{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:18Z","timestamp":1725888438850},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_14","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:44Z","timestamp":1495852004000},"page":"138-149","source":"Crossref","is-referenced-by-count":4,"title":["Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion"],"prefix":"10.1007","author":[{"given":"Fuqiang","family":"Di","sequence":"first","affiliation":[]},{"given":"Junyi","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yingnan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Shi, Y., Li, X., Zhang, X., et al.: Reversible data hiding: advances in the past two decades. IEEE Access (2016). doi:\n10.1109\/ACCESS.2016.2573308","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Wang, J., Ni, J., Zhang, X., et al.: Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybern. (2016). doi:\n10.1109\/TCYB.2015.2514110","DOI":"10.1109\/TCYB.2015.2514110"},{"issue":"9","key":"14_CR3","doi-asserted-by":"crossref","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma, B., Shi, Y.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Secur. Forensics 11(9), 1914\u20131927 (2016)","journal-title":"IEEE Trans. Inf. Secur. Forensics"},{"issue":"4","key":"14_CR4","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","volume":"26","author":"Z Qian","year":"2016","unstructured":"Qian, Z., Zhang, X.: Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4), 636\u2013646 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Zhang, W., Wang, H., Hou, D., et al.: Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans. Multimedia. doi:\n10.1109\/TMM.2016.2569497","DOI":"10.1109\/TMM.2016.2569497"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Wu, H., Shi, Y., Wang, H., et al.: Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Trans. Circuits Syst. Video Technol. (2016). doi:\n10.1109\/TCSVT.2016.2556585","DOI":"10.1109\/TCSVT.2016.2556585"},{"issue":"8","key":"14_CR7","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"14_CR8","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"L Dragoi","year":"2014","unstructured":"Dragoi, L., Coltuc, D.: Local-prediction-based difference expansion reversible watermaking. IEEE Trans. Image Process. 23(4), 1779\u20131790 (2014)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"14_CR9","first-page":"17","volume":"2","author":"A Jarali","year":"2013","unstructured":"Jarali, A., Rao, J.: Unique LSB compression data hiding method. Int. J. Emerg. Sci. Eng. 2(3), 17\u201321 (2013)","journal-title":"Int. J. Emerg. Sci. Eng."},{"issue":"4","key":"14_CR10","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"14_CR11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T., Wu, H.: An improved Reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"14_CR12","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W., Zhao, X., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Secur. Forensics 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Secur. Forensics"},{"issue":"3","key":"14_CR13","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/TCSVT.2015.2416591","volume":"26","author":"J Zhou","year":"2016","unstructured":"Zhou, J., Sun, W., Dong, L., et al.: Secure reversible image data hiding over encrypted domain via key modulation. IEEE Trans. Circuits Syst. Video Technol. 26(3), 441\u2013452 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"14_CR14","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","volume":"46","author":"X Cao","year":"2016","unstructured":"Cao, X., Du, L., Wei, X., et al.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132\u20131143 (2016)","journal-title":"IEEE Trans. Cybern."},{"key":"14_CR15","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.sigpro.2015.12.012","volume":"123","author":"D Xu","year":"2016","unstructured":"Xu, D., Wang, R.: Separable and error-free reversible data hiding in encrypted imaged. Signal Process. 123, 9\u201321 (2016)","journal-title":"Signal Process."},{"key":"14_CR16","first-page":"52","volume":"44","author":"T Nyuyen","year":"2016","unstructured":"Nyuyen, T., Chang, C., Chang, W.: High capacity reversible data hiding scheme for encrypted images. Signal Process. Image Commun. 44, 52\u201364 (2016)","journal-title":"Signal Process. Image Commun."},{"issue":"1","key":"14_CR17","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Signal Process. 94(1), 118\u2013127 (2014)","journal-title":"Signal Process."},{"key":"14_CR18","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"Y Chen","year":"2014","unstructured":"Chen, Y., Shiu, C., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25, 1164\u20131170 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. (2015). doi:\n10.1109\/TCSVT.2015.2433194","DOI":"10.1109\/TCSVT.2015.2433194"},{"key":"14_CR20","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.image.2015.10.001","volume":"39","author":"M Li","year":"2015","unstructured":"Li, M., Xiao, D., Zhang, Y., Nan, H.: Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process. Image Commun. 39, 234\u2013248 (2015)","journal-title":"Signal Process. Image Commun."},{"key":"14_CR21","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.image.2015.09.014","volume":"39","author":"C Shiu","year":"2015","unstructured":"Shiu, C., Chen, Y., Hong, W.: Encrypted image-based reversible data hiding with public key cryptosystem from difference expansion. Signal Process. Image Commun. 39, 226\u2013233 (2015)","journal-title":"Signal Process. Image Commun."},{"issue":"3","key":"14_CR22","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D.M., Rodriguez, J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"14_CR23","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TIP.2015.2395724","volume":"24","author":"I Dragoi","year":"2015","unstructured":"Dragoi, I., Coltuc, D.: On local prediction based reversible watermarking. IEEE Trans. Image Process. 24(4), 1244\u20131246 (2015)","journal-title":"IEEE Trans. Image Process."},{"key":"14_CR24","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1186\/s13634-015-0232-z","volume":"2015","author":"S Xiang","year":"2015","unstructured":"Xiang, S., Wang, Y.: Non-inter expansion embedding techniques for reversible image watermarking. EURASIP J. Adv. Signal Process. 2015, 56\u201368 (2015)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"2","key":"14_CR25","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/MSP.2012.2230219","volume":"30","author":"C Aguilar","year":"2013","unstructured":"Aguilar, C., Fau, S., Fontaine, C., Gogniat, G.: Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Signal Process. Mag. 30(2), 108\u2013117 (2013)","journal-title":"IEEE Signal Process. Mag."},{"issue":"3","key":"14_CR26","doi-asserted-by":"crossref","first-page":"698","DOI":"10.1109\/TC.2013.154","volume":"64","author":"W Wang","year":"2015","unstructured":"Wang, W., Hu, Y., Chen, L., Huang, X., Sunar, B.: Exploring the feasibility of fully homomorphic encryption. IEEE Trans. Comput. 64(3), 698\u2013706 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"1","key":"14_CR28","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Secur. Forensics 5(1), 187\u2013193 (2010)","journal-title":"IEEE Trans. Inf. Secur. Forensics"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:32:22Z","timestamp":1495852342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_14","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}