{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:35Z","timestamp":1740149075328,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","issue":"18","license":[{"start":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T00:00:00Z","timestamp":1486425600000},"content-version":"vor","delay-in-days":68,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100002471","name":"Dongguk University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002471","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Zhang introduced a novel reversible data\u2010hiding scheme for encrypted images. At the receiver, the hidden data is extracted by exploiting the spatial correlation in the image. But Zhang's scheme does not perform well for smaller block sizes and incurs bit extraction errors during recovery. We eliminate this problem by omitting those blocks from the data\u2010hiding operation that causes extraction errors. To identify those blocks at the receiver, we embed their index information into a small portion of the image using a difference expansion method. The experimental results from the proposed scheme indicate that all the hidden data can be successfully retrieved without errors. Copyright \u00a9 2017 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1745","type":"journal-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T05:42:59Z","timestamp":1486446179000},"page":"5908-5917","source":"Crossref","is-referenced-by-count":0,"title":["An error\u2010free data\u2010hiding scheme for encrypted images"],"prefix":"10.1002","volume":"9","author":[{"given":"Mohsan","family":"Rasheed","sequence":"first","affiliation":[{"name":"Department of Information and Communication Engineering Dongguk University  Seoul 440\u2010746 Korea"}]},{"given":"Young\u2010Sik","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering Chosun University  Gwangju 501\u2010759 Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4661-7044","authenticated-orcid":false,"given":"Daewoon","family":"Lim","sequence":"additional","affiliation":[{"name":"Department of Information and Communication Engineering Dongguk University  Seoul 440\u2010746 Korea"}]}],"member":"311","published-online":{"date-parts":[[2017,2,7]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.913598"},{"key":"e_1_2_7_4_1","unstructured":"ZhaoB DelpEJ.Secret sharing in the encrypted domain with secure comparison. InIn Proceedings of Global Telecommunications Conference (GLOBECOM 2011).IEEE:Houston Texas USA;2011."},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2011087"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2187334"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.06.023"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.864"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2381-8"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.06.014"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2012.2224052"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2260760"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.06.009"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1894-5"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1049\/el.2014.4476"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2433194"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.12.007"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"e_1_2_7_21_1","unstructured":"Image database [Online]. Available:https:\/\/sipi.usc.edu\/database\/[Accessed on 1 December 2015]."},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1745","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T19:48:09Z","timestamp":1693684089000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1745"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":21,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1002\/sec.1745"],"URL":"https:\/\/doi.org\/10.1002\/sec.1745","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2016,12]]}}}