{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:32:23Z","timestamp":1743010343890,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030037444"},{"type":"electronic","value":"9783030037451"}],"license":[{"start":{"date-parts":[[2018,11,11]],"date-time":"2018-11-11T00:00:00Z","timestamp":1541894400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-03745-1_41","type":"book-chapter","created":{"date-parts":[[2018,11,10]],"date-time":"2018-11-10T10:22:07Z","timestamp":1541845327000},"page":"330-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Reversible Watermarking for Data Exfiltration Prevention Through Lexicographic Permutations"],"prefix":"10.1007","author":[{"given":"Ching-Chun","family":"Chang","sequence":"first","affiliation":[]},{"given":"Chang-Tsun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,11]]},"reference":[{"issue":"5","key":"41_CR1","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","volume":"46","author":"X Cao","year":"2016","unstructured":"Cao, X., Du, L., Wei, X., Meng, D., Guo, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132\u20131143 (2016)","journal-title":"IEEE Trans. Cybern."},{"issue":"5","key":"41_CR2","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"YC Chen","year":"2014","unstructured":"Chen, Y.C., Shiu, C.W., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5), 1164\u20131170 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Dragoi, I.C., Coanda, H.G., Coltuc, D.: Improved reversible data hiding in encrypted images based on reserving room after encryption and pixel prediction. In: Proceedings European Signal Processing Conference (EUSIPCO), Kos, Greece, pp. 2186\u20132190, August 2017","DOI":"10.23919\/EUSIPCO.2017.8081597"},{"issue":"4","key":"41_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"issue":"12","key":"41_CR5","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","volume":"11","author":"F Huang","year":"2016","unstructured":"Huang, F., Huang, J., Shi, Y.Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11(12), 2777\u20132789 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"41_CR6","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.sigpro.2016.07.002","volume":"130","author":"M Li","year":"2017","unstructured":"Li, M., Li, Y.: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process. 130, 190\u2013196 (2017)","journal-title":"Signal Process."},{"key":"41_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21\u201327 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images. In: Proceedings SPIE, vol.\u00a06819, San Jose, CA, USA, pp. 68191E\u20131\u201368191E\u20139, February 2008","DOI":"10.1117\/12.766754"},{"issue":"4","key":"41_CR9","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","volume":"26","author":"Z Qian","year":"2016","unstructured":"Qian, Z., Zhang, X.: Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636\u2013646 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"41_CR10","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16(5), 1486\u20131491 (2014)","journal-title":"IEEE Trans. Multimedia"},{"key":"41_CR11","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et\u00a0al. (eds.) Foundations of Secure Computation, pp. 169\u2013180. Academic Press (1978)"},{"key":"41_CR12","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/j.jvcir.2016.08.021","volume":"40, pt. B","author":"HT Wu","year":"2016","unstructured":"Wu, H.T., Cheung, Y.M., Huang, J.: Reversible data hiding in Paillier cryptosystem. J. Visual Commun. Image Represent. 40, pt. B, 765\u2013771 (2016)","journal-title":"J. Visual Commun. Image Represent."},{"key":"41_CR13","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jvcir.2016.09.005","volume":"41","author":"X Wu","year":"2016","unstructured":"Wu, X., Chen, B., Weng, J.: Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. J. Vis. Commun. Image Represent. 41, 58\u201364 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"4","key":"41_CR14","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"41_CR15","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"41_CR16","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TCSVT.2015.2433194","volume":"26","author":"X Zhang","year":"2016","unstructured":"Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9), 1622\u20131631 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"41_CR17","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.jvcir.2013.11.001","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Qian, Z., Feng, G., Ren, Y.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2), 322\u2013328 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"41_CR18","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/TCSVT.2015.2416591","volume":"26","author":"J Zhou","year":"2016","unstructured":"Zhou, J., Sun, W., Dong, L., Liu, X., Au, O.C., Tang, Y.Y.: Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans. Circuits Syst. Video Technol. 26(3), 441\u2013452 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."}],"container-title":["Smart Innovation, Systems and Technologies","Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03745-1_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T07:07:42Z","timestamp":1572592062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03745-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,11]]},"ISBN":["9783030037444","9783030037451"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03745-1_41","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2018,11,11]]},"assertion":[{"value":"IIH-MSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Information Hiding and Multimedia Signal Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sendai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iih2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iihmsp2018.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}