{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:08:59Z","timestamp":1772294939967,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T00:00:00Z","timestamp":1506643200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Spanish Government","award":["GenCom, TEC2015-67774-C2-1-R"],"award-info":[{"award-number":["GenCom, TEC2015-67774-C2-1-R"]}]},{"DOI":"10.13039\/100011273","name":"FP7 Information and Communication Technologies","doi-asserted-by":"publisher","award":["GA 621037"],"award-info":[{"award-number":["GA 621037"]}],"id":[{"id":"10.13039\/100011273","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s13640-017-0216-z","type":"journal-article","created":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T15:03:09Z","timestamp":1506697389000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["JPEG Privacy and Security framework for social networking and GLAM services"],"prefix":"10.1186","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1986-2183","authenticated-orcid":false,"given":"Frederik","family":"Temmermans","sequence":"first","affiliation":[]},{"given":"Touradj","family":"Ebrahimi","sequence":"additional","affiliation":[]},{"given":"Siegfried","family":"Foessel","sequence":"additional","affiliation":[]},{"given":"Jaime","family":"Delgado","sequence":"additional","affiliation":[]},{"given":"Takaaki","family":"Ishikawa","sequence":"additional","affiliation":[]},{"given":"Ambarish","family":"Natu","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schelkens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,29]]},"reference":[{"key":"216_CR1","unstructured":"JPEG. \n                        https:\/\/www.jpeg.org\/\n                        \n                    . Accessed 25 Sept 2017."},{"key":"216_CR2","doi-asserted-by":"crossref","DOI":"10.1002\/9780470744635","volume-title":"The JPEG 2000 Suite","author":"P Schelkens","year":"2009","unstructured":"P Schelkens, A Skodras, T Ebrahimi, The JPEG 2000 Suite (Wiley, Chichester, UK, 2009)."},{"key":"216_CR3","unstructured":"T Ishikawa, J Delgado, A Natu, P Schelkens, F Temmermans, JPEG Privacy and Security scope use cases and requirements version 1.3 (WG1N74006) (2017). ISO\/IEC JTC 1\/SC 29\/WG 1."},{"key":"216_CR4","unstructured":"ISO\/IEC JTC 1\/SC 27, ISO\/IEC 29100:2011 \u2013 Information Technology \u2013 Security Techniques \u2013 Privacy Framework (2011). ISO\/IEC JTC 1\/SC 27."},{"key":"216_CR5","unstructured":"SnapChat. \n                        https:\/\/www.snapchat.com\n                        \n                    . Accessed 25 Sept 2017."},{"key":"216_CR6","unstructured":"Yovo. \n                        https:\/\/yovo.me\/\n                        \n                    . Accessed 25 Sept 2017."},{"key":"216_CR7","unstructured":"Privately. \n                        http:\/\/www.privately.eu\/\n                        \n                    . Accessed 25 Sept 2017."},{"key":"216_CR8","unstructured":"Dstrux. \n                        https:\/\/dstrux.com\/\n                        \n                    ."},{"key":"216_CR9","unstructured":"P Schelkens, T Ishikawa, A Natu, F Temmermans, S Kim, A Hinds, A Skodras (eds.), Privacy and Security Workshop Proceedings, (wg1n70033) (ISO\/IEC JTC 1\/SC 29\/WG 1, Brussels, 2015). \n                        https:\/\/jpeg.org\/items\/20151109_privacy_security_proceedings.html\n                        \n                    ."},{"key":"216_CR10","unstructured":"P Schelkens, T Ishikawa, A Natu (eds.), JPEG Privacy and Security 2nd Workshop Proceedings, (wg1n71026) (ISO\/IEC JTC 1\/SC 29\/WG 1, La Jolla, 2016). \n                        https:\/\/jpeg.org\/items\/20160307_privacy_security_2_proceedings.html\n                        \n                    ."},{"key":"216_CR11","unstructured":"Y Zhao, J Lu, A Natu, T Ishikawa, P Schelkens (eds.), JPEG Privacy and Security 3rd Workshop Proceedings, (wg1n73012) (ISO\/IEC JTC 1\/SC 29\/WG 1, Chengdu, 2016). \n                        https:\/\/jpeg.org\/items\/20161104_privacy_security_3_proceedings.html\n                        \n                    ."},{"key":"216_CR12","unstructured":"ISO\/IEC JTC 1\/SC 29\/WG 1: Privacy and Security Final Call for Proposals (2017). ISO\/IEC JTC 1\/SC 29\/WG 1."},{"issue":"3","key":"216_CR13","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MMUL.2016.49","volume":"23","author":"T Richter","year":"2016","unstructured":"T Richter, A Artusi, T Ebrahimi, JPEG XT: a new family of JPEG backward compatible standards. IEEE Multimed. 23(3), 80\u201388 (2016).","journal-title":"IEEE Multimed"},{"key":"216_CR14","first-page":"3956","volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP); Quebec City, Canada","author":"L Yuan","year":"2015","unstructured":"L Yuan, T Ebrahimi, in Proceedings of the IEEE International Conference on Image Processing (ICIP); Quebec City, Canada. Image transmorphing with JPEG (IEEENew York, 2015), pp. 3956\u20133960. doi:\n                        10.1109\/ICIP.2015.7351547\n                        \n                    ."},{"key":"216_CR15","unstructured":"L Yuan, T Ebrahimi, Image privacy protection with secure JPEG transmorphing. IET Signal Process. 23:, 80\u201388 (2017). \n                        http:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-spr.2016.0756\n                        \n                    ."},{"key":"216_CR16","volume-title":"Proc. of SPIE: Conference on Applications of Digital Image Processing XXIX, San Diego, CA.","author":"F Dufaux","year":"2015","unstructured":"F Dufaux, T Ebrahimi, in Proc. of SPIE: Conference on Applications of Digital Image Processing XXIX, San Diego, CA., 6312. Toward a secure JPEG (SPIEBellingham, 2015)."},{"key":"216_CR17","unstructured":"ProShare for iOS. \n                        https:\/\/itunes.apple.com\/us\/app\/proshare\/id1047578277?mt=8\n                        \n                    . Accessed 25 Sept 2017."},{"key":"216_CR18","volume-title":"Proceedings of the IEEE International Conference on Multimedia & Expo Workshops (ICME), Seattle, CA.","author":"J Delgado","year":"2016","unstructured":"J Delgado, S Llorente, in Proceedings of the IEEE International Conference on Multimedia & Expo Workshops (ICME), Seattle, CA.Improving privacy in JPEG images (IEEENew York, 2016)."},{"key":"216_CR19","unstructured":"OASIS, eXtensible Access Control Markup Language (XACML) Version 3.0 (2013). \n                        http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.pdf\n                        \n                    . Accessed 25 Sept 2017."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-017-0216-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-017-0216-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-017-0216-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T15:03:31Z","timestamp":1506697411000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-017-0216-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,29]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["216"],"URL":"https:\/\/doi.org\/10.1186\/s13640-017-0216-z","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,29]]},"article-number":"68"}}