{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:39:18Z","timestamp":1743111558268,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030146566"},{"type":"electronic","value":"9783030146573"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-14657-3_47","type":"book-chapter","created":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T06:40:50Z","timestamp":1551854450000},"page":"461-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Lossless Data Hiding Using Chaotic Sequence and Statistical Quantity Histogram"],"prefix":"10.1007","author":[{"given":"Xiaobo","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,7]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Dragoi, I.C., Coltuc, D.: Reversible data hiding in encrypted images based on reserving room after encryption and multiple predictors. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Calgary, AB, Canada, pp. 2102\u20132105 (2018)","DOI":"10.1109\/ICASSP.2018.8461362"},{"key":"47_CR2","doi-asserted-by":"crossref","unstructured":"Lee, C.-F., Shen, J.J., Lai, Y.H.: Data hiding using multi-pixel difference expansion. In: 2018 3rd International Conference on Computer and Communication Systems, ICCCS, Nagoya, Japan, pp. 56\u201360 (2018)","DOI":"10.1109\/CCOMS.2018.8463244"},{"key":"47_CR3","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1049\/iet-ipr.2017.0151","volume":"11","author":"W Wang","year":"2017","unstructured":"Wang, W., Ye, J., Wang, T., Wang, W.: Reversible data hiding scheme based on significant-bit-difference expansion. IET Image Process. 11, 1002\u20131014 (2017)","journal-title":"IET Image Process."},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"Yi, S., Zhou, Y.: Adaptive code embedding for reversible data hiding in encrypted images. In: 2017 IEEE International Conference on Image Processing, ICIP, Beijing, China, pp. 4322\u20134326 (2017)","DOI":"10.1109\/ICIP.2017.8297098"},{"key":"47_CR5","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi, Y.-Q., Li, X., Zhang, X., Wu, H.-T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Singh, A., Dutta, M.K.: Lossless and robust digital watermarking scheme for retinal images. In: 2018 4th International Conference on Computational Intelligence & Communication Technology, CICT, Ghaziabad, India, pp. 1\u20135 (2018)","DOI":"10.1109\/CIACT.2018.8480151"},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Choi, K.-C., Pun, C.-M.: Difference expansion based robust reversible watermarking with region filtering. In: 2016 13th International Conference on Computer Graphics, Imaging and Visualization, CGiV, Beni Mellal, Morocco, pp. 278\u2013282 (2016)","DOI":"10.1109\/CGiV.2016.61"},{"key":"47_CR8","doi-asserted-by":"publisher","first-page":"1656","DOI":"10.1016\/j.patcog.2009.09.016","volume":"43","author":"X-T Zeng","year":"2010","unstructured":"Zeng, X.-T., Ping, L.-D., Pan, X.-Z.: A lossless robust data hiding scheme. Pattern Recogn. 43, 1656\u20131667 (2010)","journal-title":"Pattern Recogn."},{"issue":"2","key":"47_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1631\/jzus.C0910177","volume":"11","author":"X-T Zeng","year":"2010","unstructured":"Zeng, X.-T., Pan, X.-Z., Ping, L.-D., et al.: Robust lossless data hiding scheme. J. Zhejiang Univ.-SCIENCE C (Comput. Electron.) 11(2), 101\u2013110 (2010)","journal-title":"J. Zhejiang Univ.-SCIENCE C (Comput. Electron.)"},{"key":"47_CR10","series-title":"LNEE","doi-asserted-by":"publisher","first-page":"937","DOI":"10.1007\/978-3-642-21697-8_120","volume-title":"Electronics and Signal Processing","author":"QT Yang","year":"2011","unstructured":"Yang, Q.T., Gao, T.G., Fan, L.: Lossless robust data hiding scheme based on histogram shifting. In: Hu, W. (ed.) Electronics and Signal Processing. LNEE, vol. 97, pp. 937\u2013944. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-21697-8_120"},{"key":"47_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2011.06.012","volume":"77","author":"L An","year":"2012","unstructured":"An, L., Gao, X., Yuan, Y.: Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing 77, 1\u201311 (2012)","journal-title":"Neurocomputing"},{"key":"47_CR12","unstructured":"CVG-UGR Image Database. \n                    http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/index.php"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","IoT as a Service"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14657-3_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T01:31:32Z","timestamp":1558402292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14657-3_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030146566","9783030146573"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14657-3_47","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"7 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IoTaaS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Internet of Things as a Service","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iotaas2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"confy.eai.eu","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"83","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}