{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:25Z","timestamp":1750221265942,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,25]]},"DOI":"10.1145\/3133264.3133281","type":"proceedings-article","created":{"date-parts":[[2017,10,6]],"date-time":"2017-10-06T12:48:47Z","timestamp":1507294127000},"page":"66-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System"],"prefix":"10.1145","author":[{"given":"Wannida","family":"Sae-Tang","sequence":"first","affiliation":[{"name":"The Sirindhorn International, Thai-German Graduate School of Engineering, King Mongkut's University of Technology North Bangkok, Bangkok, Thailand"}]},{"given":"Masaaki","family":"Fujiyoshi","sequence":"additional","affiliation":[{"name":"The Graduate School of System Design, Tokyo Metropolitan University, Tokyo, Japan"}]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[{"name":"The Graduate School of System Design, Tokyo Metropolitan University, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"protocols, algorithms, and source code in C","author":"Schneier B.","unstructured":"Schneier , B. 1996. \" Applied cryptography : protocols, algorithms, and source code in C ,\" 2 nd ed., John Wiley & Sons . Schneier, B. 1996. \"Applied cryptography: protocols, algorithms, and source code in C,\" 2nd ed., John Wiley & Sons.","edition":"2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421697"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03688-0_5"},{"key":"e_1_3_2_1_4_1","volume-title":"InTech","author":"Kuribayashi M.","year":"2010","unstructured":"Kuribayashi , M. \" Recent fingerprinting techniques with cryptographic protocol,\" Signal Processing, Sebastian Miron (Ed.) , InTech , 2010 , Available from: https:\/\/www.intechopen.com\/books\/signal-processing\/recent-fingerprinting-techniqueswith-cryptographic-protocol. Kuribayashi, M. \"Recent fingerprinting techniques with cryptographic protocol,\" Signal Processing, Sebastian Miron (Ed.), InTech, 2010, Available from: https:\/\/www.intechopen.com\/books\/signal-processing\/recent-fingerprinting-techniqueswith-cryptographic-protocol."},{"key":"e_1_3_2_1_5_1","first-page":"15","article-title":"A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking","volume":"1","author":"Sengoku Y.","year":"2012","unstructured":"Sengoku , Y. and Hioki , H. \" A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking ,\" Proc. ITC-CSCC, D-W 1-02 , Sapporo, Japan, 15 - 18 Jul. 2012 . Sengoku, Y. andHioki, H. \"A model of privacy and copyright-aware image trading system based on adaptive image segmentation and digital watermarking,\" Proc. ITC-CSCC, D-W1-02, Sapporo, Japan, 15-18 Jul. 2012.","journal-title":"Proc. ITC-CSCC, D-W"},{"key":"e_1_3_2_1_6_1","first-page":"2","article-title":"An efficient compression of amplitude-only images for the image trading system","volume":"97","author":"Liu S.","year":"2014","unstructured":"Liu , S. , Sae-Tang , W. , Fujiyoshi , M. , and Kiya , H . \" An efficient compression of amplitude-only images for the image trading system ,\" IEICE Trans. Fundamentals , vol. E97 -D, no. 2 , Feb. 2014 . Liu, S., Sae-Tang, W., Fujiyoshi, M., and Kiya, H. \"An efficient compression of amplitude-only images for the image trading system,\" IEICE Trans. Fundamentals, vol. E97-D, no. 2, Feb. 2014.","journal-title":"IEICE Trans. Fundamentals"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E96.A.1323"},{"volume-title":"1D frequency transformation-based amplitude-only images for copyright- and privacy-protection in image trading systems,\" ECTI-CIT","author":"Sae-Tang W., LIU, S.","key":"e_1_3_2_1_8_1","unstructured":"Sae-Tang , W., LIU, S. , Fujiyoshi , M. , and Kiya , H . \" 1D frequency transformation-based amplitude-only images for copyright- and privacy-protection in image trading systems,\" ECTI-CIT , vol. 8 , no. 2, Nov. 2014. Sae-Tang, W., LIU, S., Fujiyoshi, M., and Kiya, H. \"1D frequency transformation-based amplitude-only images for copyright- and privacy-protection in image trading systems,\" ECTI-CIT, vol. 8, no. 2, Nov. 2014."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2291625"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCS.2015.7170059"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2004.1412863"}],"event":{"name":"ICAIP 2017: 2017 International Conference on Advances in Image Processing","sponsor":["Sultan Qaboos University Sultan Qaboos University","USM Universiti Sains Malaysia"],"location":"Bangkok Thailand","acronym":"ICAIP 2017"},"container-title":["Proceedings of the International Conference on Advances in Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133264.3133281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133264.3133281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:59Z","timestamp":1750212659000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133264.3133281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,25]]},"references-count":11,"alternative-id":["10.1145\/3133264.3133281","10.1145\/3133264"],"URL":"https:\/\/doi.org\/10.1145\/3133264.3133281","relation":{},"subject":[],"published":{"date-parts":[[2017,8,25]]},"assertion":[{"value":"2017-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}