{"id":"https://openalex.org/W4312339871","doi":"https://doi.org/10.1109/tits.2022.3217304","title":"Joint JPEG Compression and Encryption Scheme Based on Order-8-16 Block Transform","display_name":"Joint JPEG Compression and Encryption Scheme Based on Order-8-16 Block Transform","publication_year":2022,"publication_date":"2022-11-14","ids":{"openalex":"https://openalex.org/W4312339871","doi":"https://doi.org/10.1109/tits.2022.3217304"},"language":"en","primary_location":{"id":"doi:10.1109/tits.2022.3217304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2022.3217304","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064809178","display_name":"Peiya Li","orcid":"https://orcid.org/0000-0002-9356-0861"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peiya Li","raw_affiliation_strings":["College of Cyber Security and the College of Information Science and Technology, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-9356-0861","affiliations":[{"raw_affiliation_string":"College of Cyber Security and the College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089934160","display_name":"Zefan Sun","orcid":"https://orcid.org/0000-0002-1730-4209"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zefan Sun","raw_affiliation_strings":["College of Cyber Security and the College of Information Science and Technology, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-1730-4209","affiliations":[{"raw_affiliation_string":"College of Cyber Security and the College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043524826","display_name":"Zhenhui Situ","orcid":"https://orcid.org/0000-0001-5824-433X"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Zhenhui Situ","raw_affiliation_strings":["Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hung Hom, Hong Kong"],"raw_orcid":"https://orcid.org/0000-0001-5824-433X","affiliations":[{"raw_affiliation_string":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hung Hom, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101178005","display_name":"Meiling He","orcid":null},"institutions":[{"id":"https://openalex.org/I114539943","display_name":"Zhejiang Chinese Medical University","ror":"https://ror.org/04epb4p87","country_code":"CN","type":"education","lineage":["https://openalex.org/I114539943"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meiling He","raw_affiliation_strings":["Information Technology Center, Zhejiang Chinese Medical University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Technology Center, Zhejiang Chinese Medical University, Hangzhou, China","institution_ids":["https://openalex.org/I114539943"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009580523","display_name":"Tingting Song","orcid":"https://orcid.org/0000-0003-4088-8641"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tingting Song","raw_affiliation_strings":["College of Cyber Security and the College of Information Science and Technology, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-4088-8641","affiliations":[{"raw_affiliation_string":"College of Cyber Security and the College of Information Science and Technology, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5064809178"],"corresponding_institution_ids":["https://openalex.org/I159948400"],"apc_list":null,"apc_paid":null,"fwci":1.9388,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.8769776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"24","issue":"7","first_page":"7687","last_page":"7696"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7899305820465088},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.729821503162384},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5095294117927551},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48986050486564636},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.45740628242492676},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.44249650835990906},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.4370117485523224},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.43307510018348694},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4263612627983093},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3986542522907257},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3920503854751587},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.27038559317588806},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.21910148859024048},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.14573746919631958},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.07033470273017883}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7899305820465088},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.729821503162384},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5095294117927551},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48986050486564636},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.45740628242492676},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.44249650835990906},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.4370117485523224},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.43307510018348694},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4263612627983093},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3986542522907257},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3920503854751587},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.27038559317588806},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.21910148859024048},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.14573746919631958},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.07033470273017883}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tits.2022.3217304","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tits.2022.3217304","pdf_url":null,"source":{"id":"https://openalex.org/S144771191","display_name":"IEEE Transactions on Intelligent Transportation Systems","issn_l":"1524-9050","issn":["1524-9050","1558-0016"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Intelligent Transportation Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3343754000","display_name":null,"funder_award_id":"2020A1515110513","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G5059815345","display_name":null,"funder_award_id":"2022A1515011960","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G576546066","display_name":null,"funder_award_id":"61932010","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2009460929","https://openalex.org/W2022078916","https://openalex.org/W2063045808","https://openalex.org/W2096933452","https://openalex.org/W2113425454","https://openalex.org/W2128983215","https://openalex.org/W2425286230","https://openalex.org/W2509384312","https://openalex.org/W2572666595","https://openalex.org/W2582098157","https://openalex.org/W2593846387","https://openalex.org/W2607256305","https://openalex.org/W2747383861","https://openalex.org/W2781255632","https://openalex.org/W2791288201","https://openalex.org/W2803908664","https://openalex.org/W2901908388","https://openalex.org/W2933964678","https://openalex.org/W2944446180","https://openalex.org/W2944785541","https://openalex.org/W2963290951","https://openalex.org/W3005723933","https://openalex.org/W3008288826","https://openalex.org/W3013620107","https://openalex.org/W3015685412","https://openalex.org/W3023918415","https://openalex.org/W3103937830","https://openalex.org/W3112281491","https://openalex.org/W3137801059","https://openalex.org/W3162938965","https://openalex.org/W3186005414","https://openalex.org/W4205594186","https://openalex.org/W4210828215","https://openalex.org/W6717539790","https://openalex.org/W6805407455"],"related_works":["https://openalex.org/W1597187555","https://openalex.org/W2614249221","https://openalex.org/W2997133669","https://openalex.org/W2108294500","https://openalex.org/W2158017498","https://openalex.org/W2094583657","https://openalex.org/W1594300462","https://openalex.org/W2158009109","https://openalex.org/W1606460848","https://openalex.org/W1830945637"],"abstract_inverted_index":{"Joint":[0],"image":[1],"compression":[2,27,52,158],"and":[3,32,95,120,127,135,145,163],"encryption":[4,48],"techniques":[5],"can":[6,113],"be":[7],"used":[8],"to":[9,77,172],"ensure":[10,114],"the":[11,51,80,116,165,168],"security":[12,162],"of":[13,62,86,108,167],"JPEG":[14,43],"images.":[15],"The":[16,111,148],"related":[17],"works":[18],"in":[19],"this":[20,37],"field":[21],"face":[22],"problems":[23],"such":[24],"as":[25],"low":[26],"efficiency,":[28,159],"limited":[29],"protection":[30,44],"power,":[31],"corrupted":[33],"format":[34],"information.":[35],"In":[36],"paper,":[38],"we":[39,70,129],"propose":[40],"a":[41,64,72],"new":[42,73],"method":[45],"by":[46,105,133],"introducing":[47],"operations":[49],"into":[50,82],"process.":[53],"Considering":[54],"that":[55,115,151],"different":[56,59,84],"images":[57],"have":[58],"properties,":[60],"instead":[61],"using":[63],"fixed":[65],"block":[66,74,125,143],"size":[67,107,118],"for":[68],"encryption,":[69],"develop":[71],"segmentation":[75],"strategy":[76,112],"first":[78],"divide":[79],"plain-image":[81],"two":[83],"sizes":[85],"blocks,":[87],"<inline-formula":[88,96],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[89,97],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[90,98],"<tex-math":[91,99],"notation=\"LaTeX\">$8\\times":[92],"8$":[93],"</tex-math></inline-formula>":[94,102],"notation=\"LaTeX\">$16\\times":[100],"16$":[101],",":[103],"followed":[104],"corresponding":[106],"DCT\u2019s":[109],"transformation.":[110],"file":[117],"increment":[119],"rate-distortion":[121],"are":[122,140],"minimal.":[123],"After":[124],"transformation":[126],"quantization,":[128],"encrypt":[130],"DC":[131],"coefficients":[132,139],"XOR":[134],"swapping,":[136],"while":[137],"AC":[138],"protected":[141],"through":[142],"permutation":[144],"data":[146],"embedding.":[147],"experiments":[149],"show":[150],"our":[152],"scheme":[153],"does":[154],"not":[155],"compromise":[156],"JPEG\u2019s":[157,173],"offers":[160],"satisfied":[161],"maintains":[164],"format-compliant":[166],"final":[169],"encrypted":[170],"bitstream":[171],"decoder.":[174]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
