{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:32:11Z","timestamp":1770226331671,"version":"3.49.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772561"],"award-info":[{"award-number":["61772561"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014472","name":"Scientific Research Foundation of Hunan Provincial Education Department","doi-asserted-by":"publisher","award":["18A174"],"award-info":[{"award-number":["18A174"]}],"id":[{"id":"10.13039\/100014472","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014472","name":"Scientific Research Foundation of Hunan Provincial Education Department","doi-asserted-by":"publisher","award":["19B584"],"award-info":[{"award-number":["19B584"]}],"id":[{"id":"10.13039\/100014472","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014472","name":"Scientific Research Foundation of Hunan Provincial Education Department","doi-asserted-by":"publisher","award":["18C0262"],"award-info":[{"award-number":["18C0262"]}],"id":[{"id":"10.13039\/100014472","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Plan of Hunan Province","award":["2019SK2022"],"award-info":[{"award-number":["2019SK2022"]}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2020JJ4140"],"award-info":[{"award-number":["2020JJ4140"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2020JJ4141"],"award-info":[{"award-number":["2020JJ4141"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Degree & Postgraduate Education Reform Project of Hunan Province","award":["2019JGYB154"],"award-info":[{"award-number":["2019JGYB154"]}]},{"name":"Postgraduate Excellent teaching team Project of Hunan Province","award":["[2019]370-133"],"award-info":[{"award-number":["[2019]370-133"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s00530-020-00734-w","type":"journal-article","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T04:28:02Z","timestamp":1610166482000},"page":"403-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A privacy-preserving and traitor tracking content-based image retrieval scheme in cloud computing"],"prefix":"10.1007","volume":"27","author":[{"given":"Zhangdong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jiaohua","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Xuyu","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,9]]},"reference":[{"issue":"21","key":"734_CR1","doi-asserted-by":"publisher","first-page":"13791","DOI":"10.1007\/s11042-015-2741-z","volume":"75","author":"H Cheng","year":"2016","unstructured":"Cheng, H., Zhang, X., Yu, J.: Ac-coefficient histogram-based retrieval for encrypted jpeg images. Multimed. Tools Appl. 75(21), 13791\u201313803 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"734_CR2","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"Coltuc, D.: Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensics Secur. 6(3), 873\u2013882 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"734_CR3","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/TCC.2017.2669999","volume":"7","author":"B Ferreira","year":"2017","unstructured":"Ferreira, B., Rodrigues, J., Leitao, J., Domingos, H.: Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans. Cloud Comput. 7(3), 784\u2013798 (2017)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"9","key":"734_CR4","first-page":"2016","volume":"10","author":"X Li","year":"2017","unstructured":"Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016\u20132027 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"734_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3033945","author":"Y Luo","year":"2020","unstructured":"Luo, Y., Qin, J., Xiang, X., Tan, Y.: Coverless image steganography based on multi-object recognition. IEEE Trans. Circuits Syst. Video Technol (2020). https:\/\/doi.org\/10.1109\/TCSVT.2020.3033945","journal-title":"IEEE Trans. Circuits Syst. Video Technol"},{"key":"734_CR6","doi-asserted-by":"publisher","first-page":"023032","DOI":"10.1117\/1.JEI.27.2.023032","volume":"27","author":"Haihua Liang","year":"2018","unstructured":"Liang, Haihua, Zhang, Xinpeng, Wei, Qiuhan, Cheng, Hang: Secure image retrieval with multiple keys. J. Electron. Imaging 27(2) ,023032 (2018)","journal-title":"J. Electron. Imaging"},{"key":"734_CR7","doi-asserted-by":"publisher","first-page":"105375","DOI":"10.1016\/j.knosys.2019.105375","volume":"192","author":"Q Liu","year":"2020","unstructured":"Liu, Q., Xiang, X., Qin, J., Tan, Y., Tan, J., Luo, Y.: Coverless steganography based on image retrieval of densenet features and dwt sequence mapping. Knowl. Based Syst. 192(2020), 105375\u2013105389 (2020)","journal-title":"Knowl. Based Syst."},{"issue":"1","key":"734_CR8","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11554-019-00917-3","volume":"17","author":"Y Luo","year":"2020","unstructured":"Luo, Y., Qin, J., Xiang, X., Tan, Y., Liu, Q., Xiang, L.: Coverless real-time image information hiding based on image block matching and dense convolutional network. J. Real-Time Image Process. 17(1), 125\u2013135 (2020)","journal-title":"J. Real-Time Image Process."},{"key":"734_CR9","first-page":"1","volume":"8","author":"W Ma","year":"2020","unstructured":"Ma, W., Qin, J., Xiang, X., Tan, Y., He, Z.: Searchable encrypted image retrieval based on multi-feature adaptive late-fusion. Mathematics 8(6), 1019 (2020)","journal-title":"Mathematics"},{"issue":"3","key":"734_CR10","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"734_CR11","first-page":"1061","volume":"2","author":"M Norouzi","year":"2012","unstructured":"Norouzi, M., Fleet, D.J.D.D.J., Salakhutdinov, R., Blei, D.M.: Hamming distance metric learning. Adv. Neural Inf. Process. Syst. 25, 1061\u20131069 (2012)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"734_CR12","doi-asserted-by":"publisher","first-page":"24626","DOI":"10.1109\/ACCESS.2019.2894673","volume":"7","author":"J Qin","year":"2019","unstructured":"Qin, J., Li, H., Xiang, X., Tan, Y., Pan, W., Ma, W., Xiong, N.N.: An encrypted image retrieval method based on Harris corner optimization and lsh in cloud computing. IEEE Access 7(1), 24626\u201324633 (2019)","journal-title":"IEEE Access"},{"key":"734_CR13","doi-asserted-by":"publisher","first-page":"1394","DOI":"10.3390\/math8091394","volume":"8","author":"J Qin","year":"2020","unstructured":"Qin, J., Wang, J., Tan, Y., Huang, H., He, Z.: Coverless image steganography based on generative adversarial network. Mathematics 8(9), 1394 (2020)","journal-title":"Mathematics"},{"issue":"7","key":"734_CR14","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"734_CR15","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1016\/j.future.2018.04.089","volume":"109","author":"M Shen","year":"2018","unstructured":"Shen, M., Cheng, G., Zhu, L., Du, X., Hu, J.: Content-based multi-source encrypted image retrieval in clouds with privacy preservation. Future Gener. Comput. Syst. 109, 621\u2013632 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"734_CR16","doi-asserted-by":"publisher","first-page":"25026","DOI":"10.1109\/ACCESS.2019.2896304","volume":"7","author":"Y Tan","year":"2019","unstructured":"Tan, Y., Qin, J., Xiang, X., Ma, W., Pan, W., Xiong, N.N.: A robust watermarking scheme in ycbcr color space based on channel coding. IEEE Access 7(1), 25026\u201325036 (2019)","journal-title":"IEEE Access"},{"key":"734_CR17","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"734_CR18","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"734_CR19","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1109\/TCSVT.2019.2915584","volume":"30","author":"J Wang","year":"2019","unstructured":"Wang, J., Chen, X., Ni, J., Mao, N., Shi, Y.: Multiple histograms based reversible data hiding: framework and realization. IEEE Trans. Circuits Syst. Video Technol. 30(8), 2313\u20132328 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"734_CR20","doi-asserted-by":"publisher","first-page":"5851","DOI":"10.3934\/mbe.2019292","volume":"16","author":"J Wang","year":"2019","unstructured":"Wang, J., Qin, J., Xiang, X., Tan, Y., Pan, N.: Captcha recognition based on deep convolutional neural network. Math. Biosci. Eng. 16(5), 5851\u20135861 (2019)","journal-title":"Math. Biosci. Eng."},{"issue":"11","key":"734_CR21","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594\u20132608 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"99","key":"734_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSC.2019.2927215","volume":"PP","author":"Z Xia","year":"2019","unstructured":"Xia, Z., Jiang, L., Liu, D., Lu, L., Jeon, B.: Boew: a content-based image retrieval scheme using bag-of-encrypted-words in cloud computing. IEEE Trans. Serv. Comput (2019). https:\/\/doi.org\/10.1109\/TSC.2019.2927215","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"734_CR23","first-page":"285","volume":"55","author":"W Xu","year":"2018","unstructured":"Xu, W., Xiang, S., Sachnev, V.: A cryptograph domain image retrieval method based on Paillier homomorphic block encryption. CMC Comput. Mater. Continua 55(2), 285\u2013295 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"key":"734_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038287","author":"Y Ye","year":"2020","unstructured":"Ye, Y., Li, S., Liu, F., Tang, Y., Hu, W.: Edgefed: optimized federated learning based on edge computing. IEEE Access (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3038287","journal-title":"IEEE Access"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00734-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-020-00734-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00734-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,16]],"date-time":"2021-06-16T05:12:39Z","timestamp":1623820359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-020-00734-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,9]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["734"],"URL":"https:\/\/doi.org\/10.1007\/s00530-020-00734-w","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,9]]},"assertion":[{"value":"13 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}