{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T09:13:20Z","timestamp":1648977200292},"reference-count":18,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2015]]},"DOI":"10.1587\/transfun.e98.a.1760","type":"journal-article","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T18:40:02Z","timestamp":1438368002000},"page":"1760-1768","source":"Crossref","is-referenced-by-count":0,"title":["Partial Encryption Method That Enhances MP3 Security"],"prefix":"10.1587","volume":"E98.A","author":[{"given":"Twe Ta","family":"OO","sequence":"first","affiliation":[{"name":"Graduate School of Information Science and Technology, Osaka University"}]},{"given":"Takao","family":"ONOYE","sequence":"additional","affiliation":[{"name":"Graduate School of Information Science and Technology, Osaka University"}]},{"given":"Kilho","family":"SHIN","sequence":"additional","affiliation":[{"name":"Graduate School of Applied Informatics, University of Hyogo"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] P. Biddle, P. England, M. Peinado, and B. Willman, \u201cThe darknet and the future of content protection,\u201d Digital Rights Management, Lecture Notes in Computer Science, vol.2770, pp.344-365, ISBN 978-3-540-40465-1, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003."},{"key":"2","unstructured":"[2] N.J. Thorwirth, P. Horvatic, R. Weis, and J. Zhao, \u201cSecurity methods for MP3 music delivery,\u201d Proc. 34th Asilomar Conf. IEEE Signals, Systems and Computers, vol.2, pp.1831-1835, Nov. 2000."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] A. Torrubia and F. Mora, \u201cPerceptual cryptography on MPEG-1 Layer III bit-streams,\u201d IEEE Trans. Consum. Electron., vol.48, no.4, pp.1046-1050, Nov. 2003.","DOI":"10.1109\/TCE.2003.1196437"},{"key":"4","unstructured":"[4] M. Steinebach, S. Zmudzinski, and T. Bolke, \u201cAudio watermarking and partial encryption,\u201d Proc. Security, Steganography, and Watermarking of Multimedia Contents VII, vol.5681, pp.779-788, March 2005."},{"key":"5","unstructured":"[5] A. Servetti, C. Testa, and J.C. De Martin, \u201cFrequency-selective partial encryption of compressed audio,\u201d Proc. IEEE Intl. Conf. on Acoustics, Speech, Signal Processing, vol.5, pp.668-671, April 2003."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] B. Gadanayak and C. Pradhan, \u201cSelective encryption of MP3 compression,\u201d Intl. J. Computer Applications, ICIST, vol.1, pp.23-26, Aug. 2011.","DOI":"10.5120\/3082-4218"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] W.-Q. Yan, W.-G. Fu, and M.S. Kankanhalli, \u201cProgressive audio scrambling in compressed domain,\u201d IEEE Trans. Multimedia, vol.10, no.6, pp.960-968, Oct. 2008.","DOI":"10.1109\/TMM.2008.2001373"},{"key":"8","unstructured":"[8] A.V. Subramanyam and S. Emmanuel, \u201cAudio watermarking in partially compressed-encrypted domain,\u201d IEEE Intl. Conf. on Systems, Man, and Cybernetics, pp.2867-2872, Oct. 2012."},{"key":"9","unstructured":"[9] R. Raissi, \u201cThe theory behind MP3,\u201d Dec. 2002, http:\/\/www.mp3-tech.org\/programmer\/docs\/mp3_theory.pdf"},{"key":"10","unstructured":"[10] K. Brandenburg and G. Stoll, \u201cISO MPEG-1 audio: A generic standard for coding of high-quality digital audio,\u201d J. AES, vol.42, no.10, pp.780-792, Oct. 1994."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] P. Noll, \u201cMPEG digital audio coding,\u201d IEEE Signal Process. Mag., vol.14, no.5, pp.59-81, Sept. 1997.","DOI":"10.1109\/79.618009"},{"key":"12","unstructured":"[12] M. Biskup, \u201cError resilience in compressed data,\u201d PhD Dissertation, Faculty of Mathematics, Informatics and Mechanics, University of Warsaw."},{"key":"13","unstructured":"[13] \u201cAnnouncing the advanced encryption standard (AES),\u201d http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"14","unstructured":"[14] Twe Ta Oo, T. Onoye, and K. Shin, \u201cA partial encryption scheme for compressed audio based on amplitude scaling,\u201d Proc. Intl. Workshop on Smart Info-Media Systems in Asia (SISA), pp.73-77, Sept. 2013."},{"key":"15","unstructured":"[15] http:\/\/lame.sourceforge.net\/links.php#OpenSource"},{"key":"16","unstructured":"[16] \u201cMethod for objective measurements of perceived audio quality,\u201d Rec. ITU-R BS.1387-1, 1998-2001."},{"key":"17","unstructured":"[17] \u201cGeneral methods for the subjective assessment of sound quality,\u201d Rec. ITU-R BS.1284-1, 1997-2003."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] H. Wang, M. Hempel, D. Peng, W. Wang, H. Sharif, and H.-H. Chen, \u201cIndex-based selective audio encryption for wireless multimedia sensor networks,\u201d IEEE Trans. Multimedia, vol.12, no.3, pp.215-223, April 2010.","DOI":"10.1109\/TMM.2010.2041102"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E98.A\/8\/E98.A_1760\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T19:55:06Z","timestamp":1567022106000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E98.A\/8\/E98.A_1760\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2015]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.e98.a.1760","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}