{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:27:10Z","timestamp":1725888430759},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_2","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T22:26:44Z","timestamp":1495837604000},"page":"13-21","source":"Crossref","is-referenced-by-count":0,"title":["Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem"],"prefix":"10.1007","author":[{"given":"Liu","family":"Yiqun","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJTHI.2016040101","volume":"12","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Wang, X., Zhang, J., Zhang, M., Luo, P., Wang, X.A.: An improved security 3D watermarking method using computational integral imaging cryptosystem. Int. J. Technol. Hum. Interact. (IJTHI) 12, 1\u201312 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"key":"2_CR2","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1504\/IJSSC.2015.070952","volume":"5","author":"R Pereira","year":"2015","unstructured":"Pereira, R., Pereira, E.G.: Future internet: trends and challenges. Int. J. Space-Based Situated Comput. (IJSSC) 5, 159\u2013167 (2015)","journal-title":"Int. J. Space-Based Situated Comput. (IJSSC)"},{"key":"2_CR3","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1504\/IJSSC.2014.066031","volume":"4","author":"R Akase","year":"2014","unstructured":"Akase, R., Okada, Y.: WebGL-based 3D furniture layout system using interactive evolutionary computation and its user evaluations. Int. J. Space-Based Situated Comput. (IJSSC) 4, 143\u2013164 (2014)","journal-title":"Int. J. Space-Based Situated Comput. (IJSSC)"},{"key":"2_CR4","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1504\/IJSSC.2013.056405","volume":"3","author":"P Moore","year":"2013","unstructured":"Moore, P., Thomas, A., Tadros, G., et al.: Detection of the onset of agitation in patients with dementia: real-time monitoring and the application of big-data solutions. Int. J. Space-Based Situated Comput. (IJSSC) 3, 136\u2013154 (2013)","journal-title":"Int. J. Space-Based Situated Comput. (IJSSC)"},{"key":"2_CR5","unstructured":"Barton, J.M.: Method and apparatus for embedding authentication information within digital data. In: US Patent. US: 1997"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Shi, Y.-Q., Li, X., Zhang, X., et al.: Reversible data hiding: advances in the past two decades. IEEE Access 3210\u20133237 (2016)","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"2_CR7","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18, 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1109\/TCSVT.2007.896635","volume":"17","author":"S Lian","year":"2007","unstructured":"Lian, S., Liu, Z., Ren, Z., Wang, H.: Commutative encryption and watermarking in video compression. IEEE Trans. Circuits Syst. Video Technol. 17, 774\u2013778 (2007)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.image.2010.11.001","volume":"26","author":"M Cancellaro","year":"2011","unstructured":"Cancellaro, M., Battisti, F., Carli, M., et al.: A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process. Image Commun. 26, 1\u201312 (2011)","journal-title":"Signal Process. Image Commun."},{"key":"2_CR10","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10, 643\u2013649 (2001)","journal-title":"IEEE Trans. Image Process."},{"key":"2_CR11","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1109\/TIP.2005.859383","volume":"14","author":"M Kuribayashi","year":"2005","unstructured":"Kuribayashi, M., Tanaka, H.: Fingerprinting protocol for images based on additive homomorphic property. IEEE Trans. Image Process. 14, 2129\u20132139 (2005)","journal-title":"IEEE Trans. Image Process."},{"key":"2_CR12","first-page":"1721","volume":"34","author":"C Jiayong","year":"2012","unstructured":"Jiayong, C., et al.: A secure image steganographic method in encrypted domain. J. Electron. Inf. Technol. 34, 1721\u20131726 (2012)","journal-title":"J. Electron. Inf. Technol."},{"key":"2_CR13","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/TCSVT.2015.2433194","volume":"26","author":"X Zhang","year":"2015","unstructured":"Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circuits Syst. Video Technol. 26, 1622\u20131631 (2015). 1","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2_CR14","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W., Zhao, X., et al.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8, 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR15","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1364\/JOSAA.33.001160","volume":"33","author":"A Markman","year":"2016","unstructured":"Markman, A., Carnicer, A., Javidi, B.: Security authentication with a three-dimensional optical phase code using random forest classifier. J. Opt. Soc. Am. A 33, 1160\u20131165 (2016)","journal-title":"J. Opt. Soc. Am. A"},{"key":"2_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1088\/2040-8978\/18\/8\/083001","volume":"18","author":"B Javidi","year":"2016","unstructured":"Javidi, B., Carnicer, A., Yamaguchi, M., et al.: Roadmap on optical security. J. Opt. 18, 1\u201339 (2016)","journal-title":"J. Opt."},{"key":"2_CR17","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1504\/IJGUC.2016.073773","volume":"7","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Du, J., Cheng, X., Lin, Z.L.K.: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7, 22\u201328 (2016)","journal-title":"Int. J. Grid Util. Comput."},{"key":"2_CR18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4018\/IJITWE.2016040103","volume":"11","author":"AR Honarvar","year":"2016","unstructured":"Honarvar, A.R., Sami, A.: Extracting usage patterns from power usage data of homes\u2019 appliances in smart home using big data platform. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 39\u201350 (2016)","journal-title":"Int. J. Inf. Technol. Web Eng. (IJITWE)"},{"key":"2_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJITWE.2016070101","volume":"11","author":"A Alamareen","year":"2016","unstructured":"Alamareen, A., Al-Jarrah, O., Aljarrah, I.A.: Image mosaicing using binary edge detection algorithm in a cloud-computing environment. Int. J. Inf. Technol. Web Eng. (IJITWE) 11, 1\u201314 (2016)","journal-title":"Int. J. Inf. Technol. Web Eng. (IJITWE)"},{"key":"2_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJTHI.2015100101","volume":"11","author":"L Mola","year":"2015","unstructured":"Mola, L., Rossignoli, C., Carugati, A., Giangreco, A.: Business Intelligence System Design and its Consequences for Knowledge Sharing, Collaboration, and Decision-Making: An Exploratory Study. Int. J. Technol. Hum. Interact. (IJTHI) 11, 1\u201325 (2015)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"key":"2_CR21","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1504\/IJGUC.2015.070675","volume":"6","author":"B Balusamy","year":"2015","unstructured":"Balusamy, B., Krishna, P.V.: Collective advancements on access control scheme for multi-authority cloud storage system. Int. J. Grid Util. Comput. 6, 133\u2013142 (2015). Special Issue on Intelligent Grid and Cloud Computing","journal-title":"Int. J. Grid Util. Comput."},{"key":"2_CR22","doi-asserted-by":"crossref","first-page":"2216","DOI":"10.1016\/j.chaos.2008.08.032","volume":"41","author":"F Sun","year":"2009","unstructured":"Sun, F., Liu, S.: Cryptographic pseudo-random sequence from the spatial chaotic map. Chaos, Solitons Fractals 41, 2216\u20132219 (2009)","journal-title":"Chaos, Solitons Fractals"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T22:27:12Z","timestamp":1495837632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_2","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}