{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:18:01Z","timestamp":1743005881092,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_10","type":"book-chapter","created":{"date-parts":[[2016,10,30]],"date-time":"2016-10-30T23:53:29Z","timestamp":1477871609000},"page":"104-113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding"],"prefix":"10.1007","author":[{"given":"Ping","family":"Ji","sequence":"first","affiliation":[]},{"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Zhenjun","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"5","key":"10_CR1","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.patrec.2005.09.006","volume":"27","author":"C Chang","year":"2006","unstructured":"Chang, C., Hu, Y., Lu, T.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439\u2013446 (2006)","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"10_CR2","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340\u2013352 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2506573","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:\n                      10.1109\/TPDS.2015.2506573","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98-B","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190\u2013200 (2015)","journal-title":"IEICE Trans. Commun."},{"issue":"8","key":"10_CR5","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283\u20131291 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"10_CR6","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947\u20131962 (2016)","journal-title":"Multimedia Tools Appl."},{"issue":"12","key":"10_CR7","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1016\/j.patcog.2005.02.007","volume":"38","author":"P Lin","year":"2005","unstructured":"Lin, P., Hsieh, C., Huang, P.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519\u20132529 (2005)","journal-title":"Pattern Recogn."},{"issue":"11","key":"10_CR8","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"T Lee","year":"2008","unstructured":"Lee, T., Lin, S.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497\u20133506 (2008)","journal-title":"Pattern Recogn."},{"issue":"2","key":"10_CR9","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TIP.2010.2066981","volume":"20","author":"X Zhang","year":"2011","unstructured":"Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485\u2013495 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"10_CR10","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1179\/174313108X281335","volume":"56","author":"C Tsou","year":"2008","unstructured":"Tsou, C., Hu, Y., Chang, C.: Efficient optimal pixel grouping schemes for AMBTC. Imaging Sci. J. 56(4), 217\u2013231 (2008)","journal-title":"Imaging Sci. J."},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.sigpro.2009.07.007","volume":"90","author":"C Yang","year":"2010","unstructured":"Yang, C., Shen, J.: Recover the tampered image based on VQ indexing. Sig. Process. 90, 331\u2013343 (2010)","journal-title":"Sig. Process."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:08:16Z","timestamp":1558476496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}