{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:38:29Z","timestamp":1729661909808,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ism.2006.19","type":"proceedings-article","created":{"date-parts":[[2008,7,18]],"date-time":"2008-07-18T12:09:06Z","timestamp":1216382946000},"page":"541-548","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Perceptual Degradation Based on Video Usage"],"prefix":"10.1109","author":[{"given":"Alexander","family":"Wong","sequence":"first","affiliation":[]},{"given":"William","family":"Bishop","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"708","article-title":"Cryptanalysis of a chaotic image encryption method","author":"li","year":"2002","journal-title":"proceedings of IEEE International Symposium on Circuits and Systems"},{"key":"ref11","first-page":"925","article-title":"On the security of an image encryption method","author":"li","year":"2002","journal-title":"Proceedings of International Conference on Image Processing"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/CIT.2004.1357178","article-title":"Perceptual cryptography on jpeg2000 compressed images or videos","author":"lian","year":"2004","journal-title":"Proceedings of the Fourth International Conference on Computer and Information Technology"},{"key":"ref13","first-page":"83","article-title":"Perceptual mpeg-4 video encryption and its usage in video-on demand systems","author":"lian","year":"2004","journal-title":"IEEE International Symposium on Consumer Electronics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2003.1206022"},{"journal-title":"Proceedings of World Wide Congress (3G Wireless)","article-title":"Wavelet domain image encryption by subband selection and data bit selection","year":"2003","author":"seo","key":"ref15"},{"key":"ref16","first-page":"58","article-title":"Perceptual cryptography of jpeg compressed images on the jflf bit-stream domain","author":"tormbia","year":"2003","journal-title":"Proceedings of the IEEE Inlcmutiunal Symposium on Consumer Electronics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RISSP.2003.1285684"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NRSC.2003.1217349"},{"year":"1993","key":"ref4","article-title":"Coding of Moving Pictures and Associated Audio for Digital Storage Media up to About 1.5 Mbits\/s - Part 2: Video"},{"key":"ref3","first-page":"86","article-title":"Security traffic transmission based on ezw and aes","volume":"1","author":"hou","year":"2003","journal-title":"Proceedings of IEEE Intelligent Transportation Systems"},{"journal-title":"Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification","article-title":"Joint Video Team of ITU-T and I","year":"2003","key":"ref6"},{"year":"1994","key":"ref5","article-title":"Generic Coding of Moving Pictures and Associated Audio Information - Part 2: Video"},{"article-title":"On the design of perceptual mpeg-video encryption algorithms","year":"2005","author":"li","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/978-3-540-30543-9_53","article-title":"Cryptanalysis of a chaotic neural network based multimedia encryption scheme","volume":"3","author":"li","year":"2004","journal-title":"Advances in Multimedia Information Processing-PCM 2004 Proceedings"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/30.883383"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2005.1464931"},{"journal-title":"Cryptanalysis of the RCES\/RSES image encryption scheme","year":"2004","author":"li","key":"ref9"}],"event":{"name":"Eighth IEEE International Symposium on Multimedia (ISM'06)","start":{"date-parts":[[2006,12,11]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2006,12,13]]}},"container-title":["Eighth IEEE International Symposium on Multimedia (ISM'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4061132\/4061133\/04061213.pdf?arnumber=4061213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T06:04:04Z","timestamp":1497765844000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4061213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ism.2006.19","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}