{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:18Z","timestamp":1725888438570},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_15","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:44Z","timestamp":1495852004000},"page":"150-159","source":"Crossref","is-referenced-by-count":1,"title":["Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement"],"prefix":"10.1007","author":[{"given":"Fuqiang","family":"Di","sequence":"first","affiliation":[]},{"given":"Junyi","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yingnan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"K Asifullah","year":"2014","unstructured":"Asifullah, K., Ayesha, S., Summuyya, M.: A recent survey of reversible watermarking techniques. Inf. Sci. 279, 251\u2013272 (2014)","journal-title":"Inf. Sci."},{"issue":"1","key":"15_CR2","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/TIP.2014.2358881","volume":"24","author":"W Zhang","year":"2015","unstructured":"Zhang, W., Hu, X., Yu, N.: Optimal transition probability of reversible data hiding for general distortion metrics and its applications. IEEE Trans. Image Process. 24(1), 294\u2013304 (2015)","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"15_CR3","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"15_CR4","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","volume":"26","author":"Z Qian","year":"2016","unstructured":"Qian, Z., Zhang, X.: Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans. Circ. Syst. Video Technol. 26(4), 636\u2013646 (2016)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"5","key":"15_CR5","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG Bitstream. IEEE Trans. Multimedia 16(5), 1486\u20131491 (2014)","journal-title":"IEEE Trans. Multimedia"},{"key":"15_CR6","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sig. Process. 94, 118\u2013127 (2014)","journal-title":"Sig. Process."},{"issue":"8","key":"15_CR7","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"4","key":"15_CR8","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"L Dragoi","year":"2014","unstructured":"Dragoi, L., Coltuc, D.: Local-prediction-based difference expansion reversible watermaking. IEEE Trans. Image Process. 23(4), 1779\u20131790 (2014)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"15_CR9","first-page":"17","volume":"2","author":"A Jarali","year":"2013","unstructured":"Jarali, A., Rao, J.: Unique LSB compression data hiding method. Int. J. Emerg. Sci. Eng. 2(3), 17\u201321 (2013)","journal-title":"Int. J. Emerg. Sci. Eng."},{"issue":"4","key":"15_CR10","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Sig. Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Sig. Process. Lett."},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Hong, W., Chen, T., Kao, Y.: Reversible data embedment for encrypted cartoon images using unbalanced bit flipping. In: Advances on Swarm Intelligence. LNCS, vol. 7929, pp. 208\u2013214 (2013)","DOI":"10.1007\/978-3-642-38715-9_25"},{"issue":"4","key":"15_CR12","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted cartoon images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"15_CR13","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang, X.: Separable reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TCSVT.2015.2433194","volume":"26","author":"X Zhang","year":"2016","unstructured":"Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circ. Syst. Video Technol. 26, 1622\u20131631 (2016). doi:\n10.1109\/TCSVT.2015.2433194","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"1","key":"15_CR15","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","volume":"22","author":"HT Wu","year":"2015","unstructured":"Wu, H.T., Dugelay, J., Shi, Y.Q.: Reversible image data hiding with contrast enhancement. IEEE Signal Process. Lett. 22(1), 81\u201385 (2015)","journal-title":"IEEE Signal Process. Lett."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceeding of the Advances Cryptology. LNCS, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:32:38Z","timestamp":1495852358000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_15","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}