{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:39:12Z","timestamp":1762004352718},"reference-count":37,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2012,2,1]],"date-time":"2012-02-01T00:00:00Z","timestamp":1328054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1016\/j.cose.2011.11.005","type":"journal-article","created":{"date-parts":[[2011,11,22]],"date-time":"2011-11-22T17:35:06Z","timestamp":1321983306000},"page":"26-32","source":"Crossref","is-referenced-by-count":7,"title":["On scrambling the Burrows\u2013Wheeler transform to provide privacy in lossless compression"],"prefix":"10.1016","volume":"31","author":[{"given":"M.","family":"O\u011fuzhan K\u00fclekci","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2011.11.005_bib1","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","article-title":"Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions","volume":"21","author":"Abdalla","year":"2008","journal-title":"Journal of Cryptology"},{"key":"10.1016\/j.cose.2011.11.005_bib2","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1006\/jcss.1996.0023","article-title":"Let sleeping files lie: pattern matching in Z-compressed files","volume":"52","author":"Amir","year":"1996","journal-title":"Journal of Computer and System Sciences"},{"key":"10.1016\/j.cose.2011.11.005_bib3","series-title":"Proceedings of the 29th southeastern symposium on system theory","first-page":"266","article-title":"A methodology for performing secure data compression","author":"Barbir","year":"1997"},{"key":"10.1016\/j.cose.2011.11.005_bib4","series-title":"Proceedings of the data compression conference","first-page":"112","article-title":"Searching BWT compressed text with the Boyer\u2013Moore algorithm and binary search","author":"Bell","year":"2002"},{"key":"10.1016\/j.cose.2011.11.005_bib5","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/5684.5688","article-title":"A locally adaptive text compression scheme","volume":"29","author":"Bentley","year":"1986","journal-title":"Communications of the ACM"},{"issue":"5","key":"10.1016\/j.cose.2011.11.005_bib6","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/0167-4048(92)90011-F","article-title":"Data security in a fixed-model arithmetic coding compression algorithm","volume":"11","author":"Bergen","year":"1992","journal-title":"Computers & Security"},{"issue":"2","key":"10.1016\/j.cose.2011.11.005_bib7","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/0167-4048(93)90099-Q","article-title":"A chosen plaintext attack on an adaptive arithmetic coding compression algorithm","volume":"12","author":"Bergen","year":"1993","journal-title":"Computers & Security"},{"key":"10.1016\/j.cose.2011.11.005_bib8","series-title":"Proceedings of fast software Encryption\u201994","first-page":"144","article-title":"A known plaintext attack on the PKZIP stream cipher","author":"Biham","year":"1995"},{"year":"1994","series-title":"A block-sorting lossless data compression algorithm","author":"Burrows","key":"10.1016\/j.cose.2011.11.005_bib9"},{"key":"10.1016\/j.cose.2011.11.005_bib10","series-title":"Proceedings of the data compression conference","first-page":"532","article-title":"Higher compression from the BWT by modified sorting","author":"Chapin","year":"1998"},{"key":"10.1016\/j.cose.2011.11.005_bib11","series-title":"Proceedings of the data compression conference","first-page":"252","article-title":"Geometric Burrows\u2013Wheeler transform: linking range searching and text indexing","author":"Chien","year":"2008"},{"issue":"2","key":"10.1016\/j.cose.2011.11.005_bib12","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0167-4048(95)97050-K","article-title":"On the insecurity of arithmetic coding","volume":"14","author":"Cleary","year":"1995","journal-title":"Computers & Security"},{"year":"2002","series-title":"The design of Rijndael: aES\u2013the advanced encryption standard","author":"Daemen","key":"10.1016\/j.cose.2011.11.005_bib13"},{"key":"10.1016\/j.cose.2011.11.005_bib14","series-title":"Proceedings of the 41st annual symposium on foundations of computer science","first-page":"390","article-title":"Opportunistic data structures with applications","author":"Ferragina","year":"2000"},{"key":"10.1016\/j.cose.2011.11.005_bib15","series-title":"Combinatorial pattern matching","first-page":"71","article-title":"Move-to-front, distance coding, and inversion frequencies revisited","volume":"vol. 4580","author":"Gagie","year":"2007"},{"key":"10.1016\/j.cose.2011.11.005_bib16","series-title":"Proceedings of IIT Kanpur hackers workshop","article-title":"An intelligent text data encryption and compression for high speed and secure data transmission over Internet","author":"Govindan","year":"2004"},{"key":"10.1016\/j.cose.2011.11.005_bib17","series-title":"Proceedings of IEEE 6th workshop on multimedia signal processing","first-page":"347","article-title":"Selective encryption of JPEG2000 images by means of randomized arithmetic coding","author":"Grangetto","year":"2004"},{"issue":"5","key":"10.1016\/j.cose.2011.11.005_bib18","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TMM.2006.879919","article-title":"Multimedia selective encryption by means of randomized arithmetic coding","volume":"8","author":"Grangetto","year":"2006","journal-title":"IEEE Transactions on Multimedia"},{"key":"10.1016\/j.cose.2011.11.005_bib19","series-title":"Combinatorial pattern matching","first-page":"260","article-title":"Compression, indexing, and retrieval for massive string data","volume":"vol. 6129","author":"Hon","year":"2010"},{"key":"10.1016\/j.cose.2011.11.005_bib20","series-title":"Combinatorial pattern matching","first-page":"107","article-title":"Most Burrows\u2013Wheeler based compressors are not optimal","volume":"vol. 4580","author":"Kaplan","year":"2007"},{"issue":"5","key":"10.1016\/j.cose.2011.11.005_bib21","doi-asserted-by":"crossref","first-page":"2263","DOI":"10.1109\/TSP.2007.892710","article-title":"Secure arithmetic coding","volume":"55","author":"Kim","year":"2007","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10.1016\/j.cose.2011.11.005_bib22","series-title":"Proceedings of the 11th ACM conference on computer and communications security","first-page":"72","article-title":"Attacking and repairing the WinZip encryption scheme","author":"Kohno","year":"2004"},{"key":"10.1016\/j.cose.2011.11.005_bib23","series-title":"Proceedings of the 2nd Australasian conference on information security and privacy","first-page":"216","article-title":"Cryptanalysis of adaptive arithmetic coding encryption scheme","author":"Lim","year":"1997"},{"key":"10.1016\/j.cose.2011.11.005_bib24","series-title":"Proceedings of the 6th IMA international conference on cryptography and coding","first-page":"199","article-title":"Resisting the Bergen\u2013Hogan attack on adaptive arithmetic coding","author":"Liu","year":"1997"},{"issue":"1","key":"10.1016\/j.cose.2011.11.005_bib25","doi-asserted-by":"crossref","DOI":"10.1145\/1216370.1216372","article-title":"Compressed full-text indexes","volume":"39","author":"Navarro","year":"2007","journal-title":"ACM Computing Surveys"},{"issue":"6","key":"10.1016\/j.cose.2011.11.005_bib26","doi-asserted-by":"crossref","first-page":"1297","DOI":"10.1142\/S012905410600442X","article-title":"Compressed pattern matching in JPEG images","volume":"17","author":"Shapira","year":"2006","journal-title":"International Journal of Foundations of Computer Science"},{"year":"1999","series-title":"Byte pair encoding: a text compression scheme that accelerates pattern matching","author":"Shibata","key":"10.1016\/j.cose.2011.11.005_bib27"},{"key":"10.1016\/j.cose.2011.11.005_bib28","series-title":"Combinatorial pattern matching","first-page":"181","article-title":"A Boyer\u2013Moore type algorithm for compressed pattern matching","volume":"vol. 1848","author":"Shibata","year":"2000"},{"key":"10.1016\/j.cose.2011.11.005_bib29","series-title":"Fast software encryption","first-page":"411","article-title":"ZIP attacks with reduced known plaintext","author":"Stay","year":"2002"},{"key":"10.1016\/j.cose.2011.11.005_bib30","unstructured":"Tao T. Compressed pattern matching for text and images. Ph.D. thesis; Orlando, FL, USA; 2005. AAI3178974."},{"issue":"6","key":"10.1016\/j.cose.2011.11.005_bib31","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MC.1984.1659158","article-title":"A technique for high\u2013performance data compression","volume":"17","author":"Welch","year":"1984","journal-title":"IEEE Computer"},{"issue":"4","key":"10.1016\/j.cose.2011.11.005_bib32","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/0167-4048(88)90580-9","article-title":"On the privacy afforded by adaptive text compression","volume":"7","author":"Witten","year":"1988","journal-title":"Computers & Security"},{"issue":"5","key":"10.1016\/j.cose.2011.11.005_bib33","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TMM.2005.854469","article-title":"Design of integrated multimedia compression and encryption systems","volume":"7","author":"Wu","year":"2005","journal-title":"IEEE Transactions on Multimedia"},{"issue":"2","key":"10.1016\/j.cose.2011.11.005_bib34","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/s10207-006-0086-3","article-title":"On the security of the WinRAR encryption feature","volume":"5","author":"Yeo","year":"2006","journal-title":"International Journal of Information Security"},{"key":"10.1016\/j.cose.2011.11.005_bib35","first-page":"118","article-title":"Efficient frequency domain selective scrambling of digital video","volume":"vol. 5","author":"Zeng","year":"2003"},{"key":"10.1016\/j.cose.2011.11.005_bib36","series-title":"IEEE International conference on multimedia and Expo","first-page":"245","article-title":"Secure Lempel-Ziv-Welch algorithm with random dictionary insertion and permutation","author":"Zhou","year":"2008"},{"issue":"5","key":"10.1016\/j.cose.2011.11.005_bib37","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1109\/TSP.2009.2013901","article-title":"Adaptive chosen-ciphertext attack on secure arithmetic coding","volume":"57","author":"Zhou","year":"2009","journal-title":"IEEE Transactions on Signal Processing"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404811001416?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404811001416?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T03:55:44Z","timestamp":1543377344000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404811001416"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["S0167404811001416"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2011.11.005","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2012,2]]}}}