{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:55:07Z","timestamp":1726041307169},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030290344"},{"type":"electronic","value":"9783030290351"}],"license":[{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-29035-1_26","type":"book-chapter","created":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T11:02:58Z","timestamp":1565780578000},"page":"269-277","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible Data Hiding Algorithm in Homomorphic Encrypted Domain Based on EC-EG"],"prefix":"10.1007","author":[{"given":"Neng","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Han","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mengmeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,15]]},"reference":[{"issue":"4","key":"26_CR1","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"XP Zhang","year":"2011","unstructured":"Zhang, X.P.: Reversible data hiding in encrypted image. IEEE Sig. Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Sig. Process. Lett."},{"issue":"2","key":"26_CR2","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"XP Zhang","year":"2012","unstructured":"Zhang, X.P.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"26_CR3","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"KD Ma","year":"2013","unstructured":"Ma, K.D., Zhang, W.M., Zhao, X.F., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"Weiming Zhang","year":"2014","unstructured":"Zhang, W.M., Ma, K.D., Yu, N.H.: Reversibility improved data hiding in encrypted images. Sig. Process. 94, 118\u2013127 (2014)","journal-title":"Signal Processing"},{"issue":"5","key":"26_CR5","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"YC Chen","year":"2014","unstructured":"Chen, Y.C., Shui, C.W., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Representation 25(5), 1164\u20131170 (2014)","journal-title":"J. Vis. Commun. Image Representation"},{"key":"26_CR6","first-page":"226","volume":"39","author":"CW Shiu","year":"2015","unstructured":"Shiu, C.W., Chen, Y.C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Sig. Process.: Image Commun. 39, 226\u2013233 (2015)","journal-title":"Sig. Process.: Image Commun."},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jvcir.2016.09.005","volume":"41","author":"XT Wu","year":"2016","unstructured":"Wu, X.T., Chen, B., Weng, J.: Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. J. Vis. Commun. Image Representation 41, 58\u201364 (2016)","journal-title":"J. Vis. Commun. Image Representation"},{"issue":"9","key":"26_CR8","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TCSVT.2015.2433194","volume":"26","author":"XP Zhang","year":"2016","unstructured":"Zhang, X.P., Long, J., Wang, Z.C., et al.: Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circ. Syst. Video Technol. 26(9), 1622\u20131631 (2016)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"11","key":"26_CR9","doi-asserted-by":"publisher","first-page":"3099","DOI":"10.1109\/TCSVT.2017.2742023","volume":"28","author":"SJ Xiang","year":"2018","unstructured":"Xiang, S.J., Luo, X.R.: Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans. Circ. Syst. Video Technol. 28(11), 3099\u20133110 (2018)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"7","key":"26_CR10","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., et al.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circ. Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"8","key":"26_CR11","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"26_CR12","doi-asserted-by":"publisher","first-page":"60635","DOI":"10.1109\/ACCESS.2018.2876036","volume":"6","author":"ZX Li","year":"2018","unstructured":"Li, Z.X., Dong, D.P., Xia, Z.H., et al.: High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption. IEEE Access 6, 60635\u201360644 (2018)","journal-title":"IEEE Access"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Intelligent Networking and Collaborative Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29035-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T11:10:26Z","timestamp":1565781026000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29035-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,15]]},"ISBN":["9783030290344","9783030290351"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29035-1_26","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,8,15]]},"assertion":[{"value":"15 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INCoS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Networking and Collaborative Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oita","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/incos\/2019\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}