{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:47:09Z","timestamp":1729640829456,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/icoin.2011.5723113","type":"proceedings-article","created":{"date-parts":[[2011,3,5]],"date-time":"2011-03-05T13:00:23Z","timestamp":1299330023000},"page":"54-57","source":"Crossref","is-referenced-by-count":6,"title":["Slice-level selective encryption for protecting video data"],"prefix":"10.1109","author":[{"given":"Seohyun","family":"Jeong","sequence":"first","affiliation":[]},{"given":"Eunji","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sungju","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Youngwha","family":"Chung","sequence":"additional","affiliation":[]},{"given":"Byoungki","family":"Min","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77255-2_27"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1117\/12.512635","article-title":"Security Analysis of Selectively Encrypted MPEG2 Streams","author":"lookabaugh","year":"2003","journal-title":"Proc of Multimedia Systems and Applications"},{"key":"ref12","article-title":"Cryptanalysis of Video Encryption Algorithms","author":"seidel","year":"2003","journal-title":"Proc of Central European Conf on Cryptology"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1117\/12.619896","article-title":"On Encryption-Compression Tradeoff of Pre\/Post-Filtered Images","author":"gurijala","year":"2005","journal-title":"Proc of SPIE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.917355"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.004"},{"key":"ref6","first-page":"3","article-title":"Recent Advances in Multimedia Information b System Security","volume":"33","author":"lian","year":"2009","journal-title":"Informatica"},{"key":"ref5","first-page":"17","article-title":"Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions","author":"liu","year":"2003","journal-title":"Proc of Conf Communications Internet and Information Technology"},{"article-title":"The MPEG Handbook","year":"2004","author":"watkinson","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02900-4_16"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/179290"},{"article-title":"Multimedia Security Handbook","year":"2005","author":"furht","key":"ref1"},{"key":"ref9","article-title":"Security Mechanism for Multimedia Data with the Example MPEG-1 Video","author":"meyer","year":"1995","journal-title":"TR of Technical U of Berlin"}],"event":{"name":"2011 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2011,1,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2011,1,28]]}},"container-title":["The International Conference on Information Networking 2011 (ICOIN2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5720562\/5723103\/05723113.pdf?arnumber=5723113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T01:14:56Z","timestamp":1560042896000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5723113\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icoin.2011.5723113","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}