{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:17:19Z","timestamp":1760955439252},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400988"},{"type":"electronic","value":"9783642400995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40099-5_32","type":"book-chapter","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T16:32:17Z","timestamp":1374683537000},"page":"384-394","source":"Crossref","is-referenced-by-count":12,"title":["An Improved Algorithm for Reversible Data Hiding in Encrypted Image"],"prefix":"10.1007","author":[{"given":"Jie","family":"Yu","sequence":"first","affiliation":[]},{"given":"Guopu","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianquan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"32_CR1","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X. Zhang","year":"2011","unstructured":"Zhang, X.: Reversible Data Hiding in Encrypted Image. IEEE Signal Process. Lett.\u00a018(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"32_CR2","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A Buyer-seller Watermarking Protocol. IEEE Trans. Image Process.\u00a010(4), 643\u2013649 (2001)","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"32_CR3","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"13","author":"C.L. Lei","year":"2004","unstructured":"Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An Efficient and Anonymous Buyer-seller Watermarking Protocol. IEEE Trans. Image Process.\u00a013(12), 1618\u20131626 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"23","key":"32_CR4","doi-asserted-by":"publisher","first-page":"4672","DOI":"10.1016\/j.ins.2010.08.003","volume":"180","author":"B. Zhao","year":"2010","unstructured":"Zhao, B., Kou, W., Li, H., Dang, L., Zhang, J.: Effective Watermarking Scheme in The Encrypted Domain for Buyer-seller Watermarking Protocol. Information Sciences\u00a0180(23), 4672\u20134684 (2010)","journal-title":"Information Sciences"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Zhao, B., Delp, E.J.: Secret Sharing in The Encrypted Domain. In: Proc. IEEE ICC (2011)","DOI":"10.1109\/icc.2011.5963328"},{"issue":"4","key":"32_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TIFS.2008.2011087","volume":"4","author":"T. Bianchi","year":"2009","unstructured":"Bianchi, T., Piva, A., Barni, M.: On The Implementation of The Discrete Fourier Transform in The Encrypted Domain. IEEE Trans. Inf. Forens. Security\u00a04(4), 86\u201397 (2009)","journal-title":"IEEE Trans. Inf. Forens. Security"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Bianchi, T., Veugen, T., Piva, A., Barni, M.: Processing in The Encrypted Domain Using a Composite Signal Representation: Pros and Cons. In: Proc. IEEE WIFS, pp. 176\u2013180 (2009)","DOI":"10.1109\/WIFS.2009.5386460"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Zheng, P., Huang, J.: Implementation of The Discrete Wavelet Transform and Multiresolution Analysis in The Encrypted Domain. In: Proc. of the 19th ACM International Conference on Multimedia, pp. 413\u2013422 (2011)","DOI":"10.1145\/2072298.2072352"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Lu, W., Swaminathan, A., Varna, A.L., Wu, M.: Enabling Search Over Encrypted Multimedia Databases. In: Media Forensics and Security. SPIE, vol.\u00a07254, p. 725418 (2009)","DOI":"10.1117\/12.806980"},{"issue":"4","key":"32_CR10","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/TIFS.2008.2007244","volume":"3","author":"D. Schonberg","year":"2008","unstructured":"Schonberg, D., Draper, S.C., Yeo, C., Ramchandran, K.: Toward Compression of Encrypted Images and Video Sequences. IEEE Trans. Inf. Forens. Security\u00a03(4), 749\u2013762 (2008)","journal-title":"IEEE Trans. Inf. Forens. Security"},{"issue":"4","key":"32_CR11","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TIP.2009.2038773","volume":"19","author":"W. Liu","year":"2010","unstructured":"Liu, W., Zeng, W., Dong, L., Yao, Q.: Efficient Compression of Encrypted Grayscale Images. IEEE Trans. Image Process.\u00a019(4), 1097\u20131102 (2010)","journal-title":"IEEE Trans. Image Process."},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Hsu, C.Y., Lu, C.S., Pei, S.C.: Homomorphic Encryption-based Secure SIFT for Privacy-preserving Feature Extraction. In: Media Watermarking, Security, and Forensics III. SPIE, vol.\u00a07880, p. 788005 (2011)","DOI":"10.1117\/12.873325"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Puech, W., Chaumont, M., Strauss, O.: A Reversible Data Hiding Method for Encrypted Images. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. SPIE, vol.\u00a06819, p. 68191E (2008)","DOI":"10.1117\/12.766754"},{"issue":"2","key":"32_CR14","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X. Zhang","year":"2012","unstructured":"Zhang, X.: Separable Reversible Datahiding in Encrypted Image. IEEE Trans. Inf. Forens. Security\u00a07(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forens. Security"},{"issue":"4","key":"32_CR15","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W. Hong","year":"2012","unstructured":"Hong, W., Chen, T.S., Wu, H.Y.: An Improved Reversible Data Hiding in Encrypted Images Using Side Match. IEEE Signal Process. Lett.\u00a019(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermaking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40099-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T03:18:59Z","timestamp":1557976739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40099-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400988","9783642400995"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40099-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}