{"id":"https://openalex.org/W2343284043","doi":"https://doi.org/10.1109/iscit.2015.7458323","title":"A perceptual encryption scheme for Motion JPEG 2000 standard","display_name":"A perceptual encryption scheme for Motion JPEG 2000 standard","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2343284043","doi":"https://doi.org/10.1109/iscit.2015.7458323","mag":"2343284043"},"language":"en","primary_location":{"id":"doi:10.1109/iscit.2015.7458323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscit.2015.7458323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 15th International Symposium on Communications and Information Technologies (ISCIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043771878","display_name":"Osamu Watanabe","orcid":"https://orcid.org/0000-0002-4040-7417"},"institutions":[{"id":"https://openalex.org/I7377986","display_name":"Takushoku University","ror":"https://ror.org/05qh38f12","country_code":"JP","type":"education","lineage":["https://openalex.org/I7377986"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Osamu Watanabe","raw_affiliation_strings":["Dept. of Electronics & Computer Systems, Takushoku University"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronics & Computer Systems, Takushoku University","institution_ids":["https://openalex.org/I7377986"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057809960","display_name":"Takahiro Fukuhara","orcid":"https://orcid.org/0000-0001-9696-8427"},"institutions":[{"id":"https://openalex.org/I7377986","display_name":"Takushoku University","ror":"https://ror.org/05qh38f12","country_code":"JP","type":"education","lineage":["https://openalex.org/I7377986"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takahiro Fukuhara","raw_affiliation_strings":["Dept. of Electronics & Computer Systems, Takushoku University"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronics & Computer Systems, Takushoku University","institution_ids":["https://openalex.org/I7377986"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015250468","display_name":"Hitoshi Kiya","orcid":"https://orcid.org/0000-0001-8061-3090"},"institutions":[{"id":"https://openalex.org/I69740276","display_name":"Tokyo Metropolitan University","ror":"https://ror.org/00ws30h19","country_code":"JP","type":"education","lineage":["https://openalex.org/I69740276"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hitoshi Kiya","raw_affiliation_strings":["Faculty of Info. and Commun. Systems, Tokyo Metropolitan University"],"affiliations":[{"raw_affiliation_string":"Faculty of Info. and Commun. Systems, Tokyo Metropolitan University","institution_ids":["https://openalex.org/I69740276"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043771878"],"corresponding_institution_ids":["https://openalex.org/I7377986"],"apc_list":null,"apc_paid":null,"fwci":0.3682,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.71059596,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"125","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7468607425689697},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7449651956558228},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5968687534332275},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.580415666103363},{"id":"https://openalex.org/keywords/jpeg-2000","display_name":"JPEG 2000","score":0.498776912689209},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49340859055519104},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4550229012966156},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4525236487388611},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4243064522743225},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.30484485626220703},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.23170998692512512},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2280542254447937},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16226330399513245},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14391779899597168},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10174193978309631}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7468607425689697},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7449651956558228},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5968687534332275},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.580415666103363},{"id":"https://openalex.org/C69216139","wikidata":"https://www.wikidata.org/wiki/Q931783","display_name":"JPEG 2000","level":5,"score":0.498776912689209},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49340859055519104},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4550229012966156},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4525236487388611},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4243064522743225},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.30484485626220703},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.23170998692512512},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2280542254447937},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16226330399513245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14391779899597168},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10174193978309631},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscit.2015.7458323","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscit.2015.7458323","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 15th International Symposium on Communications and Information Technologies (ISCIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1501211345","https://openalex.org/W2009460929","https://openalex.org/W2023966246","https://openalex.org/W2046789300","https://openalex.org/W2052836530","https://openalex.org/W2084994317","https://openalex.org/W2101647944","https://openalex.org/W2101677434","https://openalex.org/W2104722041","https://openalex.org/W2133364557","https://openalex.org/W2141983208","https://openalex.org/W2148254922","https://openalex.org/W2171464389","https://openalex.org/W4242026686","https://openalex.org/W4255514781","https://openalex.org/W6671684881","https://openalex.org/W6680036709"],"related_works":["https://openalex.org/W2441603424","https://openalex.org/W2542654834","https://openalex.org/W4243959093","https://openalex.org/W1994319845","https://openalex.org/W2159814397","https://openalex.org/W3095399624","https://openalex.org/W1968318766","https://openalex.org/W4312760377","https://openalex.org/W2357838320","https://openalex.org/W2096442341"],"abstract_inverted_index":{"A":[0],"new":[1],"perceptual":[2,40],"encryption":[3,41],"scheme":[4,56,93],"with":[5,109],"an":[6,67],"efficient":[7,37,68],"key-management":[8],"mechanism":[9,69],"for":[10,77,102],"the":[11,49,54,62,91,110],"Motion":[12,63,111],"JPEG":[13,64,112],"2000":[14,113],"based":[15],"ETC":[16,24,47],"system":[17,25,30],"is":[18,26,80],"proposed":[19,55,92],"in":[20],"this":[21],"paper.":[22],"An":[23],"known":[27],"as":[28],"a":[29,72],"that":[31,90],"makes":[32],"image/video":[33,43,104],"communication":[34,105],"secure":[35,103],"and":[36,42,99],"by":[38,53,61],"using":[39],"compression.":[44],"Unlike":[45],"conventional":[46],"systems,":[48],"perceptually":[50],"encrypted":[51],"images":[52],"can":[57],"be":[58],"efficiently":[59],"compressed":[60],"2000.":[65],"Moreover,":[66],"to":[70,82],"manage":[71],"lot":[73],"of":[74],"secret":[75],"keys":[76],"video":[78],"sequences":[79],"provided":[81],"avoid":[83],"complex":[84],"key-management.":[85],"The":[86],"experimental":[87],"results":[88],"demonstrated":[89],"achieved":[94],"both":[95],"acceptable":[96],"compression":[97],"performance":[98],"enough":[100],"security":[101],"while":[106],"remaining":[107],"compatible":[108],"standard.":[114]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
