{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:40Z","timestamp":1742914000778,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_37","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"535-545","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Computing in Covert Domain"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5224-6374","authenticated-orcid":false,"given":"Zhenxing","family":"Qian","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0283-5338","authenticated-orcid":false,"given":"Zichi","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5867-1315","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"issue":"3","key":"37_CR1","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/TEM.2015.2432117","volume":"62","author":"J Chen","year":"2015","unstructured":"Chen, J., Ping, J., Xu, Y., Tan, B.: Information privacy concern about peer disclosure in online social networks. IEEE Trans. Eng. Manage. 62(3), 311\u2013324 (2015)","journal-title":"IEEE Trans. Eng. Manage."},{"issue":"5","key":"37_CR2","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1109\/TCSS.2019.2916086","volume":"6","author":"G Liu","year":"2019","unstructured":"Liu, G., Wang, C., Peng, K., Huang, H., Li, Y., Cheng, W.: SocInf: membership inference attacks on social media health data with machine learning. IEEE Trans. Comput. Soc. Syst. 6(5), 907\u2013921 (2019)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"37_CR3","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TIP.2019.2940533","volume":"29","author":"A Mustafa","year":"2020","unstructured":"Mustafa, A., Khan, S., Hayat, M., Shen, J., Shao, L.: Image super-resolution as a defense against adversarial attacks. IEEE Trans. Image Processing 29, 1711\u20131724 (2020)","journal-title":"IEEE Trans. Image Processing"},{"issue":"7","key":"37_CR4","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13(7), 1670\u20131681 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"37_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"37_CR6","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1109\/TCSVT.2018.2797897","volume":"29","author":"Z Qian","year":"2019","unstructured":"Qian, Z., Xu, H., Luo, X., Zhang, X.: New framework of reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Circ. Syst. Video Technol. 29(2), 351\u2013362 (2019)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"1","key":"37_CR7","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1109\/TCC.2017.2737980","volume":"8","author":"Y Ren","year":"2020","unstructured":"Ren, Y., Zhang, X., Feng, G., Qian, Z., Li, F.: How to extract image features based on co-occurrence matrix securely and efficiently in cloud computing. IEEE Trans. Cloud Comput. 8(1), 207\u2013219 (2020)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"5","key":"37_CR8","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/TC.2015.2470255","volume":"65","author":"Q Zhang","year":"2016","unstructured":"Zhang, Q., Yang, L., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351\u20131362 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, X., Wang, Z., Yu, J., Qian, Z.: Reversible visible watermark embedded in encrypted domain. In: 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP2015), Chengdu, China, pp. 826\u2013830, July 2015","DOI":"10.1109\/ChinaSIP.2015.7230520"},{"issue":"9","key":"37_CR10","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.sigpro.2016.07.002","volume":"130","author":"M Li","year":"2017","unstructured":"Li, M., Li, Y.: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process. 130(9), 190\u2013196 (2017)","journal-title":"Signal Process."},{"issue":"9","key":"37_CR11","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TCSVT.2015.2433194","volume":"26","author":"X Zhang","year":"2016","unstructured":"Zhang, X., Long, J., Wang, Z., Cheng, H.: Lossless and reversible data hiding in encrypted images with public key cryptography. IEEE Trans. Circ. Syst. Video Technol. 26(9), 1622\u20131631 (2016)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"5","key":"37_CR12","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"Y Chen","year":"2014","unstructured":"Chen, Y., Shiu, C., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5), 1164\u20131170 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"37_CR13","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1109\/TIFS.2006.879281","volume":"1","author":"J Fridrich","year":"2006","unstructured":"Fridrich, J., Soukal, D.: Matrix embedding for large payloads. IEEE Trans. Inf. Forensics Secur. 1(3), 390\u2013395 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"37_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2851245","author":"Y Ren","year":"2018","unstructured":"Ren, Y., Dong, M., Qian, Z., Zhang, X., Feng, G.: Efficient algorithm for secure outsourcing of modular exponentiation with single server. IEEE Trans. Cloud Comput. (2018). https:\/\/doi.org\/10.1109\/TCC.2018.2851245","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"7","key":"37_CR15","first-page":"3648","volume":"11","author":"M Dong","year":"2017","unstructured":"Dong, M., Ren, Y., Zhang, X.: Fully verifiable algorithm for secure outsourcing of bilinear pairing in cloud computing. KSII Trans. Internet Inf. Syst. 11(7), 3648\u20133663 (2017)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.jvcir.2019.03.021","volume":"61","author":"H Liang","year":"2019","unstructured":"Liang, H., Zhang, X., Cheng, H.: Huffman-code based retrieval for encrypted JPEG images. J. Vis. Commun. Image Represent. 61, 149\u2013156 (2019)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"21","key":"37_CR17","doi-asserted-by":"publisher","first-page":"13791","DOI":"10.1007\/s11042-015-2741-z","volume":"75","author":"H Cheng","year":"2016","unstructured":"Cheng, H., Zhang, X., Yu, J.: AC-coefficient histogram- based retrieval for encrypted JPEG images. Multimed. Tools Appl. 75(21), 13791\u201313803 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"37_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/JSYST.2014.2354235","volume":"11","author":"T Peng","year":"2017","unstructured":"Peng, T., Liu, Q., Wang, G.: Enhanced location privacy preserving scheme in location-based services. IEEE Syst. J. 11(1), 219\u2013230 (2017)","journal-title":"IEEE Syst. J."},{"issue":"S1","key":"37_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1080\/02564602.2018.1520153","volume":"35","author":"S Li","year":"2018","unstructured":"Li, S., Chen, X., Wang, Z., Qian, Z., Zhang, X.: Data hiding in iris image for privacy protection. IETE Tech. Rev. 35(S1), 34\u201341 (2018)","journal-title":"IETE Tech. Rev."},{"key":"37_CR20","unstructured":"Schaefer, G., Stich, M.: UCID - an uncompressed colour image database. In: Proceedings of Conference on Storage and Retrieval Methods and Applications for Multimedia, San Jose, CA, USA, pp. 472\u2013480, January 2004"},{"key":"37_CR21","doi-asserted-by":"publisher","first-page":"74917","DOI":"10.1109\/ACCESS.2018.2884198","volume":"6","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Qian, Z., Zhang, X., Yang, M., Ye, D.: On improving distortion functions for JPEG steganography. IEEE Access 6, 74917\u201374930 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"37_CR22","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215\u2013224 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"37_CR23","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"37_CR24","doi-asserted-by":"publisher","first-page":"1996","DOI":"10.1109\/TIFS.2013.2286682","volume":"8","author":"V Holub","year":"2013","unstructured":"Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur.ty 8(12), 1996\u20132006 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur.ty"},{"issue":"2","key":"37_CR25","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432\u2013444 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:35:46Z","timestamp":1619318146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}