{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T05:14:10Z","timestamp":1744262050672,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:00:00Z","timestamp":1659657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:00:00Z","timestamp":1659657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007620","name":"department of education of liaoning province","doi-asserted-by":"publisher","award":["WQ2020014"],"award-info":[{"award-number":["WQ2020014"]}],"id":[{"id":"10.13039\/501100007620","id-type":"DOI","asserted-by":"publisher"}]},{"name":"he key research project of dalian academy of social sciences","award":["2020dlsky042"],"award-info":[{"award-number":["2020dlsky042"]}]},{"name":"the key research project of dalian academy of social sciences","award":["2021dlsky027"],"award-info":[{"award-number":["2021dlsky027"]}]},{"DOI":"10.13039\/501100008339","name":"liaoning planning office of philosophy and social science","doi-asserted-by":"publisher","award":["L19BTQ001"],"award-info":[{"award-number":["L19BTQ001"]}],"id":[{"id":"10.13039\/501100008339","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014717","name":"national outstanding youth science fund project of national natural science foundation of china","doi-asserted-by":"publisher","award":["61601214"],"award-info":[{"award-number":["61601214"]}],"id":[{"id":"10.13039\/100014717","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10044-022-01096-x","type":"journal-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T14:02:48Z","timestamp":1659708168000},"page":"123-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Separable robust data hiding in encrypted image based on continuous quadrant tree and 2Bin N-nary"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5029-7461","authenticated-orcid":false,"given":"Shi","family":"Hui","sequence":"first","affiliation":[]},{"given":"Hu","family":"Baoyue","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Meihan","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yanni","sequence":"additional","affiliation":[]},{"given":"Ren","family":"Yonggong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,5]]},"reference":[{"key":"1096_CR1","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"P NiZ","year":"2006","unstructured":"NiZ P, ShiY Q, AnsariN SuW (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"1096_CR2","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"HuYC TsaiP","year":"2009","unstructured":"TsaiP HuYC, YehH L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129\u20131143","journal-title":"Signal Process"},{"key":"1096_CR3","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"M ZhangW","year":"2013","unstructured":"ZhangW M, HuX C, LiX L, YuN H (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22:2775\u20132785","journal-title":"IEEE Trans Image Process"},{"key":"1096_CR4","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1109\/TIP.2016.2549458","volume":"25","author":"C DragoiI","year":"2016","unstructured":"DragoiI C, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25:2420\u20132422","journal-title":"IEEE Trans Image Process"},{"key":"1096_CR5","first-page":"2016","volume":"10","author":"X Li","year":"2017","unstructured":"Li X, Zhang W, Gui X, Yang B (2017) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forens. Secur 10:2016\u20132027","journal-title":"IEEE Trans. Inf. Forens. Secur"},{"key":"1096_CR6","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.sigpro.2019.02.013","volume":"159","author":"X WangJ","year":"2019","unstructured":"WangJ X, MaoN X, ChenX NQ, WangC T, ShiY Q (2019) Multiple histograms based reversible data hiding by using FCM clustering. Signal Process 159:193\u2013203","journal-title":"Signal Process"},{"key":"1096_CR7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ins.2020.10.063","volume":"549","author":"W WengS","year":"2021","unstructured":"WengS W, TanW QuB, PanJ S (2021) Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm. Inf Sci 549:13\u201333","journal-title":"Inf Sci"},{"key":"1096_CR8","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.sigpro.2016.07.002","volume":"130","author":"LiY LiM","year":"2017","unstructured":"LiM LiY (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190\u2013196","journal-title":"Signal Process"},{"key":"1096_CR9","doi-asserted-by":"publisher","first-page":"60635","DOI":"10.1109\/ACCESS.2018.2876036","volume":"6","author":"Z XiongL","year":"2018","unstructured":"XiongL Z, DongD P, XiaZ H, ChenX Y (2018) High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption. IEEE Access 6:60635\u201360644","journal-title":"IEEE Access"},{"key":"1096_CR10","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1109\/TCSVT.2008.918843","volume":"18","author":"S Xiang","year":"2008","unstructured":"Xiang S, Kim HJ, Huang J (2008) Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Trans Circ Syst Video Technol 18:777\u2013790","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"1096_CR11","first-page":"153","volume":"1","author":"GB ChenD","year":"2010","unstructured":"ChenD GB, PengH AL, FengJ J (2010) Histogram modification based robust image watermarking approach. Int J Multimedia Intell Secur 1:153\u2013168","journal-title":"Int J Multimedia Intell Secur"},{"key":"1096_CR12","doi-asserted-by":"publisher","first-page":"3256","DOI":"10.1016\/j.sigpro.2010.05.032","volume":"90","author":"B GaoX","year":"2010","unstructured":"GaoX B, TaoD C, LiX L (2010) Local histogram based geometric invariant image watermarking. Signal Process 90:3256\u20133264","journal-title":"Signal Process"},{"key":"1096_CR13","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s11045-013-0257-0","volume":"26","author":"S HeX","year":"2015","unstructured":"HeX S, ZhuT YB (2015) A geometrical attack resistant image watermarking algorithm based on histogram modification. Multidimension Syst Signal Process 26:291\u2013306","journal-title":"Multidimension Syst Signal Process"},{"key":"1096_CR14","first-page":"92","volume":"48","author":"JJ Wang","year":"2020","unstructured":"Wang JJ, LiG Y, XiaG E, SunZ R (2020) A separable and reversible data hiding algorithm in encrypted domain based on image interpolation space. Acta Electron Sin 48:92\u2013100","journal-title":"Acta Electron Sin"},{"key":"1096_CR15","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1049\/cje.2017.09.025","volume":"26","author":"S Wang","year":"2017","unstructured":"Wang S, Cui C, Niu XM (2017) A novel DIBR 3D image watermarking algorithm resist to geometrical attacks. Chin J Electron 26:1184\u20131193","journal-title":"Chin J Electron"},{"key":"1096_CR16","first-page":"531","volume":"48","author":"Z Yue","year":"2020","unstructured":"Yue Z, Li ZC, Yang XY, You FC, Liu FP (2020) A histogram-based 2Bin M-ary image digital watermarking algorithm. Acta Electron Sin 48:531\u2013537","journal-title":"Acta Electron Sin"},{"key":"1096_CR17","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","volume":"25","author":"TR Zong","year":"2015","unstructured":"Zong TR, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 25:717\u2013729","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"1096_CR18","first-page":"275","volume-title":"Improved algorithms for robust histogram shape-based image watermarking. International Workshop on Digital Watermarking","author":"BW Feng","year":"2017","unstructured":"Feng BW, Weng J, Lu W (2017) Improved algorithms for robust histogram shape-based image watermarking. International Workshop on Digital Watermarking. Springer, Berlin, pp 275\u2013289"},{"key":"1096_CR19","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1186\/s13640-018-0386-3","volume":"1","author":"HL Pan","year":"2018","unstructured":"Pan HL, Lei YM, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP J Image Video Process 1:142\u2013152","journal-title":"EURASIP J Image Video Process"},{"issue":"3","key":"1096_CR20","first-page":"1627","volume":"14","author":"M Dua","year":"2022","unstructured":"Dua M, Kumar A, Garg A (2022) Multiple image encryption approach using non linear chaotic map and cosine transformation. Int J Inf Technol 14(3):1627\u20131641","journal-title":"Int J Inf Technol"},{"issue":"3","key":"1096_CR21","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.protcy.2013.12.161","volume":"11","author":"SM Wadi","year":"2013","unstructured":"Wadi SM, Zainal N (2013) Rapid encryption method based on AES algorithm for grey scale HD image encryption. Procedia Technol 11(3):51\u201356","journal-title":"Procedia Technol"},{"issue":"6","key":"1096_CR22","doi-asserted-by":"publisher","first-page":"2647","DOI":"10.1007\/s11042-020-09828-z","volume":"80","author":"JJ Wu","year":"2021","unstructured":"Wu JJ, Liu ZJ, Wang JC (2021) A compact image encryption system based on Arnold transformation. Multimedia Tools Appl 80(6):2647\u20132661","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"1096_CR23","doi-asserted-by":"publisher","DOI":"10.1117\/1.2931495","volume":"17","author":"G Zhu","year":"2008","unstructured":"Zhu G, Zhang X (2008) Mixed image element encryption algorithm based on an elliptic curve cryptosystem. J Electron Imaging 17(2):023007","journal-title":"J Electron Imaging"},{"key":"1096_CR24","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/s00340-019-7286-9","volume":"125","author":"X Yuan","year":"2019","unstructured":"Yuan X, Zhang LH, Chen J (2019) Multiple-image encryption scheme based on ghost imaging of Hadamard matrix and spatial multiplexing. Appl Phys B 125:174","journal-title":"Appl Phys B"},{"issue":"10","key":"1096_CR25","doi-asserted-by":"publisher","first-page":"1850124","DOI":"10.1142\/S0217984918501245","volume":"32","author":"XP Lv","year":"2018","unstructured":"Lv XP, Liao XF, Yang B (2018) Bit-level plane image encryption based on coupled map lattice with timevarying delay. Mod Phys Lett B 32(10):1850124","journal-title":"Mod Phys Lett B"},{"issue":"7","key":"1096_CR26","doi-asserted-by":"publisher","first-page":"8759","DOI":"10.1007\/s11042-017-4772-0","volume":"77","author":"ZH Gan","year":"2018","unstructured":"Gan ZH, Chai XL, Yuan K (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77(7):8759\u20138783","journal-title":"Multimed Tools Appl"},{"key":"1096_CR27","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.optlaseng.2018.11.010","volume":"115","author":"X Wang","year":"2019","unstructured":"Wang X, Li Z (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107\u2013118","journal-title":"Opt Lasers Eng"},{"key":"1096_CR28","doi-asserted-by":"publisher","first-page":"11655","DOI":"10.1007\/s11042-020-10202-2","volume":"80","author":"XY Wang","year":"2021","unstructured":"Wang XY, Lin SJ, Li Y (2021) Bit-level image encryption algorithm based on BP neural network and gray code. Multimedia Tools Appl 80:11655\u201311670","journal-title":"Multimedia Tools Appl"},{"key":"1096_CR29","first-page":"533","volume":"13","author":"N Nandy","year":"2021","unstructured":"Nandy N, Banerjee D, Pradhan C (2021) Color image encryption using DNA based cryptography. Int J Inf Technol 13:533\u2013540","journal-title":"Int J Inf Technol"},{"key":"1096_CR30","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/s11071-018-4573-7","volume":"95","author":"S Hanis","year":"2019","unstructured":"Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:421\u2013432","journal-title":"Nonlinear Dyn"},{"key":"1096_CR31","unstructured":"The USC-SIPI image database [Online] (2016) http:\/\/sipi.usc.edu\/database\/ ."},{"key":"1096_CR32","unstructured":"UCID-uncompressed colour image database [Online] (2016) http:\/\/homepages.lboro.ac.uk\/cogs\/datasets\/UCID\/ucid.html."},{"key":"1096_CR33","unstructured":"Kodak lossless true color image suite [Online] (2016) http:\/\/r0k.us\/graphics\/kodak\/ ."}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-022-01096-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-022-01096-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-022-01096-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T03:18:05Z","timestamp":1675480685000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-022-01096-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,5]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["1096"],"URL":"https:\/\/doi.org\/10.1007\/s10044-022-01096-x","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"type":"print","value":"1433-7541"},{"type":"electronic","value":"1433-755X"}],"subject":[],"published":{"date-parts":[[2022,8,5]]},"assertion":[{"value":"28 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}