{"id":"https://openalex.org/W4328007224","doi":"https://doi.org/10.1109/tsc.2023.3258144","title":"A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding","display_name":"A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding","publication_year":2023,"publication_date":"2023-03-20","ids":{"openalex":"https://openalex.org/W4328007224","doi":"https://doi.org/10.1109/tsc.2023.3258144"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2023.3258144","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100397733","display_name":"Yang Yang","orcid":"https://orcid.org/0000-0003-1048-7994"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Yang","raw_affiliation_strings":["Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","School of Electronics and Information Engineering, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"Institute of Artificial Intelligence, Hefei Comprehensive National Science Center, Hefei, China","institution_ids":[]},{"raw_affiliation_string":"School of Electronics and Information Engineering, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101639327","display_name":"Ming Cheng","orcid":"https://orcid.org/0000-0003-1819-650X"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Cheng","raw_affiliation_strings":["School of Electronics and Information Engineering, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058622083","display_name":"Yingqiu Ding","orcid":"https://orcid.org/0000-0003-3417-5717"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingqiu Ding","raw_affiliation_strings":["School of Electronics and Information Engineering, Anhui University, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067689180","display_name":"Weiming Zhang","orcid":"https://orcid.org/0000-0001-5576-6108"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiming Zhang","raw_affiliation_strings":["School of Information Science and Technology, University of Science and Technology of China, Hefei, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.933,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.999956,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"16","issue":"4","first_page":"2387","last_page":"2401"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9916,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.58432007},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.49093345},{"id":"https://openalex.org/keywords/visual-cryptography","display_name":"Visual cryptography","score":0.41626263}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7629976},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.69520044},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.63813215},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.58432007},{"id":"https://openalex.org/C136968285","wikidata":"https://www.wikidata.org/wiki/Q3246374","display_name":"Set partitioning in hierarchical trees","level":5,"score":0.54287297},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.5030994},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.49093345},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4247193},{"id":"https://openalex.org/C2779072331","wikidata":"https://www.wikidata.org/wiki/Q1597418","display_name":"Visual cryptography","level":4,"score":0.41626263},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38861328},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35681885},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2903061},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2794754},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.26396614},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.23403579},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22365975},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2023.3258144","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"62272003"}],"datasets":[],"versions":[],"referenced_works_count":44,"referenced_works":["https://openalex.org/W1975358183","https://openalex.org/W2020039621","https://openalex.org/W2038201090","https://openalex.org/W2046812369","https://openalex.org/W2049277103","https://openalex.org/W2057835419","https://openalex.org/W2075110101","https://openalex.org/W2088339902","https://openalex.org/W2092384195","https://openalex.org/W2099221163","https://openalex.org/W2105145864","https://openalex.org/W2133665775","https://openalex.org/W2137288380","https://openalex.org/W2142276208","https://openalex.org/W2152254020","https://openalex.org/W2254614551","https://openalex.org/W2281202871","https://openalex.org/W2323473128","https://openalex.org/W2325932803","https://openalex.org/W2348717968","https://openalex.org/W2400363826","https://openalex.org/W2425286230","https://openalex.org/W2483923130","https://openalex.org/W2523586230","https://openalex.org/W2537700529","https://openalex.org/W2551769760","https://openalex.org/W2552409881","https://openalex.org/W2608592531","https://openalex.org/W2760188900","https://openalex.org/W2786793274","https://openalex.org/W2884201190","https://openalex.org/W2895660505","https://openalex.org/W2914885528","https://openalex.org/W2916945904","https://openalex.org/W2960243139","https://openalex.org/W2990670835","https://openalex.org/W3009587941","https://openalex.org/W3015061318","https://openalex.org/W3038122394","https://openalex.org/W3043785465","https://openalex.org/W3046950125","https://openalex.org/W3127900952","https://openalex.org/W3134872094","https://openalex.org/W3155684629"],"related_works":["https://openalex.org/W4327499886","https://openalex.org/W4294006383","https://openalex.org/W3210332869","https://openalex.org/W3202870363","https://openalex.org/W2548156713","https://openalex.org/W2386792074","https://openalex.org/W2380116549","https://openalex.org/W2115343698","https://openalex.org/W2096442341","https://openalex.org/W1680283075"],"abstract_inverted_index":{"With":[0],"the":[1,7,19,27,54,60,68,100,104,108,115,119,133,138,145,153,156,167,178,184],"popularity":[2],"of":[3,9,21,40,56,62,180,186],"social":[4],"networks":[5],"and":[6,65,112,175,198],"increase":[8],"cloud":[10,28,120,154],"platform":[11],"applications,":[12],"service":[13],"computing":[14],"has":[15,30],"also":[16,190],"developed.":[17],"Therefore,":[18],"protection":[20],"information":[22],"even":[23,143],"privacy":[24],"uploaded":[25],"to":[26,118,192],"server":[29,121],"become":[31],"critical.":[32],"Recently,":[33],"some":[34],"researchers":[35],"have":[36],"proposed":[37,79,109,168],"encryption":[38,84,110],"schemes":[39,50,194],"visual":[41,196],"meaningful":[42,82],"image":[43,58,64,71,83,102,106,117,135,147,159,182],"by":[44,150],"using":[45],"compressive":[46],"sensing.":[47],"However,":[48],"these":[49],"generally":[51],"cannot":[52,66],"hide":[53,177],"large-size":[55,179],"plain":[57,70,101,134,181],"into":[59,103,183],"small-size":[61,185],"cover":[63,187],"recover":[67],"original":[69],"lossless.":[72],"To":[73],"solve":[74],"above":[75],"problems,":[76],"this":[77],"paper":[78],"a":[80],"visually":[81],"scheme":[85,169],"based":[86],"on":[87],"lossless":[88],"compression":[89],"set":[90],"partitioning":[91],"in":[92,152,195],"hierarchical":[93],"trees":[94],"(SPIHT)":[95],"coding.":[96],"The":[97],"sender":[98],"encrypts":[99],"cipher":[105,116,139,146],"through":[107],"scheme,":[111],"then":[113],"uploads":[114],"which":[122],"is":[123,148,160,170],"assumed":[124],"as":[125],"semi-honest":[126],"trusted.":[127],"Authorized":[128],"receiver":[129],"can":[130,176],"completely":[131,173],"decrypt":[132],"after":[136],"downloading":[137],"image.":[140],"In":[141],"addition,":[142],"if":[144],"attacked":[149],"attacker":[151],"server,":[155],"final":[157],"decrypted":[158],"still":[161],"readable.":[162],"Experimental":[163],"results":[164],"show":[165],"that":[166],"not":[171],"only":[172],"reversible":[174],"image,":[188],"but":[189],"superior":[191],"other":[193],"quality":[197],"anti-attack":[199],"performance.":[200]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4328007224","counts_by_year":[{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":4}],"updated_date":"2024-12-08T08:35:49.473922","created_date":"2023-03-22"}