{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:45:39Z","timestamp":1767141939867,"version":"build-2238731810"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-5306-5","type":"journal-article","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T05:50:13Z","timestamp":1509342613000},"page":"17285-17305","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing security and privacy of images on cloud by histogram shifting and secret sharing"],"prefix":"10.1007","volume":"77","author":[{"given":"Min-Ying","family":"Wu","sequence":"first","affiliation":[]},{"given":"Min-Chieh","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7197-9912","authenticated-orcid":false,"given":"Jenq-Shiou","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Sheng-Kai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"issue":"3.4","key":"5306_CR1","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313\u2013336","journal-title":"IBM Syst J"},{"key":"5306_CR2","doi-asserted-by":"crossref","unstructured":"Gracia-Tinedo R, Artigas MS, Moreno-Martinez A, Cotes C, and Lopez PG, (2013) \u201cActively measuring personal cloud storage,\u201d in 2013 I.E. Sixth International Conference on Cloud Computing, pp. 301-308","DOI":"10.1109\/CLOUD.2013.25"},{"key":"5306_CR3","unstructured":"Hamzaoui R and Saupe D, (2006) Fractal image compression. CRC Press, pp. 168-169"},{"issue":"13","key":"5306_CR4","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1049\/el:20080522","volume":"44","author":"Q Huynh-Thu","year":"2008","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of psnr in image\/video quality assessment. Electron Lett 44(13):800\u2013801","journal-title":"Electron Lett"},{"key":"5306_CR5","doi-asserted-by":"crossref","unstructured":"Lee SK, Suh YH, and Ho YS, (2006) \u201cReversiblee image authentication based on watermarking,\u201d in 2006 I.E. International Conference on Multimedia and Expo, pp. 1321-1324","DOI":"10.1109\/ICME.2006.262782"},{"key":"5306_CR6","doi-asserted-by":"crossref","unstructured":"Liu D, Liu W, and Zhang G, (2008) \u201cAn adaptive watermarking scheme based on nonsubsampled contourlet transform for color image authentication,\u201d in 2008 The 9th International Conference for Young Computer Scientists, pp. 748-752","DOI":"10.1109\/ICYCS.2008.61"},{"key":"5306_CR7","doi-asserted-by":"crossref","unstructured":"Ni Z, Shi Y.-Q, Ansari N, and Su W, \u201cReversible data hiding,\u201d IEEE Trans Cir and Sys for Video Technol, vol. 16, no. 3, pp. 354-362, 2006","DOI":"10.1109\/TCSVT.2006.869964"},{"issue":"11","key":"5306_CR8","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"8","key":"5306_CR9","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"4","key":"5306_CR10","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"5306_CR11","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TETC.2013.2273797","volume":"1","author":"C Wang","year":"2013","unstructured":"Wang C, Zhang B, Ren K, Roveda JM (2013) Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans Emerg Topics Comput 1(1):166\u2013177","journal-title":"IEEE Trans Emerg Topics Comput"},{"issue":"3","key":"5306_CR12","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MCOM.2014.6766088","volume":"52","author":"H Wang","year":"2014","unstructured":"Wang H, Wu S, Chen M, Wang W (2014) Security protection between users and the mobile media cloud. IEEE Commun Mag 52(3):73\u201379","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"5306_CR13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","volume":"22","author":"HT Wu","year":"2015","unstructured":"Wu HT, Dugelay JL, Shi YQ (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Process Lett 22(1):81\u201385","journal-title":"IEEE Signal Process Lett"},{"key":"5306_CR14","doi-asserted-by":"crossref","unstructured":"Zhang L, Jung T, Liu C, Ding X, Li XY, and Liu Y, (2015) \u201cPop: Privacy-preserving outsourced photo sharing and searching for mobile devices,\u201d in 2015 I.E. 35th International Conference on Distributed Computing Systems, pp. 308-317","DOI":"10.1109\/ICDCS.2015.39"},{"issue":"3","key":"5306_CR15","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCOM.2014.6766087","volume":"52","author":"L Zhou","year":"2014","unstructured":"Zhou L, Wu D, Zheng B, Guizani M (2014) Joint physical-application layer security for wireless multimedia delivery. IEEE Commun Mag 52(3):66\u201372","journal-title":"IEEE Commun Mag"}],"updated-by":[{"DOI":"10.1007\/s11042-017-5420-4","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2017,11,22]],"date-time":"2017-11-22T00:00:00Z","timestamp":1511308800000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5306-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5306-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5306-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T05:39:51Z","timestamp":1570253991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5306-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":15,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5306"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5306-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,30]]}}}