{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:09Z","timestamp":1740099189865,"version":"3.37.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_35","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"404-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible Embedding to Covers Full of Boundaries"],"prefix":"10.1007","author":[{"given":"Hanzhou","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Yanli","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hongxia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Songyang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"8","key":"35_CR1","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"8","key":"35_CR2","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1109\/TCSVT.2016.2556585","volume":"27","author":"H Wu","year":"2017","unstructured":"Wu, H., Shi, Y., Wang, H., Zhou, L.: Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Trans. Circ. Syst. Video Technol. 27(8), 1620\u20131631 (2017)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"3","key":"35_CR3","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"9","key":"35_CR4","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma, B., Shi, Y.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914\u20131927 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"35_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-319-19321-2_35","volume-title":"Digital-Forensics and Watermarking","author":"H Wu","year":"2015","unstructured":"Wu, H., Wang, H., Hu, Y., Zhou, L.: Efficient reversible data hiding based on prefix matching and directed LSB embedding. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 455\u2013469. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19321-2_35"},{"issue":"3","key":"35_CR6","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s11042-012-1047-7","volume":"67","author":"F Hsu","year":"2013","unstructured":"Hsu, F., Wu, M., Wang, S.: Reversible data hiding using side-match prediction on steganographic images. Multimedia Tools Appl. 67(3), 571\u2013591 (2013)","journal-title":"Multimedia Tools Appl."},{"issue":"12","key":"35_CR7","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"9","key":"35_CR8","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"X Li","year":"2015","unstructured":"Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histogram modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016\u20132027 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, H., Shi, Y.: Dynamic content selection-and-prediction framework applied to reversible data hiding. In: Proceedings of IEEE International Workshop Information Forensics, Security, pp. 1\u20136 (2016)","DOI":"10.1109\/WIFS.2016.7823903"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, H., Shi, Y.: PPE-based reversible data hiding. In: Proceedings of ACM International Workshop Information Hiding Multimedia Security, pp. 187\u2013188 (2016)","DOI":"10.1145\/2909827.2933196"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Wu, H., Wang, W., Dong, J., Chen, Y., Wang, H.: Ensemble reversible data hiding. arXiv:1801.04747 (2018)","DOI":"10.1109\/ICPR.2018.8545536"},{"key":"35_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: \u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_5"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:50:44Z","timestamp":1571874644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}