{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:06:33Z","timestamp":1761581193752,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/ispa.2013.6703746","type":"proceedings-article","created":{"date-parts":[[2014,4,30]],"date-time":"2014-04-30T21:13:13Z","timestamp":1398892393000},"page":"240-245","source":"Crossref","is-referenced-by-count":4,"title":["Simultaneous video compression and encryption for real-time secure transmission"],"prefix":"10.1109","author":[{"given":"Nazar","family":"Al-Hayani","sequence":"first","affiliation":[]},{"given":"Naseer","family":"Al-Jawad","sequence":"additional","affiliation":[]},{"given":"Sabah","family":"Jassim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"17","DOI":"10.1016\/j.imavis.2006.02.021"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1002\/0471653748"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/IIHMSP.2011.53"},{"key":"13","first-page":"247","article-title":"Image encryption using random pixel permutation by chaotic mapping","author":"sathishkumar","year":"2012","journal-title":"IEEE"},{"key":"14","first-page":"85","article-title":"Length-preserving bit-streambased jPEG encryption","author":"unterweger","year":"2012","journal-title":"ACM"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/MILCOM.2006.302106"},{"key":"12","article-title":"An image encryption approach using stream ciphers based on nonlinear filter generator","volume":"41","author":"belmeguena","year":"2012","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"3","volume":"15","author":"uhl","year":"2005","journal-title":"Image and Video Encryption From Digital Rights Management to Secured Personal Communication"},{"year":"2004","author":"salomon","journal-title":"Data Compression","key":"2"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/TMM.2005.854469"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/ISM.2011.35"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/ICIEV.2012.6317517"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1117\/12.939469"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/TCOM.1981.1094950"},{"key":"4","first-page":"149","article-title":"Chaotic encryption scheme for real-time digital video","author":"li","year":"2002","journal-title":"International Society for Optics and Photonics"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ISSPA.2010.5605474"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1080\/03091900500412650"}],"event":{"name":"2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA)","start":{"date-parts":[[2013,9,4]]},"location":"Trieste, Italy","end":{"date-parts":[[2013,9,6]]}},"container-title":["2013 8th International Symposium on Image and Signal Processing and Analysis (ISPA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6693156\/6703696\/06703746.pdf?arnumber=6703746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T21:47:53Z","timestamp":1490219273000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6703746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ispa.2013.6703746","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}