{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:10:00Z","timestamp":1770271800478,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819787456","type":"print"},{"value":"9789819787463","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-8746-3_7","type":"book-chapter","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:57:22Z","timestamp":1730303842000},"page":"109-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible Data Hiding for 3D Mesh Model Based on Block Modulus Encryption and Multi-MSB Prediction"],"prefix":"10.1007","author":[{"given":"Zihao","family":"Fu","sequence":"first","affiliation":[]},{"given":"Yang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Wanli","family":"Lyu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,31]]},"reference":[{"key":"7_CR1","unstructured":"Barton, J.M.: Method and apparatus for embedding authentication information within digital data. United States Patent, 5 646 997 (1997)"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Shi, Y.Q., Li, X., Zhang, X., et al.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"issue":"4","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"15","author":"MU Celik","year":"2006","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M.: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. 15(4), 1042\u20131049 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"7_CR4","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"W Zhang","year":"2013","unstructured":"Zhang, W., Hu, X., et al.: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775\u20132785 (2013)","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"107888","DOI":"10.1016\/j.sigpro.2020.107888","volume":"180","author":"G Fan","year":"2021","unstructured":"Fan, G., Pan, Z., Gao, E., et al.: Reversible data hiding method based on combining IPVO with bias-added Rhombus predictor by multi-predictor mechanism. Signal Process. 180, 107888 (2021)","journal-title":"Signal Process."},{"issue":"8","key":"7_CR6","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"107579","DOI":"10.1016\/j.sigpro.2020.107579","volume":"173","author":"X Gao","year":"2020","unstructured":"Gao, X., Pan, Z., et al.: Reversible data hiding for high dynamic range images using two-dimensional prediction-error histogram of the second time prediction. Signal Process. 173, 107579 (2020)","journal-title":"Signal Process."},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., et al.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.sigpro.2019.05.020","volume":"163","author":"Y Jia","year":"2019","unstructured":"Jia, Y., Yin, Z., Zhang, X., et al.: Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process. 163, 238\u2013246 (2019)","journal-title":"Signal Process."},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Fang, Y., Jia, J., Yang, Y., Lyu, W.: Improving transferability reversible adversarial examples based on flipping transformation. In: Yu, Z., et al. Data Science. ICPCSEE 2023. Communications in Computer and Information Science, vol. 1879, pp. 417\u2013432 . Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-5968-6_30","DOI":"10.1007\/978-981-99-5968-6_30"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2022.12.018","volume":"166","author":"Z Yin","year":"2023","unstructured":"Yin, Z., Chen, L., Lyu, W., et al.: Reversible attack based on adversarial perturbation and reversible data hiding in YUV colorspace. Pattern Recogn. Lett. 166, 1\u20137 (2023)","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"7_CR12","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1109\/TDSC.2019.2913422","volume":"18","author":"S Zheng","year":"2019","unstructured":"Zheng, S., Wang, Y., Hu, D.: Lossless data hiding based on homomorphic cryptosystem. IEEE Trans. Dependable Secure Comput. 18(2), 692\u2013705 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"103265","DOI":"10.1016\/j.bspc.2021.103265","volume":"73","author":"R Bhardwaj","year":"2022","unstructured":"Bhardwaj, R.: Efficient separable reversible data hiding algorithm for compressed 3D mesh models. Biomed. Signal Process. Control 73, 103265 (2022)","journal-title":"Biomed. Signal Process. Control"},{"issue":"4","key":"7_CR14","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"7_CR15","doi-asserted-by":"publisher","first-page":"11215","DOI":"10.1007\/s11042-023-15383-0","volume":"83","author":"L Chen","year":"2024","unstructured":"Chen, L., Zhu, S., Andrew, A., et al.: Reversible attack based on local visible adversarial perturbation. Multimedia Tools Appl. 83(4), 11215\u201311227 (2024)","journal-title":"Multimedia Tools Appl."},{"issue":"12","key":"7_CR16","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","volume":"11","author":"F Huang","year":"2016","unstructured":"Huang, F., Huang, J., Shi, Y.Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forensics Secur. 11(12), 2777\u20132789 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Yin, Z., Xu, N., Wang, F., Cheng, L., Luo, B.: Separable reversible data hiding based on integer mapping and multi-MSB prediction for encrypted 3D mesh models. In: Ma, H., et al. Pattern Recognition and Computer Vision. PRCV 2021. Lecture Notes in Computer Science(), vol. 13020, pp. 336-348. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88007-1_28","DOI":"10.1007\/978-3-030-88007-1_28"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"108686","DOI":"10.1016\/j.sigpro.2022.108686","volume":"201","author":"WL Lyu","year":"2022","unstructured":"Lyu, W.L., Cheng, L., Yin, Z.: High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Signal Process. 201, 108686 (2022)","journal-title":"Signal Process."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Tsai, Y.Y., Liu, H.L.: Integrating coordinate transformation and random sampling into high-capacity reversible data hiding in encrypted polygonal models. IEEE Trans. Dependable Secure Comput. (2022)","DOI":"10.1109\/TDSC.2022.3204291"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Hou, G., Ou, B., Long, M., et al.: Separable reversible data hiding for encrypted 3D mesh models based on octree subdivision and multi-MSB prediction. IEEE Trans. Multimedia (2023)","DOI":"10.1109\/TMM.2023.3295578"},{"issue":"1","key":"7_CR21","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TMM.2017.2723244","volume":"20","author":"R Jiang","year":"2017","unstructured":"Jiang, R., Zhou, H., et al.: Reversible data hiding in encrypted three-dimensional mesh models. IEEE Trans. Multimedia 20(1), 55\u201367 (2017)","journal-title":"IEEE Trans. Multimedia"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"8145","DOI":"10.1007\/s13369-018-3354-4","volume":"43","author":"M Shah","year":"2018","unstructured":"Shah, M., Zhang, W., Hu, H., et al.: Homomorphic encryption-based reversible data hiding for 3D mesh models. Arab. J. Sci. Eng. 43, 8145\u20138157 (2018)","journal-title":"Arab. J. Sci. Eng."},{"key":"7_CR23","doi-asserted-by":"publisher","first-page":"109357","DOI":"10.1016\/j.sigpro.2023.109357","volume":"217","author":"L Qu","year":"2024","unstructured":"Qu, L., Lu, H., Chen, P., et al.: Ring Co-XOR encryption based reversible data hiding for 3D mesh model. Signal Process. 217, 109357 (2024)","journal-title":"Signal Process."},{"issue":"6","key":"7_CR24","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.ins.2010.11.009","volume":"181","author":"ZL Zhu","year":"2011","unstructured":"Zhu, Z.L., Zhang, W., et al.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171\u20131186 (2011)","journal-title":"Inf. Sci."},{"issue":"18","key":"7_CR25","doi-asserted-by":"publisher","first-page":"25707","DOI":"10.1007\/s11042-022-12297-1","volume":"81","author":"SS Nassar","year":"2022","unstructured":"Nassar, S.S., El-Bendary, M.A.: Confidentiality considerations: multimedia signals transmission over different wireless channels utilized efficient secured model. Multimedia Tools Appl. 81(18), 25707\u201325744 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"7_CR26","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1007\/s11071-018-4478-5","volume":"94","author":"T Ye","year":"2018","unstructured":"Ye, T., Zhimao, L.: Chaotic S-box: Six-dimensional fractional Lorenz-Duffing chaotic system and O-shaped path scrambling. Nonlinear Dyn. 94, 2115\u20132126 (2018)","journal-title":"Nonlinear Dyn."},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Raj, B., Jani Anbarasi, L., Narendra, M., Subashini, V.J.: A new transformation of 3D models using chaotic encryption based on arnold cat map. In: Barolli, L., Xhafa, F., Khan, Z., Odhabi, H. (eds.) Advances in Internet, Data and Web Technologies. EIDWT 2019. Lecture Notes on Data Engineering and Communications Technologies, vol. 29, pp. 322\u2013332. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-12839-5_29","DOI":"10.1007\/978-3-030-12839-5_29"},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"2286","DOI":"10.1109\/TMM.2020.3009492","volume":"23","author":"YY Tsai","year":"2020","unstructured":"Tsai, Y.Y.: Separable reversible data hiding for encrypted three-dimensional models based on spatial subdivision and room encoding. IEEE Trans. Multimedia 23, 2286\u20132296 (2020)","journal-title":"IEEE Trans. Multimedia"},{"key":"7_CR29","first-page":"1","volume":"2020","author":"L Li","year":"2020","unstructured":"Li, L., Wang, S., Luo, T., et al.: Reversible data hiding for encrypted 3D model based on prediction error expansion. J. Sensors 2020, 1\u201314 (2020)","journal-title":"J. Sensors"},{"issue":"3","key":"7_CR30","doi-asserted-by":"publisher","first-page":"347","DOI":"10.3390\/sym12030347","volume":"12","author":"L Li","year":"2020","unstructured":"Li, L., Wang, S., et al.: Homomorphic encryption-based robust reversible watermarking for 3D model. Symmetry 12(3), 347 (2020)","journal-title":"Symmetry"},{"key":"7_CR31","unstructured":"Philip, S.: The princeton shape benchmark. Shape Modeling International, Genova, Italy, June 2004 (2004)"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8746-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:58:56Z","timestamp":1730303936000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8746-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819787456","9789819787463"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8746-3_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"31 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.icpcsee.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}