{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:48Z","timestamp":1740122868051,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2018,2,3]],"date-time":"2018-02-03T00:00:00Z","timestamp":1517616000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Project Supported by Graduate Student Research and Innovation Foundation of Chongqing","award":["CYB17026"],"award-info":[{"award-number":["CYB17026"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572089,61633005","61472464"],"award-info":[{"award-number":["61572089,61633005","61472464"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Chongqing Science and Technology Commission","award":["cstc2017jcyjBX0008, cstc2014jcyjA40030, cstc2015jcyjA40039"],"award-info":[{"award-number":["cstc2017jcyjBX0008, cstc2014jcyjA40030, cstc2015jcyjA40039"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["106112017CDJQJ188830, 106112017CDJXY180005, 106112014CDJZR185501"],"award-info":[{"award-number":["106112017CDJQJ188830, 106112017CDJXY180005, 106112014CDJZR185501"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11042-018-5726-x","type":"journal-article","created":{"date-parts":[[2018,2,3]],"date-time":"2018-02-03T16:08:03Z","timestamp":1517674083000},"page":"23949-23968","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6958-5807","authenticated-orcid":false,"given":"Di","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Juan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Mengdi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,3]]},"reference":[{"key":"5726_CR1","unstructured":"Al-Otaibi NA, Gutub AA (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies, pp 250\u2013256"},{"key":"5726_CR2","doi-asserted-by":"crossref","unstructured":"Al-Otaibi NA, Gutub AA-A (2014) 2-leyer security system for hiding sensitive text data on personal computers. In: Proceeding of the 3rd international conference on advancements in information technology (ICAIT), pp 73\u201379","DOI":"10.12720\/lnit.2.2.151-157"},{"key":"5726_CR3","unstructured":"Alotaibi N, Gutub A, Khan E (2015) Stego-system for hiding text in images of personal computers. The 12th Learning and Technology Conference: Wearable Tech\/Wearable Learning, pp 12\u201313"},{"issue":"24","key":"5726_CR4","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MSP.2007.4286571","volume":"4","author":"RG Baraniuk","year":"2007","unstructured":"Baraniuk RG (2007) Compressive Sensing [Lecture Notes]. IEEE Signal Process Mag 4(24):118\u2013121","journal-title":"IEEE Signal Process Mag"},{"issue":"12","key":"5726_CR5","doi-asserted-by":"publisher","first-page":"5406","DOI":"10.1109\/TIT.2006.885507","volume":"52","author":"EJ Candes","year":"2006","unstructured":"Candes EJ, Tao T (2006) Near-optimal signal recovery from random projections: Universal encoding strategies. IEEE Trans Inf Theory 52(12):5406\u20135425","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"5726_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSP.2007.914731","volume":"25","author":"EJ Cand\u00e8s","year":"2008","unstructured":"Cand\u00e8s EJ, Wakin MB (2008) An introduction to compressive sampling. IEEE Signal Process Mag 25(2):21\u201330","journal-title":"IEEE Signal Process Mag"},{"issue":"2","key":"5726_CR7","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TIT.2005.862083","volume":"52","author":"EJ Cand\u00e8s","year":"2006","unstructured":"Cand\u00e8s EJ, Romberg J, Tao T (2006) Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information. IEEE Trans Inf Theory 52(2):489\u2013509","journal-title":"IEEE Trans Inf Theory"},{"issue":"13","key":"5726_CR8","first-page":"98","volume":"35","author":"GF Chen","year":"2012","unstructured":"Chen GF, Guo SX, Yang LI, Liang LI (2012) Digital image watermark algorithm based on compressive sensing. Modern Electronics Technique 35(13):98\u2013101","journal-title":"Modern Electronics Technique"},{"issue":"1\u20132","key":"5726_CR9","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1504\/IJAHUC.2015.067788","volume":"18","author":"RJ Chen","year":"2015","unstructured":"Chen RJ, Horng SJ, Huang PH (2015) Anti\u2013forensic steganography using multi\u2013bit MER with flexible bit location. Int J Ad Hoc Ubiquitous Comput. 18(1\u20132):54\u201366","journal-title":"Int J Ad Hoc Ubiquitous Comput."},{"issue":"4","key":"5726_CR10","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1109\/TSMCA.2012.2223670","volume":"43","author":"J Cui","year":"2013","unstructured":"Cui J, Liu Y, Xu Y, Zhao H, Zha H (2013) Tracking generic human motion via fusion of low-and high-dimensional approaches. IEEE transactions on systems, man, and cybernetics: systems 43(4):996\u20131002","journal-title":"IEEE transactions on systems, man, and cybernetics: systems"},{"issue":"1","key":"5726_CR11","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/TSP.2011.2170977","volume":"60","author":"TT Do","year":"2011","unstructured":"Do TT, Gan L, Nguyen NH, Tran TD (2011) Fast and efficient compressive sensing using structurally random matrices. IEEE Trans Signal Process 60(1):139\u2013154","journal-title":"IEEE Trans Signal Process"},{"key":"5726_CR12","unstructured":"Dong J, Li J, Guo Z (2016) A Robust Watermarking Algorithm for Medical Images in the Encrypted Domain. International Conference on Smart Health, pp 217\u2013229"},{"issue":"4","key":"5726_CR13","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/JSTSP.2007.910281","volume":"1","author":"MAT Figueiredo","year":"2007","unstructured":"Figueiredo MAT, Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: application to compressed sensing and other inverse problems. IEEE J Sel Top Sign Proces 1(4):586\u2013597","journal-title":"IEEE J Sel Top Sign Proces"},{"key":"5726_CR14","unstructured":"Gutub AA-A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence. 2(1):56\u201364"},{"issue":"4","key":"5726_CR15","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199\u2013202","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"5726_CR16","first-page":"275","volume":"5","author":"HC Huang","year":"2014","unstructured":"Huang HC, Chang FC (2014) Robust image watermarking based on compressed sensing techniques. Journal of Information Hiding and Multimedia Signal Processing 5(2):275\u2013285","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"5726_CR17","unstructured":"Khan F, Gutub AA-A (2007) Message concealment techniques using image based steganography. In: Proceeding of 4th IEEE GCC conference and exhibition, gulf international convention centre, Manamah, Bahrain, 11\u201314 November, pp 1\u20136"},{"key":"5726_CR18","doi-asserted-by":"publisher","unstructured":"Kim C, Shin D, Leng L, Yang CN (2016) Lossless data hiding for absolute moment block truncation coding using histogram modification. Journal of Real-Time Image Processing. https:\/\/doi.org\/10.1007\/s11554-016-0641-8","DOI":"10.1007\/s11554-016-0641-8"},{"issue":"17","key":"5726_CR19","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of Physical Sciences 5(17):2543\u20132554","journal-title":"International Journal of Physical Sciences"},{"key":"5726_CR20","first-page":"467","volume":"2010","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. International Conference on Information and Communication Technology Convergence 2010:467\u2013471","journal-title":"International Conference on Information and Communication Technology Convergence"},{"issue":"9","key":"5726_CR21","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.neucom.2013.10.005","volume":"131","author":"L Leng","year":"2014","unstructured":"Leng L, Teoh ABJ, Li M, Khan MK (2014) Analysis of correlation of 2dpalmhash code and orientation range suitable for transposition. Neurocomputing 131(9):377\u2013387","journal-title":"Neurocomputing"},{"key":"5726_CR22","doi-asserted-by":"crossref","unstructured":"Li W, Pan JS, Yan L, Yang CS (2013) Data hiding based on subsampling and compressive sensing. Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 9191\u20139205","DOI":"10.1109\/IIH-MSP.2013.157"},{"key":"5726_CR23","unstructured":"Liu Y, Nie L, Han L, Zhang L, Rosenblum DS (2015) Action2Activity: Recognizing Complex Activities from Sensor Data. In: Proceedings of the International Joint Conference on Artificial Intelligence, pp 1617\u20131623"},{"key":"5726_CR24","doi-asserted-by":"crossref","unstructured":"Liu L, Cheng L, Liu Y, Jia Y, Rosenblum DS (2016) Recognizing complex activities by a probabilistic interval-based model. Thirtieth AAAI Conference on Artificial Intelligence, pp 1266\u20131272","DOI":"10.1609\/aaai.v30i1.10155"},{"key":"5726_CR25","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","volume":"181","author":"Y Liu","year":"2016","unstructured":"Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: Sensor-based activity recognition. Neurocomputing 181:108\u2013115","journal-title":"Neurocomputing"},{"key":"5726_CR26","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie L, Yan, Y, Rosenblum DS (2016) Fortune Teller: Predicting Your Career Path. Thirtieth AAAI Conference on Artificial Intelligence, pp 201\u2013207","DOI":"10.1609\/aaai.v30i1.9969"},{"key":"5726_CR27","unstructured":"Liu Y, Zheng Y, Liang Y, Liu S, Rosenblum DS (2016) Urban water quality prediction based on multi-task multi-view learning. In: Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, pp 2576\u20132582"},{"key":"5726_CR28","unstructured":"Nazeer M., Kim DG (2012) An efficient data hiding technique in frequency domain by using fresnelet basis. In: Proceedings of the World Congress on Engineering, pp 1156\u20131161"},{"issue":"4","key":"5726_CR29","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/JSTSP.2007.910281","volume":"1","author":"RD Nowak","year":"2007","unstructured":"Nowak RD, Wright SJ (2007) Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems. IEEE J Sel Top Sign Proces 1(4):586\u2013597","journal-title":"IEEE J Sel Top Sign Proces"},{"issue":"1B","key":"5726_CR30","first-page":"127","volume":"38","author":"MT Parvez","year":"2011","unstructured":"Parvez MT, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering (KJSE) 38(1B):127\u2013142","journal-title":"Kuwait Journal of Science and Engineering (KJSE)"},{"key":"5726_CR31","doi-asserted-by":"crossref","unstructured":"Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images. In: Electronic Imaging, International Society for Optics and Photonics, pp 68191E-68191E","DOI":"10.1117\/12.766754"},{"issue":"2","key":"5726_CR32","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s11042-014-2344-0","volume":"75","author":"A Rani","year":"2016","unstructured":"Rani A, Raman B (2016) An image copyright protection scheme by encrypting secret data with the host image. Multimedia Tools and Applications 75(2):1027\u20131042","journal-title":"Multimedia Tools and Applications"},{"key":"5726_CR33","doi-asserted-by":"crossref","unstructured":"Subramanyam AV, Emmanuel S, Kankanhalli MS (2010) Compressed-encrypted domain JPEG2000 image watermarking. IEEE International Conference on Multimedia and Expo, pp 1315\u20131320","DOI":"10.1109\/ICME.2010.5583571"},{"issue":"14","key":"5726_CR34","doi-asserted-by":"publisher","first-page":"15191","DOI":"10.1007\/s11042-016-3744-0","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar FN, Srivastava VK (2017) A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks. Multimedia Tools and Applications 76(14):15191\u201315219","journal-title":"Multimedia Tools and Applications"},{"key":"5726_CR35","doi-asserted-by":"crossref","unstructured":"Veena VK, Lal GJ, Prabhu SV, Kumar SS, Soman KP (2012) A robust watermarking method based on Compressed Sensing and Arnold scrambling. In Machine Vision and Image Processing (MVIP), pp 105\u2013108","DOI":"10.1109\/MVIP.2012.6428771"},{"issue":"8","key":"5726_CR36","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1049\/el.2013.3806","volume":"50","author":"D Xiao","year":"2014","unstructured":"Xiao D, Chen S (2014) Separable data hiding in encrypted image based on compressive sensing. Electron Lett 50(8):598\u2013600","journal-title":"Electron Lett"},{"issue":"21","key":"5726_CR37","doi-asserted-by":"publisher","first-page":"13779","DOI":"10.1007\/s11042-015-2922-9","volume":"75","author":"D Xiao","year":"2016","unstructured":"Xiao D, Cai H, Wang Y, Bai S (2016) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimedia Tools and Applications 75(21):13779\u201313789","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"5726_CR38","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255\u2013258","journal-title":"IEEE Signal Process Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5726-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5726-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5726-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T21:55:57Z","timestamp":1660427757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5726-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,3]]},"references-count":38,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5726"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5726-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,2,3]]},"assertion":[{"value":"25 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}