{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:30Z","timestamp":1750306590892,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,3,18]],"date-time":"2015-03-18T00:00:00Z","timestamp":1426636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korean Govrnment (MSIP)","award":["NRF-2012R1A1A1015421"],"award-info":[{"award-number":["NRF-2012R1A1A1015421"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,3,18]]},"DOI":"10.1145\/2727040.2727047","type":"proceedings-article","created":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T19:27:55Z","timestamp":1425929275000},"page":"9-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Spatio-temporal visual security metric for secure mobile video applications"],"prefix":"10.1145","author":[{"given":"Junhyung","family":"Moon","sequence":"first","affiliation":[{"name":"Yonsei University, Seoul, South Korea"}]},{"given":"Kyoungwoo","family":"Lee","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"H.264 jm reference software: http:\/\/iphome.hhi.de\/suehring\/tml.  H.264 jm reference software: http:\/\/iphome.hhi.de\/suehring\/tml."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/525423.830467"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:MTAP.0000033983.62130.00"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2006.313132"},{"volume-title":"46-3: Data encryption standard (des)","year":"1999","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.879919"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/383082.383090"},{"volume-title":"Mobile video chat: issues and challenges. Communications Magazine","year":"2013","author":"Jana S.","key":"e_1_3_2_1_9_1"},{"volume-title":"IWNAS","year":"2006","author":"Jun L.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.888840"},{"volume-title":"ICICS","year":"2005","author":"Li Y.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-007-0150-7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2011.01.005"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.06.004"},{"volume-title":"MMM","year":"2004","author":"Liu Z.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2165056"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.873426"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2002.1010141"},{"volume-title":"197: Advanced encryption standard (aes). Federal Information Processing Standards Publication","year":"2001","author":"Pub N. F.","key":"e_1_3_2_1_21_1"},{"volume-title":"CISST","year":"1997","author":"Qiao L.","key":"e_1_3_2_1_22_1"},{"volume-title":"Comparison of mpeg encryption algorithms. Computers & Graphics","year":"1998","author":"Qiao L.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICVGIP.2008.100"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.1996.493615"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874091"},{"volume-title":"EUSIPCO","year":"2012","author":"Wang Y.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/319463.319627"},{"volume-title":"Security analysis of multimedia encryption schemes based on multiple huffman table. Signal Processing Letters","year":"2007","author":"Zhou J.","key":"e_1_3_2_1_30_1"}],"event":{"name":"MMSys '15: Multimedia Systems Conference 2015","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Portland Oregon","acronym":"MMSys '15"},"container-title":["Proceedings of the 7th ACM International Workshop on Mobile Video"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2727040.2727047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2727040.2727047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:32Z","timestamp":1750227392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2727040.2727047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,18]]},"references-count":30,"alternative-id":["10.1145\/2727040.2727047","10.1145\/2727040"],"URL":"https:\/\/doi.org\/10.1145\/2727040.2727047","relation":{},"subject":[],"published":{"date-parts":[[2015,3,18]]},"assertion":[{"value":"2015-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}