{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:39Z","timestamp":1740099159708,"version":"3.37.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000110"},{"type":"electronic","value":"9783030000127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00012-7_61","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T14:15:30Z","timestamp":1536761730000},"page":"670-679","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reversible Data Hiding in Partially-Encrypted Images"],"prefix":"10.1007","author":[{"given":"Haishan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wien","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jiangqun","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Tung-Shou","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"61_CR1","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi, Y.-Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"issue":"4","key":"61_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted images. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"key":"61_CR3","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","volume":"11","author":"F Huang","year":"2016","unstructured":"Huang, F., Huang, J., Shi, Y.-Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11, 2777\u20132789 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"61_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"key":"61_CR5","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Signal Process. 94, 118\u2013127 (2014)","journal-title":"Signal Process."},{"issue":"3","key":"61_CR6","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"61_CR7","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"X Li","year":"2015","unstructured":"Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016\u20132027 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"61_CR8","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li, X., Li, B., Yang, B., Zeng, T.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181\u20132191 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"61_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"Li, X., Li, J., Li, B., Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1), 198\u2013205 (2013)","journal-title":"Signal Process."},{"issue":"1","key":"61_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu, N.: A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man Cybern. 9(1), 62\u201366 (1979)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"61_CR11","unstructured":"National Biomedical Imaging Archive (NBIA) [Online]. \nhttps:\/\/imaging.nci.nih.gov\/ncia\/login.jsf\n\n#"},{"key":"61_CR12","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.sigpro.2015.12.012","volume":"123","author":"D Xu","year":"2016","unstructured":"Xu, D., Wang, R.: Separable and error-free reversible data hiding in encrypted images. Signal Process. 123, 9\u201321 (2016)","journal-title":"Signal Process."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00012-7_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T14:44:07Z","timestamp":1536763447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00012-7_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000110","9783030000127"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00012-7_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}