{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:24:18Z","timestamp":1774967058894,"version":"3.50.1"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,5,21]],"date-time":"2013-05-21T00:00:00Z","timestamp":1369094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Image Video Proc"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-5281-2013-32","type":"journal-article","created":{"date-parts":[[2013,5,21]],"date-time":"2013-05-21T22:14:49Z","timestamp":1369174489000},"source":"Crossref","is-referenced-by-count":24,"title":["Performing scalable lossy compression on pixel encrypted images"],"prefix":"10.1186","volume":"2013","author":[{"given":"Xiangui","family":"Kang","sequence":"first","affiliation":[]},{"given":"Anjie","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Xianyu","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaochun","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,21]]},"reference":[{"issue":"10","key":"72_CR1","first-page":"2992","volume":"52","author":"M Johnson","year":"2004","unstructured":"Johnson M, Ishwar P, Prabhakaran VM, Schonberg D, Ramchandran K: On compressing encrypted data IEEE Trans. Signal Process 2004, 52(10):2992-3006.","journal-title":"Signal Process"},{"issue":"1","key":"72_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/TIFS.2010.2099114","volume":"6","author":"X Zhang","year":"2011","unstructured":"Zhang X: Lossy Compression and Iterative reconstruction for Encrypted Image. IEEE Trans. on Inf. Forensic Secur 2011, 6(1):53-58.","journal-title":"IEEE Trans. on Inf. Forensic Secur"},{"key":"72_CR3","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","volume-title":"Low Density Parity Check Codes","author":"RG Gallager","year":"1963","unstructured":"Gallager RG: Low Density Parity Check Codes. MIT: Ph.D. dissertation; 1963."},{"key":"72_CR4","volume-title":"On blind compression of encrypted correlated data approaching the source entropy rate, in Proceedingsof the 43rd Annual Allerton Conference","author":"D Schonberg","year":"2005","unstructured":"Schonberg D, Draper SC, Ramchandran K: On blind compression of encrypted correlated data approaching the source entropy rate, in Proceedingsof the 43rd Annual Allerton Conference. IL: Allerton; 2005."},{"key":"72_CR5","volume-title":"Lossless compression of encrypted grey-level and color images, in Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008)","author":"R Lazzeretti","year":"2008","unstructured":"Lazzeretti R, Barni M: Lossless compression of encrypted grey-level and color images, in Proceedings of the 16th European Signal Processing Conference (EUSIPCO 2008). Switzerland: Lausanne; 2008."},{"issue":"4","key":"72_CR6","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TIP.2009.2038773","volume":"19","author":"W Liu","year":"2010","unstructured":"Liu W, Zeng W, Dong L, Yao Q: Efficient compression of encrypted grayscale images. IEEE Trans. Image Process. 2010, 19(4):1097-1102.","journal-title":"IEEE Trans. Image Process"},{"issue":"4","key":"72_CR7","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/TIFS.2008.2007244","volume":"3","author":"D Schonberg","year":"2008","unstructured":"Schonberg D, Draper SC, Yeo C, Ramchandran K: Toward compression of encrypted images and video sequences. IEEE Trans. Inf. Forensic Secur 2008, 3(4):749-762.","journal-title":"IEEE Trans. Inf. Forensic Secur"},{"key":"72_CR8","first-page":"1","volume-title":"Proceedings of the IEEE Region 10 Conference. (TENCON 2009)","author":"A Kumar","year":"2009","unstructured":"Kumar A, Makur A: Lossy compression of encrypted image by compressing sensing technique. Proceedings of the IEEE Region 10 Conference. (TENCON 2009) 2009, 1-6."},{"issue":"6","key":"72_CR9","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.1109\/TIP.2012.2187671","volume":"21","author":"X Zhang","year":"2012","unstructured":"Zhang X, Feng G, Ren Y, Qian Z: Scalable coding of encrypted images. IEEE Trans. Image Process. 2012, 21(6):3108-3114.","journal-title":"IEEE Trans. Image Process"}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-5281-2013-32.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-5281-2013-32\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-5281-2013-32.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T00:57:55Z","timestamp":1563065875000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-5281-2013-32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,21]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["72"],"URL":"https:\/\/doi.org\/10.1186\/1687-5281-2013-32","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,21]]},"article-number":"32"}}