2005","author":"zhu","key":"12"},{"key":"3","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1117\/12.564837","article-title":"JPSEC for secure imaging in JPEG 2000","volume":"5558","author":"dufaux","year":"2004","journal-title":"SPIE Proc Applications of Digital Image Processing XXVII"},{"journal-title":"Information Technology - JPEG 2000 Image Coding System Part 3 Motion JPEG 2000","year":"2002","key":"2"},{"journal-title":"Information Technology - JPEG 2000 Image Coding System Part 1 Core Coding System","year":"2000","key":"1"},{"journal-title":"JPEG2000 Verification Model 8 5 (Technical Description)","year":"2000","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2005.1466082"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1246934"},{"key":"5","first-page":"95","article-title":"Authentication and access control in the JPEG 2000 compressed domain","volume":"4472","author":"grosbois","year":"2001","journal-title":"Proc SPIE Appl of Digital Image Processing XXIV"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1117\/12.571869"},{"key":"9","first-page":"3447","article-title":"Compliant encryption of JPEG2000 codestreams","author":"wu","year":"2004","journal-title":"IEEE Int Conf on Image Processing 2004 (ICIP'04)"},{"key":"8","article-title":"Efficient and secure encryption schemes for JPEG2000","volume":"5","author":"wu","year":"2004","journal-title":"IEEE Int Conf on Acoustics Speech and Signal Processing 2004 (ICASSP '04)"}],"event":{"name":"rnational Conference on Image Processing","start":{"date-parts":[[2005,9,14]]},"location":"Genova, Italy","end":{"date-parts":[[2005,9,14]]}},"container-title":["IEEE International Conference on Image Processing 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10242\/32662\/01530472.pdf?arnumber=1530472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T20:55:44Z","timestamp":1497646544000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1530472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icip.2005.1530472","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}