{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:55:31Z","timestamp":1729644931766,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/wifs.2011.6123136","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:03:26Z","timestamp":1326301406000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Context intra-coding scheme for securing surveillance videos and its applications"],"prefix":"10.1109","author":[{"given":"Yi-Chong","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Chiou-Ting","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/30.663749"},{"key":"2","first-page":"568","article-title":"Enhanced multiple Huffman table (MHT) encryption scheme using key hopping","volume":"5","author":"xie","year":"2004","journal-title":"ISCAS"},{"journal-title":"CAVIAR Test Case Scenarios","year":"0","key":"10"},{"key":"1","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1117\/12.435392","article-title":"Efficient multimedia encryption via entropy codec design","volume":"4314","author":"wu","year":"2001","journal-title":"Proc of SPIE"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/76.767122"},{"key":"6","first-page":"86","article-title":"Object detection in encryption-based surveillance system","author":"zeng","year":"2010","journal-title":"APSIPA ASC"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.808817"},{"key":"4","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden Digital Watermarks in Images","volume":"8","author":"hsu","year":"1999","journal-title":"IEEE Trans Image Processing"},{"key":"9","first-page":"123","article-title":"Explicit image detection using YCbCr space color model as skin detection","author":"basilio","year":"2011","journal-title":"Proceeding AMERICN-MATH'11\/CEA'11 Puerto Morelos Mexico"},{"key":"8","first-page":"157","article-title":"Visitor identification elaborating real time face recognition system","author":"kukharev","year":"2004","journal-title":"WSCG"}],"event":{"name":"2011 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2011,11,29]]},"location":"Iguacu Falls, Brazil","end":{"date-parts":[[2011,12,2]]}},"container-title":["2011 IEEE International Workshop on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112284\/6123119\/06123136.pdf?arnumber=6123136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:37:03Z","timestamp":1497947823000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6123136\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wifs.2011.6123136","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}