{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:27:14Z","timestamp":1725852434164},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_30","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T08:15:28Z","timestamp":1459325728000},"page":"365-377","source":"Crossref","is-referenced-by-count":4,"title":["Completely Separable Reversible Data Hiding in Encrypted Images"],"prefix":"10.1007","author":[{"given":"Dawen","family":"Xu","sequence":"first","affiliation":[]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shubing","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"3","key":"30_CR1","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TMM.2011.2181342","volume":"14","author":"AV Subramanyam","year":"2012","unstructured":"Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.S.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimedia 14(3), 703\u2013716 (2012)","journal-title":"IEEE Trans. Multimedia"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-36373-3_16","volume-title":"Information Hiding","author":"P Zheng","year":"2013","unstructured":"Zheng, P., Huang, J.: Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 240\u2013254. Springer, Heidelberg (2013)"},{"issue":"4","key":"30_CR3","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TIFS.2014.2302899","volume":"9","author":"DW Xu","year":"2014","unstructured":"Xu, D.W., Wang, R.D., Shi, Y.Q.: Data hiding in encrypted H.264\/AVC video streams by codeword substitution. IEEE Trans. Inf. Forensics Secur. 9(4), 596\u2013606 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"30_CR4","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.jvcir.2013.12.008","volume":"25","author":"DW Xu","year":"2014","unstructured":"Xu, D.W., Wang, R.D., Shi, Y.Q.: An improved reversible data hiding-based approach for intra-frame error concealment in H.264\/AVC. J. Vis. Commun. Image Represent. 25(2), 410\u2013422 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"2","key":"30_CR5","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1155\/S1110865702000537","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless data embedding \u2013 new paradigm in digital watermarking. EURASIP J. Appl. Signal Process. 2002(2), 185\u2013196 (2002)","journal-title":"EURASIP J. Appl. Signal Process."},{"issue":"3","key":"30_CR6","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"ZC Ni","year":"2006","unstructured":"Ni, Z.C., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"8","key":"30_CR7","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"Khan, A., Siddiqa, A., Mubib, S., Malik, S.A.: A recent survey of reversible watermarking techniques. Inf. Sci. 279, 251\u2013272 (2014)","journal-title":"Inf. Sci."},{"issue":"5","key":"30_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JEI.23.5.053022","volume":"23","author":"DW Xu","year":"2014","unstructured":"Xu, D.W., Wang, R.D.: Efficient reversible data hiding in encrypted H.264\/AVC videos. J. Electron. Imaging 23(5), 1\u201314 (2014)","journal-title":"J. Electron. Imaging"},{"issue":"4","key":"30_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"XP Zhang","year":"2011","unstructured":"Zhang, X.P.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"30_CR11","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao, X., Shu, C.W.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21\u201327 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","volume":"104","author":"XT Wu","year":"2014","unstructured":"Wu, X.T., Sun, W.: High-capacity reversible data hiding in encrypted images by prediction error. Signal Process. 104, 387\u2013400 (2014)","journal-title":"Signal Process."},{"issue":"5","key":"30_CR14","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"ZX Qian","year":"2014","unstructured":"Qian, Z.X., Zhang, X.P., Wang, S.Z.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimedia 16(5), 1486\u20131491 (2014)","journal-title":"IEEE Trans. Multimedia"},{"issue":"2","key":"30_CR15","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"XP Zhang","year":"2012","unstructured":"Zhang, X.P.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"30_CR16","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.jvcir.2013.11.001","volume":"25","author":"XP Zhang","year":"2014","unstructured":"Zhang, X.P., Qian, Z.X., Feng, G.R., Ren, Y.L.: Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2), 322\u2013328 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"30_CR17","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"KD Ma","year":"2013","unstructured":"Ma, K.D., Zhang, W.M., Zhao, X.F., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"WM Zhang","year":"2014","unstructured":"Zhang, W.M., Ma, K.D., Yu, N.H.: Reversibility improved data hiding in encrypted images. Signal Process. 94, 118\u2013127 (2014)","journal-title":"Signal Process."},{"key":"30_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-319-19321-2_17","volume-title":"Digital-Forensics and Watermarking","author":"D Xu","year":"2015","unstructured":"Xu, D., Wang, R.: Reversible data hiding in encrypted images using interpolation and histogram shifting. In: Shi, Y.-Q., Kim, H.J., P\u00e9rez-Gonz\u00e1lez, F., Yang, C.-N. (eds.) IWDW 2014. LNCS, vol. 9023, pp. 230\u2013242. Springer, Heidelberg (2015)"},{"issue":"5","key":"30_CR20","first-page":"1051","volume":"10","author":"JH Cheon","year":"2015","unstructured":"Cheon, J.H., Kim, J.: A hybrid scheme of public-key encryption and somewhat homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 10(5), 1051\u20131063 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T22:41:29Z","timestamp":1559428889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}