{"id":"https://openalex.org/W2150583327","doi":"https://doi.org/10.1109/iscas.2005.1466087","title":"A Scalable Encryption Method allowing Backward Compatibility with JPEG2000 Images","display_name":"A Scalable Encryption Method allowing Backward Compatibility with JPEG2000 Images","publication_year":2005,"publication_date":"2005-07-27","ids":{"openalex":"https://openalex.org/W2150583327","doi":"https://doi.org/10.1109/iscas.2005.1466087","mag":"2150583327"},"language":"en","primary_location":{"id":"doi:10.1109/iscas.2005.1466087","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2005.1466087","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2005 IEEE International Symposium on Circuits and Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015250468","display_name":"Hitoshi Kiya","orcid":"https://orcid.org/0000-0001-8061-3090"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"H. Kiya","raw_affiliation_strings":["Department of Electrical Engineering, Tokyo Metropolitan University, Hachioji, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Tokyo Metropolitan University, Hachioji, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043771878","display_name":"Osamu Watanabe","orcid":"https://orcid.org/0000-0002-4040-7417"},"institutions":[{"id":"https://openalex.org/I7377986","display_name":"Takushoku University","ror":"https://ror.org/05qh38f12","country_code":"JP","type":"education","lineage":["https://openalex.org/I7377986"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"O. Watanabe","raw_affiliation_strings":["Department of Electronics and Computer Systems, Takushoku University, Hachioji, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Computer Systems, Takushoku University, Hachioji, Tokyo, Japan","institution_ids":["https://openalex.org/I7377986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069073770","display_name":"A. Nakazaki","orcid":null},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"A. Nakazaki","raw_affiliation_strings":["Department of Electrical Engineering, Tokyo Metropolitan University, Hachioji, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, Tokyo Metropolitan University, Hachioji, Tokyo, Japan","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015250468"],"corresponding_institution_ids":["https://openalex.org/I69740276"],"apc_list":null,"apc_paid":null,"fwci":1.175,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.81659156,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"1","issue":null,"first_page":"6324","last_page":"6327"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.9281796216964722},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7823840379714966},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.6721577048301697},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.6101043820381165},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.6087303161621094},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5549649000167847},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.5378031134605408},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.5297830104827881},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5107991695404053},{"id":"https://openalex.org/keywords/disk-encryption-hardware","display_name":"Disk encryption hardware","score":0.5068472027778625},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.4920753836631775},{"id":"https://openalex.org/keywords/link-encryption","display_name":"Link encryption","score":0.4723820686340332},{"id":"https://openalex.org/keywords/disk-encryption-theory","display_name":"Disk encryption theory","score":0.4162953197956085},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3604099154472351},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3325379490852356},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.26833435893058777},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.26528820395469666},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.21227014064788818},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.1947181224822998},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.18003374338150024},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1224730908870697},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.11990410089492798},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08873474597930908}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.9281796216964722},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7823840379714966},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.6721577048301697},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.6101043820381165},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.6087303161621094},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5549649000167847},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.5378031134605408},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.5297830104827881},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5107991695404053},{"id":"https://openalex.org/C61719626","wikidata":"https://www.wikidata.org/wiki/Q17081362","display_name":"Disk encryption hardware","level":5,"score":0.5068472027778625},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.4920753836631775},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.4723820686340332},{"id":"https://openalex.org/C122874069","wikidata":"https://www.wikidata.org/wiki/Q5282312","display_name":"Disk encryption theory","level":5,"score":0.4162953197956085},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3604099154472351},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3325379490852356},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.26833435893058777},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.26528820395469666},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.21227014064788818},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.1947181224822998},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.18003374338150024},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1224730908870697},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.11990410089492798},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08873474597930908}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscas.2005.1466087","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscas.2005.1466087","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2005 IEEE International Symposium on Circuits and Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W117007327","https://openalex.org/W1563814523","https://openalex.org/W1598206900","https://openalex.org/W1996360405","https://openalex.org/W2132573196","https://openalex.org/W2133598069","https://openalex.org/W2138735272","https://openalex.org/W2141167084","https://openalex.org/W2411120379","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W4283388250","https://openalex.org/W2327933808","https://openalex.org/W2376666149","https://openalex.org/W2144246620","https://openalex.org/W1983408639","https://openalex.org/W2765754337","https://openalex.org/W2186080902","https://openalex.org/W2172042905","https://openalex.org/W4281639007","https://openalex.org/W2076683831"],"abstract_inverted_index":{"A":[0],"new":[1],"method":[2,23,57,91],"for":[3,106,121,133],"encryption":[4,22,30,40,123,131],"of":[5,36,78,99,129],"JPEG2000":[6,67,80],"images,":[7],"which":[8],"is":[9,15],"referred":[10],"to":[11,117],"as":[12],"'scalable":[13],"encryption',":[14],"proposed":[16,56,90],"in":[17,46],"this":[18],"paper.":[19],"The":[20],"scalable":[21],"makes":[24],"the":[25,33,50,55,71,75,79,85,89,119,122],"encrypted":[26,51,72,104],"images":[27,52,73,105],"have":[28,58,96],"multi-level":[29],"and":[31,74],"reduces":[32],"computational":[34],"complexity":[35],"encryption,":[37],"since":[38],"different":[39,112],"algorithms":[41,132],"can":[42,69,124],"be":[43,125],"simultaneously":[44],"used":[45],"its":[47],"procedure.":[48],"Moreover,":[49],"produced":[53],"by":[54,127],"complete":[59],"compliance":[60],"with":[61],"JPEG2000,":[62],"so":[63],"that":[64,93],"a":[65],"standard":[66],"decoder":[68],"decode":[70],"useful":[76],"functionalities":[77],"codestream":[81],"are":[82,110],"preserved":[83],"after":[84],"encryption.":[86],"For":[87],"example,":[88],"enables":[92],"content":[94],"holders":[95],"no":[97],"need":[98],"preparing":[100],"two":[101],"or":[102],"more":[103],"various":[107],"users":[108],"who":[109],"provided":[111],"access":[113],"rights.":[114],"In":[115],"addition":[116],"this,":[118],"time":[120],"controlled":[126],"selection":[128],"adequate":[130],"faster":[134],"processing.":[135]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
