{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:37:10Z","timestamp":1743028630840,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_3","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"24-34","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Method for Reversible Data Hiding in Encrypted Image"],"prefix":"10.1007","author":[{"given":"Yuling","family":"Liu","sequence":"first","affiliation":[]},{"given":"Zuhong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images security. In: Forensics, Steganography, and Watermarking of Multimedia Contents X, Proceedings of the SPIE, vol. 6819(2008)","DOI":"10.1117\/12.766754"},{"issue":"4","key":"3_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"XP Zhang","year":"2011","unstructured":"Zhang, X.P.: Reversible data hiding in encrypted images. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"3_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-642-40099-5_32","volume-title":"Digital Forensics and Watermaking","author":"J Yu","year":"2013","unstructured":"Yu, J., Zhu, G., Li, X., Yang, J.: An improved algorithm for reversible data hiding in encrypted image. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 384\u2013394. Springer, Heidelberg (2013)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-38715-9_25","volume-title":"Advances in Swarm Intelligence","author":"W Hong","year":"2013","unstructured":"Hong, W., Chen, T.-S., Chen, J., Kao, Y.-H., Wu, H.-Y., Wu, M.-C.: Reversible data embedment for encrypted cartoon images using unbalanced bit flipping. In: Tan, Y., Shi, Y., Mo, H. (eds.) ICSI 2013, Part II. LNCS, vol. 7929, pp. 208\u2013214. Springer, Heidelberg (2013)"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"XP Zhang","year":"2012","unstructured":"Zhang, X.P.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-642-40099-5_30","volume-title":"Digital Forensics and Watermaking","author":"X Zhang","year":"2013","unstructured":"Zhang, X., Qin, C., Sun, G.: Reversible data hiding in encrypted images using pseudorandom sequence modulation. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 358\u2013367. Springer, Heidelberg (2013)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Kadam, P., Nawale, M.: Separable Reversible encrypted data hiding in encrypted image using AES algorithm and lossy technique. In: Proceeding of International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 312\u2013316(2013)","DOI":"10.1109\/ICPRIME.2013.6496492"},{"issue":"2","key":"3_CR9","first-page":"325","volume":"25","author":"XP Zhang","year":"2014","unstructured":"Zhang, X.P., Qian, Z.X., Feng, G.R., Ren, Y.L.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image R 25(2), 325\u2013328 (2014)","journal-title":"J. Vis. Commun. Image R"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao, X., Shu, C.W.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image R. 28, 21\u201327 (2015)","journal-title":"J. Vis. Commun. Image R."},{"issue":"3","key":"3_CR11","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W.M., Zhao, X.F., Yu, N.H., Li, F.H.: Reversible data hiding in encrypted images by reserving room before encryption. J. IEEE Trans. Inf. Forensics Security 8(3), 553\u2013562 (2013)","journal-title":"J. IEEE Trans. Inf. Forensics Security"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"WM Zhang","year":"2014","unstructured":"Zhang, W.M., Ma, K.D., Yu, N.H.: Reversibility improved data hiding in encrypted images. J. Sig. Process. 94, 118\u2013127 (2014)","journal-title":"J. Sig. Process."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:47:16Z","timestamp":1559303236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}