{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,5]],"date-time":"2023-03-05T12:10:47Z","timestamp":1678018247525},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T00:00:00Z","timestamp":1535587200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6598-9","type":"journal-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T00:58:51Z","timestamp":1535590731000},"page":"9827-9843","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain"],"prefix":"10.1007","volume":"78","author":[{"given":"Lisha","family":"Ma","sequence":"first","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shihong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,30]]},"reference":[{"key":"6598_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad M, AlSharari HD (2017) On the security of chaos-based watermarking scheme for secure communication. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, p 313\u20133212","DOI":"10.1007\/978-981-10-3153-3_31"},{"key":"6598_CR2","unstructured":"Bouslimi D, Bellafqira R, Coatrieux G (2016) Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains. Engineering in Medicine & Biology Society. Conf Proc IEEE Eng Med Biol Soc 2016:2496"},{"key":"6598_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.compbiomed.2015.07.024","volume":"65","author":"L Chen","year":"2016","unstructured":"Chen L, Wang S (2016) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69\u201375","journal-title":"Comput Biol Med"},{"issue":"5","key":"6598_CR4","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"YC Chen","year":"2014","unstructured":"Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25(5):1164\u20131170","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"6598_CR5","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s11071-016-3153-y","volume":"87","author":"L Chen","year":"2017","unstructured":"Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dynamics 87(3):1797\u20131807","journal-title":"Nonlinear Dynamics"},{"key":"6598_CR6","first-page":"1","volume":"5","author":"F Di","year":"2017","unstructured":"Di F, Huang F, Zhang M, Liu J (2017) Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding. Multimedia Tools & Applications 5:1\u201319","journal-title":"Multimedia Tools & Applications"},{"key":"6598_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jvcir.2015.03.009","volume":"30","author":"J Guo","year":"2015","unstructured":"Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125\u2013135","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"6598_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199\u2013202","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"6598_CR9","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.sigpro.2010.09.014","volume":"91","author":"C Li","year":"2011","unstructured":"Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91(4):949\u2013954","journal-title":"Signal Process"},{"issue":"3","key":"6598_CR10","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.image.2008.01.003","volume":"23","author":"S Li","year":"2008","unstructured":"Li S, Li C, Chen G, Bourbakis NG, Lo KT (2008) A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 23(3):212\u2013223","journal-title":"Signal Process Image Commun"},{"issue":"8","key":"6598_CR11","first-page":"553","volume":"3","author":"K Ma","year":"2014","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2014) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics & Security 3(8):553\u2013562","journal-title":"IEEE Transactions on Information Forensics & Security"},{"issue":"1","key":"6598_CR12","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.image.2013.09.001","volume":"29","author":"SY Ong","year":"2014","unstructured":"Ong SY, Wong KS, Tanaka K (2014) A scalable reversible data embedding method with progressive quality degradation functionality. Signal Process Image Commun 29(1):135\u2013149","journal-title":"Signal Process Image Commun"},{"issue":"11","key":"6598_CR13","doi-asserted-by":"publisher","first-page":"1672","DOI":"10.1109\/LSP.2016.2585580","volume":"23","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhang X (2016) Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Processing Letters 23(11):1672\u20131676","journal-title":"IEEE Signal Processing Letters"},{"issue":"5","key":"6598_CR14","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Transactions on Multimedia 16(5):1486\u20131491","journal-title":"IEEE Transactions on Multimedia"},{"issue":"21","key":"6598_CR15","doi-asserted-by":"publisher","first-page":"13749","DOI":"10.1007\/s11042-015-2760-9","volume":"75","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhang X, Ren Y, Feng G (2016) Block cipher based separable reversible data hiding in encrypted images. Multimedia Tools & Applications 75(21):13749\u201313763","journal-title":"Multimedia Tools & Applications"},{"issue":"4","key":"6598_CR16","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1109\/TIP.2014.2302681","volume":"23","author":"RM Rad","year":"2014","unstructured":"Rad RM, Wong K, Guo JM (2014) A unified data embedding and scrambling method. IEEE Trans Image Process 23(4):1463\u20131475","journal-title":"IEEE Trans Image Process"},{"key":"6598_CR17","first-page":"1","volume":"8","author":"SH Shin","year":"2017","unstructured":"Shin SH, Jung KH (2017) Reversible data hiding method using meaningful encrypted images. Multimedia Tools & Applications 8:1\u201317","journal-title":"Multimedia Tools & Applications"},{"key":"6598_CR18","doi-asserted-by":"crossref","unstructured":"Topak E, Voloshynovskiy S, Koval O, Mihcak MK, Pun T (2005) Security analysis of robust data-hiding with geometrically structured codebooks. In Security, Steganography, and Watermarking of Multimedia Contents VII, International Society for Optics and Photonics 5681:709\u2013721","DOI":"10.1117\/12.586278"},{"key":"6598_CR19","unstructured":"Wang X, Han X, Xi J, Wang S (2016) Reversible data hiding in encrypted image with separable data extraction from image decryption. Multimedia Tools & Applications 2016:1\u201316"},{"issue":"7","key":"6598_CR20","doi-asserted-by":"publisher","first-page":"9265","DOI":"10.1007\/s11042-016-3532-x","volume":"76","author":"D Xiao","year":"2017","unstructured":"Xiao D, Chang Y, Xiang T, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimedia Tools and Applications 76(7):9265\u20139296","journal-title":"Multimedia Tools and Applications"},{"key":"6598_CR21","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.sigpro.2016.10.017","volume":"133","author":"S Yi","year":"2017","unstructured":"Yi S, Zhou Y (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40\u201351","journal-title":"Signal Process"},{"issue":"3","key":"6598_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-016-4049-z","volume":"76","author":"Z Yin","year":"2017","unstructured":"Yin Z, Abel A, Tang J, Zhang X (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools & Applications 76(3):1\u201322","journal-title":"Multimedia Tools & Applications"},{"issue":"4","key":"6598_CR23","first-page":"255","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 18(4):255\u2013258","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"6598_CR24","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7(2):826\u2013832","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"6598_CR25","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94(1):118\u2013127","journal-title":"Signal Process"},{"issue":"9","key":"6598_CR26","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TCSVT.2015.2433194","volume":"26","author":"X Zhang","year":"2016","unstructured":"Zhang X, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits & Systems for Video Technology 26(9):1622\u20131631","journal-title":"IEEE Transactions on Circuits & Systems for Video Technology"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6598-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6598-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6598-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T19:33:29Z","timestamp":1567107209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6598-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,30]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6598"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6598-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,30]]},"assertion":[{"value":"24 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}