{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:00:39Z","timestamp":1771700439687,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/vcip.2016.7805456","type":"proceedings-article","created":{"date-parts":[[2017,1,11]],"date-time":"2017-01-11T16:20:32Z","timestamp":1484151632000},"page":"1-4","source":"Crossref","is-referenced-by-count":12,"title":["A novel selective image encryption method based on saliency detection"],"prefix":"10.1109","author":[{"given":"Wenying","family":"Wen","sequence":"first","affiliation":[]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Zhijun","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2006.10.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BMSB.2016.7521948"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2547343"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2199126"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.11.018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2014.03.016"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.04.021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.06.049"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/11961635_22","article-title":"A partial image encryption method with pseudo-random sequences","volume":"4332","author":"rao","year":"2006","journal-title":"ser Lecture Notes in Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2014.12.026"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2169775"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02900-4_16"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1109\/TPAMI.2010.70","article-title":"Learning to detect a salient object","volume":"33","author":"liu","year":"2011","journal-title":"IEEE Trans Pattern Anal"},{"key":"ref7","first-page":"545","article-title":"Graph-based visual saliency","author":"harel","year":"2007","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1631\/jzus.C1300262","article-title":"Performance study of selective encryption in comparison to full encryption for still visual images","volume":"15","author":"osama","year":"2014","journal-title":"J Zhejiang UnivSci C"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2013.04.029"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206596"}],"event":{"name":"2016 Visual Communications and Image Processing (VCIP)","location":"Chengdu, China","start":{"date-parts":[[2016,11,27]]},"end":{"date-parts":[[2016,11,30]]}},"container-title":["2016 Visual Communications and Image Processing (VCIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7790212\/7805413\/07805456.pdf?arnumber=7805456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T04:00:00Z","timestamp":1498363200000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7805456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/vcip.2016.7805456","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}