{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:38Z","timestamp":1762004978938,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772573","U1736215","61702199","61672242","U1636206","61525203","61472235","61472146","61379156","61202467"],"award-info":[{"award-number":["61772573","U1736215","61702199","61672242","U1636206","61525203","61472235","61472146","61379156","61202467"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Program of Guangzhou","award":["201707010029"],"award-info":[{"award-number":["201707010029"]}]},{"name":"Guangdong Natural Science Funds for Distinguished Young Scholar","award":["2014A030306021"],"award-info":[{"award-number":["2014A030306021"]}]},{"name":"Guangdong Program for Special Support of Top-Notch Young Professionals","award":["2015TQ01X796"],"award-info":[{"award-number":["2015TQ01X796"]}]},{"name":"Pearl River Nova Program of Guangzhou","award":["201610010037"],"award-info":[{"award-number":["201610010037"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/tifs.2017.2784379","type":"journal-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T20:01:15Z","timestamp":1513627275000},"page":"1271-1285","source":"Crossref","is-referenced-by-count":9,"title":["Efficient Compression of Encrypted Binary Images Using the Markov Random Field"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5482-1766","authenticated-orcid":false,"given":"Chuntao","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7520-9031","authenticated-orcid":false,"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5867-1315","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/TPAMI.1984.4767596"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1007\/BF02980577"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TIT.1972.1054786"},{"key":"ref32","first-page":"133","article-title":"A special problem of Brownian motion, and a general theory of Gaussian random functions","volume":"2","author":"levy","year":"1956","journal-title":"Proc Berkeley Symp on Math Statist and Prob"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low-Density Parity-Check Codes"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/18.910572"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/TIT.1981.1056404"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1111\/j.2517-6161.1974.tb00999.x","article-title":"Spatial interaction and the statistical analysis of lattice systems","volume":"36","author":"besag","year":"1974","journal-title":"J Roy Statist Soc B Statist Methodol"},{"year":"2017","author":"hammersley","journal-title":"Markov fields on finite graphs and lattices","key":"ref34"},{"key":"ref10","first-page":"760","article-title":"Distributed source coding based encryption and lossless compression of gray scale and color images","author":"kumar","year":"2008","journal-title":"Proc IEEE 10th Workshop Multimedia Signal Process"},{"year":"2001","author":"zou","journal-title":"Deconvolution and Signal Recovery","key":"ref40"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIP.2009.2038773"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIFS.2013.2291625"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/DCC.2009.71"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TENCON.2009.5395999"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/IIHMSP.2011.12"},{"key":"ref16","first-page":"653","article-title":"Secure and effective image storage for cloud based E-healthcare systems","author":"song","year":"2013","journal-title":"Proc IEEE Globecom"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIFS.2010.2099114"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TIP.2012.2187671"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s11042-013-1392-1"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-1-4613-8190-7"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TSP.2004.833860"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/MSP.2007.914731"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TSP.2013.6614043"},{"key":"ref6","first-page":"1","article-title":"On blind compression of encrypted data approaching the source entropy rate","author":"schonberg","year":"2005","journal-title":"Proc 13th Eur Signal Process Conf"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-4-431-66933-3"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIT.2002.808103"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIFS.2008.2007244"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICIP.2006.313177"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"ref9","first-page":"1","article-title":"Lossless compression of encrypted grey-level and color images","author":"lazzeretti","year":"2008","journal-title":"Proc 16th Eur Signal Process Conf (EUSIPCO)"},{"key":"ref1","article-title":"Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing","volume":"2007","author":"erkin","year":"2007","journal-title":"EURASIP J Inf Secur"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TMM.2014.2315974"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/TIT.2004.839541"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.image.2015.09.009"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/IIH-MSP.2015.22"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.sigpro.2010.05.019"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICASSP.2014.6855035"},{"key":"ref41","first-page":"338","article-title":"A new hybrid PDE denoising model based on Markov random field","author":"wu","year":"2006","journal-title":"Proc 1st Int Conf Innov Comput Inf Control (ICICIC)"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1186\/1687-5281-2013-32"},{"year":"2003","author":"amraoui","journal-title":"Ldpcopt","key":"ref44"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIT.2006.871582"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/83.730376"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TIFS.2014.2352455"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8272400\/08219715.pdf?arnumber=8219715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T21:38:30Z","timestamp":1719697110000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8219715\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2784379","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}