{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:42:59Z","timestamp":1725914579687},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_4","type":"book-chapter","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T01:08:03Z","timestamp":1509325683000},"page":"39-48","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Robust Reversible Watermarking Scheme Based on IWT"],"prefix":"10.1007","author":[{"given":"Shuang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jinwei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/LSP.2010.2046930","volume":"17","author":"X Wang","year":"2010","unstructured":"Wang, X., Li, X., Yang, B., et al.: Efficient eneralized integer transform for reversible watermarking. IEEE Signal Process. Lett. 17(6), 567\u2013570 (2010)","journal-title":"IEEE Signal Process. Lett."},{"issue":"12","key":"4_CR2","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","volume":"20","author":"X Li","year":"2011","unstructured":"Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20(12), 3524\u20133533 (2011). A Publication of the IEEE Signal Processing","journal-title":"IEEE Trans. Image Process."},{"issue":"17","key":"4_CR3","doi-asserted-by":"crossref","first-page":"4573","DOI":"10.1002\/cpe.3423","volume":"27","author":"L Xiong","year":"2015","unstructured":"Xiong, L., Xu, Z., Xu, Y.: A secure re-encryption scheme for data services in a cloud computing environment. Concurrency Comput. Pract. Experience 27(17), 4573\u20134585 (2015)","journal-title":"Concurrency Comput. Pract. Experience"},{"issue":"10","key":"4_CR4","doi-asserted-by":"crossref","first-page":"2620","DOI":"10.1016\/j.jss.2013.04.086","volume":"86","author":"X Chen","year":"2013","unstructured":"Chen, X., Sun, X., Sunr, H.: Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J. Syst. Softw. 86(10), 2620\u20132626 (2013)","journal-title":"J. Syst. Softw."},{"issue":"7","key":"4_CR5","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Wang, W., Gui, X., et al.: A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification. IEEE Trans. Inf. Forensics Secur. 8(7), 1091\u20131100 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"4_CR6","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X., Zhao, Y., et al.: Pairwise prediction-error expansion for efficient reversible data hiding. J. IEEE Trans. Image Proces. 22(12), 5010\u20135021 (2013). A Publication of the IEEE Signal Processing Society","journal-title":"J. IEEE Trans. Image Proces."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Xia, Z., Lv, R., Zhu, Y., et al.: Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process. pp. 1\u20138 (2016)","DOI":"10.1007\/s11760-016-0968-4"},{"issue":"10","key":"4_CR8","doi-asserted-by":"crossref","first-page":"2700","DOI":"10.1016\/j.jss.2013.05.077","volume":"86","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X., Zhao, Y., et al.: Reversible data hiding based on PDE predictor. J. Syst. Softw. 86(10), 2700\u20132709 (2013)","journal-title":"J. Syst. Softw."},{"issue":"5","key":"4_CR9","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.sigpro.2013.12.005","volume":"98","author":"X Gui","year":"2014","unstructured":"Gui, X., Li, X., Yang, B.: A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. J. Signal Process. 98(5), 370\u2013380 (2014)","journal-title":"J. Signal Process."},{"issue":"9","key":"4_CR10","doi-asserted-by":"crossref","first-page":"2748","DOI":"10.1016\/j.sigpro.2013.01.020","volume":"93","author":"J Li","year":"2013","unstructured":"Li, J., Li, X., Yang, B.: Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation. Signal Process. 93(9), 2748\u20132758 (2013). M. Elsevier North-Holland. Inc.","journal-title":"Signal Process."},{"issue":"1","key":"4_CR11","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"V De","year":"2003","unstructured":"De, V., Delaigle, J., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97\u2013105 (2003)","journal-title":"IEEE Trans. Multimedia"},{"key":"4_CR12","unstructured":"Zou, D., Shi, Y., Ni, Z.: A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. In: IEEE Workshop on Multimedia Signal Processing, pp. 195\u2013198 (2004)"},{"issue":"4","key":"4_CR13","first-page":"497","volume":"8","author":"Z Ni","year":"2008","unstructured":"Ni, Z., Shi, Y., Ansari, N., et al.: Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans. Circuits Syst. Video Technol. 8(4), 497\u2013509 (2008)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"4_CR14","doi-asserted-by":"crossref","first-page":"3598","DOI":"10.1109\/TIP.2012.2191564","volume":"21","author":"L An","year":"2012","unstructured":"An, L., Gao, X., Li, X., et al.: Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans. Image Process. 21(8), 3598\u20133611 (2012). A Publication of the IEEE Signal Processing Society","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"4_CR15","first-page":"012005","volume":"77","author":"D Coltuc","year":"2007","unstructured":"Coltuc, D.: Towards distortion-free robust image authentication. J. Phys: Conf. Ser. 77(1), 012005 (2007)","journal-title":"J. Phys: Conf. Ser."},{"issue":"1","key":"4_CR16","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1016\/j.neucom.2014.03.088","volume":"151","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Ju, L., Hu, M., et al.: A robust reversible data hiding scheme for H.264 without distortion drift. Neurocomputing 151(1), 1053\u20131062 (2015)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T09:13:38Z","timestamp":1570266818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}