{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:21:41Z","timestamp":1742912501480,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819601219"},{"type":"electronic","value":"9789819601226"}],"license":[{"start":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T00:00:00Z","timestamp":1731369600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T00:00:00Z","timestamp":1731369600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0122-6_20","type":"book-chapter","created":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T18:24:41Z","timestamp":1731781481000},"page":"220-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Reversible Data Hiding in\u00a0Encryption Domain for\u00a0JPEG Image Based on\u00a0Controllable Ciphertext Range of\u00a0Paillier Homomorphic Encryption Algorithm"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9030-7393","authenticated-orcid":false,"given":"Bin","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0956-545X","authenticated-orcid":false,"given":"Chunxin","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1195-4232","authenticated-orcid":false,"given":"Ruihe","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1921-049X","authenticated-orcid":false,"given":"Yongjin","family":"Xian","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3742-5614","authenticated-orcid":false,"given":"Chunpeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,12]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi, Y.-Q., Li, X., Zhang, X., Wu, H.-T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"issue":"4","key":"20_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"20_CR4","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","volume":"11","author":"F Huang","year":"2016","unstructured":"Huang, F., Huang, J., Shi, Y.-Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11(12), 2777\u20132789 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"20_CR5","doi-asserted-by":"publisher","first-page":"1672","DOI":"10.1109\/LSP.2016.2585580","volume":"23","author":"Z Qian","year":"2016","unstructured":"Qian, Z., Zhang, X., Feng, G.: Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Process. Lett. 23(11), 1672\u20131676 (2016)","journal-title":"IEEE Signal Process. Lett."},{"key":"20_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2023.104145","volume":"141","author":"B Ma","year":"2023","unstructured":"Ma, B., Wang, S., Xu, J., Wang, C., Li, J., Li, X.: A multi-level sorting prediction enhancement-based two-dimensional reversible data hiding algorithm for jpeg images. Digital Signal Process. 141, 104145 (2023)","journal-title":"Digital Signal Process."},{"issue":"2","key":"20_CR7","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1109\/TCSVT.2018.2797897","volume":"29","author":"Z Qian","year":"2018","unstructured":"Qian, Z., Xu, H., Luo, X., Zhang, X.: New framework of reversible data hiding in encrypted jpeg bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(2), 351\u2013362 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"3647","DOI":"10.1109\/TIFS.2021.3080497","volume":"16","author":"S Sheidani","year":"2021","unstructured":"Sheidani, S., Mahmoudi-Aznaveh, A., Eslami, Z.: CPA-secure privacy-preserving reversible data hiding for jpeg images. IEEE Trans. Inf. Forensics Secur. 16, 3647\u20133661 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"20_CR9","doi-asserted-by":"publisher","first-page":"3501","DOI":"10.1109\/TCSVT.2018.2882850","volume":"29","author":"J He","year":"2018","unstructured":"He, J., Chen, J., Luo, W., Tang, S., Huang, J.: A novel high-capacity reversible data hiding scheme for encrypted jpeg bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(12), 3501\u20133515 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"20_CR10","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"Z Yin","year":"2019","unstructured":"Yin, Z., Xiang, Y., Zhang, X.: Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans. Multimedia 22(4), 874\u2013884 (2019)","journal-title":"IEEE Trans. Multimedia"},{"key":"20_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108146","volume":"187","author":"Z Yin","year":"2021","unstructured":"Yin, Z., She, X., Tang, J., Luo, B.: Reversible data hiding in encrypted images based on pixel prediction and multi-msb planes rearrangement. Signal Process. 187, 108146 (2021)","journal-title":"Signal Process."},{"key":"20_CR12","volume":"105","author":"M Yu","year":"2022","unstructured":"Yu, M., Yao, H., Qin, C.: Reversible data hiding in encrypted images without additional information transmission. Signal Process.: Image Commun. 105, 116696 (2022)","journal-title":"Signal Process.: Image Commun."},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.ins.2021.02.079","volume":"567","author":"X Wang","year":"2021","unstructured":"Wang, X., Chang, C.-C., Lin, C.-C.: Reversible data hiding in encrypted images with block-based adaptive msb encoding. Inf. Sci. 567, 375\u2013394 (2021)","journal-title":"Inf. Sci."},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"104121","DOI":"10.1016\/j.dsp.2023.104121","volume":"141","author":"B Ma","year":"2023","unstructured":"Ma, B., Li, K., Xu, J., Wang, C., Li, J., Zhang, L.: Enhancing the security of image steganography via multiple adversarial networks and channel attention modules. Digital Signal Process. 141, 104121 (2023). https:\/\/doi.org\/10.1016\/j.dsp.2023.104121","journal-title":"Digital Signal Process."},{"issue":"3","key":"20_CR15","doi-asserted-by":"publisher","first-page":"2977","DOI":"10.3233\/JIFS-191478","volume":"39","author":"R Anushiadevi","year":"2020","unstructured":"Anushiadevi, R., Praveenkumar, P., Rayappan, J.B.B., Amirthara-jan, R.: Reversible data hiding method based on pixel expansion and homomorphic encryption. J. Intell. Fuzzy Syst. 39(3), 2977\u20132990 (2020)","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"8","key":"20_CR16","doi-asserted-by":"publisher","first-page":"2353","DOI":"10.1109\/TCSVT.2019.2963393","volume":"30","author":"Y Ke","year":"2020","unstructured":"Ke, Y., Zhang, M.-Q., Liu, J., Su, T.-T., Yang, X.-Y.: Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE Trans. Circuits Syst. Video Technol. 30(8), 2353\u20132365 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"17","key":"20_CR17","doi-asserted-by":"publisher","first-page":"26161","DOI":"10.1007\/s11042-021-10722-5","volume":"80","author":"R Bhardwaj","year":"2021","unstructured":"Bhardwaj, R.: A high payload reversible data hiding algorithm for homomorphic encrypted absolute moment block truncation coding compressed images. Multimedia Tools Appl. 80(17), 26161\u201326179 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10722-5","journal-title":"Multimedia Tools Appl."},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/j.jvcir.2016.08.021","volume":"40","author":"H-T Wu","year":"2016","unstructured":"Wu, H.-T., Cheung, Y.-M., Huang, J.: Reversible data hiding inpaillier cryptosystem. J. Vis. Commun. Image Represent. 40, 765\u2013771 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Puteaux, P., Vialle, M., Puech, W.: Homomorphic encryption-based LSB substitution for high capacity data hiding in the encrypted domain. IEEE Access 8, 108655\u2013108663 (2020)","DOI":"10.1109\/ACCESS.2020.3001385"},{"key":"20_CR20","doi-asserted-by":"publisher","unstructured":"Ma, B., Zhang, B., Wang, C., Li, J., Wang, Y., Cui, X.: Reversible data hiding for JPEG image based on Paillier encryption. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds.) ICAIS 2022, Part III, pp. 473\u2013486. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06764-8_37","DOI":"10.1007\/978-3-031-06764-8_37"},{"key":"20_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.sigpro.2016.11.003","volume":"133","author":"J-C Chang","year":"2017","unstructured":"Chang, J.-C., Lu, Y.-Z., Wu, H.-L.: A separable reversible data hiding scheme for encrypted jpeg bitstreams. Signal Process. 133, 135\u2013143 (2017)","journal-title":"Signal Process."},{"key":"20_CR22","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1109\/LSP.2023.3290836","volume":"30","author":"X Ye","year":"2023","unstructured":"Ye, X., Zhang, Y., Xiao, X., Yi, S., Lan, R.: Usability enhanced thumbnail-preserving encryption based on data hiding for JPEG images. IEEE Signal Process. Lett. 30, 793\u2013797 (2023). https:\/\/doi.org\/10.1109\/LSP.2023.3290836","journal-title":"IEEE Signal Process. Lett."}],"container-title":["Lecture Notes in Computer Science","PRICAI 2024: Trends in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0122-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T19:19:30Z","timestamp":1731784770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0122-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,12]]},"ISBN":["9789819601219","9789819601226"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0122-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,12]]},"assertion":[{"value":"12 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific Rim International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyoto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pricai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.pricai.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}