{"id":"https://openalex.org/W2963290951","doi":"https://doi.org/10.1109/gcce.2018.8574605","title":"Bitstream-Based JPEG Image Encryption with File-Size Preserving","display_name":"Bitstream-Based JPEG Image Encryption with File-Size Preserving","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2963290951","doi":"https://doi.org/10.1109/gcce.2018.8574605","mag":"2963290951"},"language":"en","primary_location":{"id":"doi:10.1109/gcce.2018.8574605","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcce.2018.8574605","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 7th Global Conference on Consumer Electronics (GCCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101591671","display_name":"Hiroyuki Kobayashi","orcid":"https://orcid.org/0000-0003-1713-5318"},"institutions":[{"id":"https://openalex.org/I4210147285","display_name":"Metropolitan College","ror":"https://ror.org/05jdd7q84","country_code":"GR","type":"education","lineage":["https://openalex.org/I4210147285"]},{"id":"https://openalex.org/I52706244","display_name":"College of Industrial Technology","ror":"https://ror.org/054a9s036","country_code":"JP","type":"education","lineage":["https://openalex.org/I52706244"]}],"countries":["GR","JP"],"is_corresponding":true,"raw_author_name":"Hiroyuki Kobayashi","raw_affiliation_strings":["Tokyo Metropolitan College of Industrial Technology, Tokyo, JAPAN"],"affiliations":[{"raw_affiliation_string":"Tokyo Metropolitan College of Industrial Technology, Tokyo, JAPAN","institution_ids":["https://openalex.org/I52706244","https://openalex.org/I4210147285"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015250468","display_name":"Hitoshi Kiya","orcid":"https://orcid.org/0000-0001-8061-3090"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hitoshi Kiya","raw_affiliation_strings":["Tokyo Metropolitan University, Tokyo, JAPAN"],"affiliations":[{"raw_affiliation_string":"Tokyo Metropolitan University, Tokyo, JAPAN","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101591671"],"corresponding_institution_ids":["https://openalex.org/I4210147285","https://openalex.org/I52706244"],"apc_list":null,"apc_paid":null,"fwci":2.507,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.92628849,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"384","last_page":"387"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14339","display_name":"Image Processing and 3D Reconstruction","score":0.9656999707221985,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.8129769563674927},{"id":"https://openalex.org/keywords/huffman-coding","display_name":"Huffman coding","score":0.8024805784225464},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7806282043457031},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7553052306175232},{"id":"https://openalex.org/keywords/bitstream","display_name":"Bitstream","score":0.7454233169555664},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.6999062299728394},{"id":"https://openalex.org/keywords/file-size","display_name":"File size","score":0.6701530814170837},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.552695095539093},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.4722772538661957},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.4718615710735321},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4600929617881775},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.43490681052207947},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.4285561442375183},{"id":"https://openalex.org/keywords/image-file-formats","display_name":"Image file formats","score":0.4274282455444336},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4189562201499939},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3541983366012573},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.3417832851409912},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.29984986782073975},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.2935500144958496},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.28041890263557434},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.27140215039253235},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.19974789023399353},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1649710237979889},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08698934316635132}],"concepts":[{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.8129769563674927},{"id":"https://openalex.org/C46900642","wikidata":"https://www.wikidata.org/wiki/Q2647","display_name":"Huffman coding","level":3,"score":0.8024805784225464},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7806282043457031},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7553052306175232},{"id":"https://openalex.org/C136695289","wikidata":"https://www.wikidata.org/wiki/Q415568","display_name":"Bitstream","level":3,"score":0.7454233169555664},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.6999062299728394},{"id":"https://openalex.org/C2776029614","wikidata":"https://www.wikidata.org/wiki/Q1146367","display_name":"File size","level":2,"score":0.6701530814170837},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.552695095539093},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.4722772538661957},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.4718615710735321},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4600929617881775},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.43490681052207947},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.4285561442375183},{"id":"https://openalex.org/C65377053","wikidata":"https://www.wikidata.org/wiki/Q1572121","display_name":"Image file formats","level":3,"score":0.4274282455444336},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4189562201499939},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3541983366012573},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.3417832851409912},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.29984986782073975},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.2935500144958496},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.28041890263557434},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.27140215039253235},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.19974789023399353},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1649710237979889},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08698934316635132},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcce.2018.8574605","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcce.2018.8574605","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 7th Global Conference on Consumer Electronics (GCCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1501211345","https://openalex.org/W1510526020","https://openalex.org/W1598206900","https://openalex.org/W2009460929","https://openalex.org/W2147649522","https://openalex.org/W2157498268","https://openalex.org/W2160827790","https://openalex.org/W2245606036","https://openalex.org/W2475121515","https://openalex.org/W2494134239","https://openalex.org/W2563180213","https://openalex.org/W2689968489","https://openalex.org/W2753607224","https://openalex.org/W2779060144","https://openalex.org/W2785554563","https://openalex.org/W6739584322"],"related_works":["https://openalex.org/W3031508843","https://openalex.org/W2362105210","https://openalex.org/W3015742360","https://openalex.org/W2040892974","https://openalex.org/W2791288201","https://openalex.org/W4377837302","https://openalex.org/W2886037716","https://openalex.org/W2587891993","https://openalex.org/W4322741006","https://openalex.org/W2064010162"],"abstract_inverted_index":{"An":[0],"encryption":[1,66,80],"scheme":[2,14],"of":[3,28,37,71,95],"JPEG":[4,17,40,46,72,86,124],"images":[5,30,47,109,125],"in":[6,48,64,99,118],"the":[7,16,22,25,32,38,49,65,68,79,91,96,100,111,119,129,133,137,145],"bitstream":[8,50],"domain":[9,51],"is":[10,31,74],"proposed.":[11,54],"The":[12,82],"proposed":[13,83],"preserves":[15],"format":[18],"even":[19],"after":[20,144],"encrypting":[21,45],"images,":[23],"and":[24,88],"file":[26,69],"size":[27,70,114],"encrypted":[29,108,130],"exact":[33],"same":[34,112],"as":[35,115],"that":[36,116,136],"original":[39],"images.":[41],"Several":[42],"methods":[43],"for":[44],"have":[52,107],"been":[53],"However,":[55],"since":[56],"some":[57],"marker":[58],"codes":[59],"are":[60,126,140],"generated":[61],"or":[62],"lost":[63],"process,":[67,122],"bitstreams":[73,87],"generally":[75],"changed":[76],"due":[77],"to":[78,106],"operations.":[81],"method":[84],"inputs":[85],"selectively":[89],"encrypts":[90],"additional":[92],"bit":[93],"components":[94],"Huffman":[97],"code":[98],"bitstreams.":[101],"This":[102],"feature":[103],"allows":[104],"us":[105],"with":[110,128],"data":[113],"recoded":[117],"image":[120,138],"transmission":[121,139],"when":[123],"replaced":[127],"ones":[131],"by":[132],"hooking,":[134],"so":[135],"successfully":[141],"carried":[142],"out":[143],"hooking.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":11}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
