{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:31:00Z","timestamp":1729629060101,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/ispacs.2014.7024437","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T17:16:33Z","timestamp":1423156593000},"page":"121-126","source":"Crossref","is-referenced-by-count":0,"title":["Efficient data hiding in encrypted JPEG 2000 codestreams"],"prefix":"10.1109","author":[{"given":"Wannida","family":"Sae-Tang","sequence":"first","affiliation":[]},{"given":"Masaaki","family":"Fujiyoshi","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"One-time key based phase scrambling for phase-only correlation between visually protected images","volume":"2009","author":"ito","year":"2010","journal-title":"EURAIP J Inf Security"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899223"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4711743"},{"key":"36","doi-asserted-by":"crossref","first-page":"1251","DOI":"10.1016\/S0165-1684(01)00042-1","article-title":"Optimal transform domain watermark embedding via linear programing","volume":"81","author":"pereira","year":"2001","journal-title":"Signal Process"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959885"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0799-4"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-0997-3_39"},{"year":"0","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-206"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2012.62"},{"key":"13","first-page":"381","article-title":"Error concealment using a data hiding technique for MPEG video","author":"kurosaki","year":"2001","journal-title":"Proc ECS ECCTD"},{"key":"14","first-page":"772","article-title":"Error concealment using layer structure for JPEG 2000 images","volume":"e86 a","author":"kurosaki","year":"2003","journal-title":"IEICE Trans Fundamentals"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.821617"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICECE.2012.6471586"},{"key":"38","first-page":"573i","article-title":"A novel lossy-to-lossless watermarking scheme for JPEG2000 images","author":"zhang","year":"2004","journal-title":"Proc IEEE ICIP"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2010.07.009"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"22","article-title":"Image matching between scrambled images for secure data management","author":"kiya","year":"2008","journal-title":"Proc EURASIP EUSIPCO"},{"key":"23","first-page":"805101","article-title":"Commutative watermarking and encryption for media data","volume":"45","author":"lian","year":"2006","journal-title":"SPIE Opt Eng"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2010.11.001"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E96.A.1323"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW.2013.6618266"},{"key":"27","first-page":"iii205","article-title":"Partial-scrambling of images encoded using JPEG2000 without generating marking codes","author":"kiya","year":"2003","journal-title":"Proc IEEE ICIP"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1421853"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ISPACS.2006.364785"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0486-2"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4379295"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2011.41"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.4.771"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2005.1530250"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1999.819596"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.06.015"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2302899"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2274041"},{"key":"31","first-page":"ii137","article-title":"Collusion attackresilient hierarchical encryption of JPEG 2000 codestreams with scalable access control","author":"imaizumi","year":"2007","journal-title":"Proc IEEE ICIP"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.09.013"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2005.1465753"},{"key":"8","first-page":"iii89","article-title":"A method for embedding binary data into JPEG2000 bit streams based on the layer structure","author":"ando","year":"2002","journal-title":"Proc EURASIP EUSIPCO"}],"event":{"name":"2014 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","start":{"date-parts":[[2014,12,1]]},"location":"Kuching, Sarawak, Malaysia","end":{"date-parts":[[2014,12,4]]}},"container-title":["2014 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7006982\/7024408\/07024437.pdf?arnumber=7024437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:01:04Z","timestamp":1498194064000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7024437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/ispacs.2014.7024437","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}