{"id":"https://openalex.org/W4298137596","doi":"https://doi.org/10.15439/2022f217","title":"Encrypting JPEG-compressed images by substituting Huffman code words","display_name":"Encrypting JPEG-compressed images by substituting Huffman code words","publication_year":2022,"publication_date":"2022-09-26","ids":{"openalex":"https://openalex.org/W4298137596","doi":"https://doi.org/10.15439/2022f217"},"language":"en","primary_location":{"id":"doi:10.15439/2022f217","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2022f217","pdf_url":"https://annals-csis.org/proceedings/2022/drp/pdf/217.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/2022/drp/pdf/217.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014665694","display_name":"Marek Parfieniuk","orcid":"https://orcid.org/0000-0002-4436-8849"},"institutions":[{"id":"https://openalex.org/I245364917","display_name":"University of Bia\u0142ystok","ror":"https://ror.org/01qaqcf60","country_code":"PL","type":"education","lineage":["https://openalex.org/I245364917"]},{"id":"https://openalex.org/I4210087266","display_name":"Institute of Computer Science","ror":"https://ror.org/003fvp964","country_code":"PL","type":"facility","lineage":["https://openalex.org/I4210087266","https://openalex.org/I99542240"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Marek Parfieniuk","raw_affiliation_strings":["University of Bialystok, Institute of Computer Science ul. Konstantego Ciolkowskiego 1M, 15-245 Bialystok, Poland"],"affiliations":[{"raw_affiliation_string":"University of Bialystok, Institute of Computer Science ul. Konstantego Ciolkowskiego 1M, 15-245 Bialystok, Poland","institution_ids":["https://openalex.org/I245364917","https://openalex.org/I4210087266"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014665694"],"corresponding_institution_ids":["https://openalex.org/I245364917","https://openalex.org/I4210087266"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08840724,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"30","issue":null,"first_page":"545","last_page":"549"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/huffman-coding","display_name":"Huffman coding","score":0.9132671356201172},{"id":"https://openalex.org/keywords/canonical-huffman-code","display_name":"Canonical Huffman code","score":0.7984907627105713},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7300301790237427},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.6765612363815308},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5683301687240601},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5098961591720581},{"id":"https://openalex.org/keywords/transform-coding","display_name":"Transform coding","score":0.48072364926338196},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45816993713378906},{"id":"https://openalex.org/keywords/lossless-jpeg","display_name":"Lossless JPEG","score":0.42478781938552856},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.3413581848144531},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2930452227592468},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.25028955936431885},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.21645036339759827},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.2038957178592682},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1950567364692688},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.18718838691711426},{"id":"https://openalex.org/keywords/image-compression","display_name":"Image compression","score":0.1853187382221222},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07540908455848694}],"concepts":[{"id":"https://openalex.org/C46900642","wikidata":"https://www.wikidata.org/wiki/Q2647","display_name":"Huffman coding","level":3,"score":0.9132671356201172},{"id":"https://openalex.org/C115223089","wikidata":"https://www.wikidata.org/wiki/Q4885542","display_name":"Canonical Huffman code","level":5,"score":0.7984907627105713},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7300301790237427},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.6765612363815308},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5683301687240601},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5098961591720581},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.48072364926338196},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45816993713378906},{"id":"https://openalex.org/C8384606","wikidata":"https://www.wikidata.org/wiki/Q2190356","display_name":"Lossless JPEG","level":5,"score":0.42478781938552856},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.3413581848144531},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2930452227592468},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.25028955936431885},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.21645036339759827},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2038957178592682},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1950567364692688},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.18718838691711426},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.1853187382221222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07540908455848694},{"id":"https://openalex.org/C70992990","wikidata":"https://www.wikidata.org/wiki/Q1681587","display_name":"Systematic code","level":4,"score":0.0},{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15439/2022f217","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2022f217","pdf_url":"https://annals-csis.org/proceedings/2022/drp/pdf/217.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:878eeeeafdf74ec98b08b8614cea084b","is_oa":true,"landing_page_url":"https://doaj.org/article/878eeeeafdf74ec98b08b8614cea084b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Annals of computer science and information systems, Vol 30, Pp 545-549 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.15439/2022f217","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2022f217","pdf_url":"https://annals-csis.org/proceedings/2022/drp/pdf/217.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4298137596.pdf","grobid_xml":"https://content.openalex.org/works/W4298137596.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W196652130","https://openalex.org/W1510131396","https://openalex.org/W1990979552","https://openalex.org/W2011134637","https://openalex.org/W2052132921","https://openalex.org/W2057304011","https://openalex.org/W2064098395","https://openalex.org/W2106892689","https://openalex.org/W2137143105","https://openalex.org/W2157498268","https://openalex.org/W2245606036","https://openalex.org/W2489592103","https://openalex.org/W2512421222","https://openalex.org/W2791288201","https://openalex.org/W3083465696","https://openalex.org/W4246823323"],"related_works":["https://openalex.org/W2123243337","https://openalex.org/W2058423897","https://openalex.org/W2126317666","https://openalex.org/W1966252081","https://openalex.org/W2337609175","https://openalex.org/W2072156766","https://openalex.org/W2187912251","https://openalex.org/W4298137596","https://openalex.org/W4386739069","https://openalex.org/W2490812981"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,17,40,67,84,100,105],"method":[4],"for":[5,23,140],"encrypting":[6],"JPEGcoded":[7],"images":[8],"that":[9,55],"preserves":[10],"both":[11],"compression":[12],"ratio":[13],"and":[14,51,73,81,109,153],"format":[15,82],"of":[16,60,66,83,102,104,118,149],"bit":[18,107,154],"stream.":[19],"Such":[20,97],"solutions":[21],"allow":[22],"selectively":[24],"hiding":[25],"information:":[26],"image":[27,136],"contents":[28],"can":[29,112],"be":[30,113],"encrypted,":[31],"while":[32],"in-file":[33],"metadata":[34],"remain":[35],"readable.":[36],"Our":[37,143],"algorithm":[38],"is":[39,99],"symmetric,":[41],"polygram":[42],"substitution":[43],"cipher,":[44],"as":[45],"it":[46,111],"replaces":[47],"Huffman":[48,150],"code":[49,151],"words":[50],"rearranges":[52],"value":[53],"bits":[54,89],"describe":[56],"the":[57,61,70,74,116,158],"main":[58],"results":[59],"Discrete":[62],"Cosine":[63],"Transform":[64],"(DCT)":[65],"pixel":[68],"block:":[69],"DC":[71,141],"coefficient":[72],"first":[75],"non-zero":[76],"AC":[77,139],"coefficient.":[78],"Both":[79],"length":[80],"file":[85],"are":[86,90],"preserved,":[87],"because":[88],"modified":[91],"under":[92],"constraints":[93],"on":[94,115],"their":[95],"numbers.":[96],"encryption":[98],"kind":[101],"post-processing":[103],"compressed":[106],"stream,":[108],"thus":[110],"built":[114],"top":[117],"an":[119],"existing":[120],"JPEG":[121,159],"codec,":[122],"without":[123],"accessing":[124],"its":[125],"internals.":[126],"Compared":[127],"to":[128,157],"previous":[129],"similar":[130],"solutions,":[131],"our":[132],"approach":[133],"better":[134],"hides":[135],"contours,":[137],"exchanging":[138],"energy.":[142],"work":[144],"also":[145],"reveals":[146],"some":[147],"properties":[148],"tables":[152],"streams":[155],"related":[156],"standard.":[160]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
