{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:48:20Z","timestamp":1767340100347,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031251146"},{"type":"electronic","value":"9783031251153"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25115-3_13","type":"book-chapter","created":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T13:57:23Z","timestamp":1674914243000},"page":"190-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Reversible Data Hiding via\u00a0Arranging Blocks of\u00a0Bit-Planes in\u00a0Encrypted Images"],"prefix":"10.1007","author":[{"given":"Yingying","family":"Sun","sequence":"first","affiliation":[]},{"given":"Guoxiong","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Guijin","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Chunqiang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zhenjun","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,29]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"76956","DOI":"10.1109\/ACCESS.2018.2882563","volume":"6","author":"C Yu","year":"2018","unstructured":"Yu, C., Zhang, X.Q., Tang, Z., Xie, X.: Separable and error-free reversible data hiding in encrypted image based on two-layer pixel errors. IEEE Access 6, 76956\u201376969 (2018)","journal-title":"IEEE Access"},{"issue":"9","key":"13_CR2","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1109\/TIFS.2019.2899520","volume":"14","author":"F Peng","year":"2019","unstructured":"Peng, F., Lin, Z.X., Zhang, X., Long, M.: Reversible data hiding in encrypted 2d vector graphics based on reversible mapping model for real numbers. IEEE Trans. Inf. Forensics Secur. 14(9), 2400\u20132411 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.sigpro.2016.12.029","volume":"135","author":"H Yao","year":"2017","unstructured":"Yao, H., Qin, C., Tang, Z., Tian, Y.: Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels\u2019 coordinates with minimum distortion. Signal Process. 135, 26\u201335 (2017)","journal-title":"Signal Process."},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/j.ijleo.2017.11.154","volume":"157","author":"Z Tang","year":"2018","unstructured":"Tang, Z., Lu, Q., Lao, H., Yu, C., Zhang, X.Q.: Error-free reversible data hiding with high capacity in encrypted image. Optik 157, 750\u2013760 (2018)","journal-title":"Optik"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-030-43575-2_17","volume-title":"Digital Forensics and Watermarking","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Cai, X., Xiao, X., Ye, J., Shi, W.: A novel reversible data hiding with skin tone smoothing effect for face images. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) IWDW 2019. LNCS, vol. 12022, pp. 204\u2013212. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43575-2_17"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-030-11389-6_17","volume-title":"Digital Forensics and Watermarking","author":"F Chen","year":"2019","unstructured":"Chen, F., Yuan, Y., Chen, Y., He, H., Qu, L.: Reversible data hiding scheme in encrypted-image based on prediction and compression coding. In: Yoo, C.D., Shi, Y.-Q., Kim, H.J., Piva, A., Kim, G. (eds.) IWDW 2018. LNCS, vol. 11378, pp. 216\u2013229. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11389-6_17"},{"issue":"3","key":"13_CR7","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Signal Process. 94, 118\u2013127 (2014)","journal-title":"Signal Process."},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"108200","DOI":"10.1016\/j.sigpro.2021.108200","volume":"188","author":"X Wu","year":"2021","unstructured":"Wu, X., Qiao, T., Xu, M., Zheng, N.: Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling. Signal Process. 188, 108200 (2021)","journal-title":"Signal Process."},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.sigpro.2019.07.020","volume":"165","author":"H Ren","year":"2019","unstructured":"Ren, H., Lu, W., Chen, B.: Reversible data hiding in encrypted binary images by pixel prediction. Signal Process. 165, 268\u2013277 (2019)","journal-title":"Signal Process."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"108146","DOI":"10.1016\/j.sigpro.2021.108146","volume":"187","author":"Z Yin","year":"2021","unstructured":"Yin, Z., She, X., Tang, J., Luo, B.: Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement. Signal Process. 187, 108146 (2021)","journal-title":"Signal Process."},{"issue":"4","key":"13_CR12","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"XP Zhang","year":"2011","unstructured":"Zhang, X.P.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"8","key":"13_CR13","doi-asserted-by":"publisher","first-page":"9691","DOI":"10.1007\/s11042-018-6567-3","volume":"78","author":"Z Tang","year":"2018","unstructured":"Tang, Z., Xu, S., Yao, H., Qin, C., Zhang, X.: Reversible data hiding with differential compression in encrypted image. Multimedia Tools Appl. 78(8), 9691\u20139715 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6567-3","journal-title":"Multimedia Tools Appl."},{"issue":"11","key":"13_CR14","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1049\/ipr2.12252","volume":"15","author":"Z Tang","year":"2021","unstructured":"Tang, Z., Pang, M., Yu, C., Fan, G., Zhang, X.Q.: Reversible data hiding for encrypted image based on adaptive prediction error coding. IET Image Proc. 15(11), 2643\u20132655 (2021)","journal-title":"IET Image Proc."},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.ins.2021.10.050","volume":"584","author":"C Yu","year":"2022","unstructured":"Yu, C., Zhang, X.Q., Li, G., Zhan, S., Tang, Z.: Reversible data hiding with adaptive difference recovery for encrypted images. Inf. Sci. 584, 89\u2013110 (2022)","journal-title":"Inf. Sci."},{"doi-asserted-by":"crossref","unstructured":"Gao, G., Tong, S., Xia, Z., Shi, Y.: A universal reversible data hiding method in encrypted image based on MSB prediction and error embedding. IEEE Trans. Cloud Comput. (2022)","key":"13_CR16","DOI":"10.1109\/TCC.2022.3155744"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: Break our steganographic system: the ins and outs of organizing boss. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24178-9_5"},{"unstructured":"Bas, P., Furon, T.: Image database of bows-2. Accessed 20 June 2017","key":"13_CR18"},{"unstructured":"Schaefer, G., Stich, M.: Ucid: an uncompressed color image database. In: Storage and Retrieval Methods and Applications for Multimedia 2004, vol. 5307, pp. 472\u2013480. International Society for Optics and Photonics (2003)","key":"13_CR19"},{"issue":"6","key":"13_CR20","doi-asserted-by":"publisher","first-page":"8257","DOI":"10.1007\/s11042-016-3476-1","volume":"76","author":"Z Tang","year":"2016","unstructured":"Tang, Z., Wang, F., Zhang, X.: Image encryption based on random projection partition and chaotic system. Multimedia Tools Appl. 76(6), 8257\u20138283 (2016). https:\/\/doi.org\/10.1007\/s11042-016-3476-1","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"13_CR21","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1007\/s11554-018-0838-0","volume":"16","author":"Z Tang","year":"2018","unstructured":"Tang, Z., Xu, S., Ye, D., Wang, J., Zhang, X., Yu, C.: Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J. Real-Time Image Process. 16(3), 709\u2013724 (2018). https:\/\/doi.org\/10.1007\/s11554-018-0838-0","journal-title":"J. Real-Time Image Process."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25115-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T13:59:32Z","timestamp":1674914372000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25115-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031251146","9783031251153"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25115-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guilin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw.site\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.23","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.43","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}