{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,11,16]],"date-time":"2022-11-16T17:34:30Z","timestamp":1668620070301},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:00:00Z","timestamp":1624665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T00:00:00Z","timestamp":1624665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-11122-5","type":"journal-article","created":{"date-parts":[[2021,6,26]],"date-time":"2021-06-26T01:02:15Z","timestamp":1624669335000},"page":"29453-29479","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["High-capacity reversible data hiding using quotient multi pixel value differencing scheme in encrypted images by fuzzy based encryption"],"prefix":"10.1007","volume":"80","author":[{"given":"Asha","family":"Jose","sequence":"first","affiliation":[]},{"given":"Kamalraj","family":"Subramanian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,26]]},"reference":[{"key":"11122_CR1","doi-asserted-by":"publisher","first-page":"123687","DOI":"10.1016\/j.physa.2019.123687","volume":"541","author":"AA Abd El-Latif","year":"2020","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Elseuofi S, Khalifa HS, Alghamdi AS, Polat K, Amin M (2020) Secret images transfer in cloud system based on investigating quantum walks in steganography approaches. Physica A Stat Mech Appl 541:123687","journal-title":"Physica A Stat Mech Appl"},{"key":"11122_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad J, Larijani H, Emmanuel R, Mannion M (2018) Secure occupancy monitoring system for iot using lightweight intertwining logistic map. In 2018 10th computer science and electronic engineering (CEEC), IEEE 208-213.","DOI":"10.1109\/CEEC.2018.8674208"},{"issue":"1","key":"11122_CR3","doi-asserted-by":"publisher","DOI":"10.1117\/1.3360179","volume":"19","author":"M Amin","year":"2010","unstructured":"Amin M, Abd El-Latif AA (2010) Efficient modified RC5 based on chaos adapted to image encryption. J Electron Imaging 19(1):013012","journal-title":"J Electron Imaging"},{"issue":"1","key":"11122_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.32604\/jihpp.2019.06043","volume":"1","author":"L Bai","year":"2019","unstructured":"Bai L, Liu Y, Wang X, Patterson N, Jiang F (2019) A survey on cryptographic security and information hiding technology for cloud or fog-based IoT system. Journal of Information Hiding and Privacy Protection 1(1):1\u201310","journal-title":"Journal of Information Hiding and Privacy Protection"},{"key":"11122_CR5","doi-asserted-by":"crossref","unstructured":"Belazi A, Abd El-Latif AA, Rhouma R, Belghith S (2015) Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. In 2015 international wireless communications and mobile computing conference (IWCMC), IEEE 606-610.","DOI":"10.1109\/IWCMC.2015.7289152"},{"issue":"14","key":"11122_CR6","doi-asserted-by":"publisher","first-page":"8695","DOI":"10.1007\/s11042-015-2786-z","volume":"75","author":"O Benrhouma","year":"2016","unstructured":"Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695\u20138718","journal-title":"Multimed Tools Appl"},{"key":"11122_CR7","doi-asserted-by":"crossref","unstructured":"Caviglione L, Merlo A, Migliardi M (2018) Covert channels in IoT deployments through data hiding techniques. In 2018 32nd international conference on advanced information networking and applications workshops (WAINA), IEEE, 559-563","DOI":"10.1109\/WAINA.2018.00144"},{"issue":"22","key":"11122_CR8","doi-asserted-by":"publisher","first-page":"31441","DOI":"10.1007\/s11042-019-07946-x","volume":"78","author":"K Chen","year":"2019","unstructured":"Chen K, Chang CC (2019) Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multimed Tools Appl 78(22):31441\u201331465","journal-title":"Multimed Tools Appl"},{"key":"11122_CR9","doi-asserted-by":"publisher","first-page":"102744","DOI":"10.1016\/j.jvcir.2019.102744","volume":"66","author":"B Guan","year":"2020","unstructured":"Guan B, Xu D (2020) An efficient high-capacity reversible data hiding scheme for encrypted images. J Vis Commun Image Represent 66:102744","journal-title":"J Vis Commun Image Represent"},{"key":"11122_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2019.02.008","volume":"153","author":"J Hao","year":"2019","unstructured":"Hao J, Huang C, Ni J, Rong H, Xian M, Shen XS (2019) Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput Netw 153:1\u201310","journal-title":"Comput Netw"},{"issue":"9","key":"11122_CR11","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.3390\/s20092739","volume":"20","author":"J-H Horng","year":"2020","unstructured":"Horng J-H, Xu S, Chang C-C, Chang C-C (2020) An efficient data-hiding scheme based on multidimensional mini-SuDoKu. Sensors 20(9):2739","journal-title":"Sensors"},{"issue":"1\u20132","key":"11122_CR12","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1007\/s11042-019-07874-w","volume":"79","author":"C Jiang","year":"2020","unstructured":"Jiang C, Pang Y (2020) Encrypted images-based reversible data hiding in Paillier cryptosystem. Multimed Tools Appl 79(1\u20132):693\u2013711","journal-title":"Multimed Tools Appl"},{"key":"11122_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ijinfomgt.2018.09.008","volume":"45","author":"JA Kaw","year":"2019","unstructured":"Kaw JA, Loan NA, Parah SA, Muhammad K, Sheikh JA, Bhat GM (2019) A reversible and secure patient information hiding system for IoT driven e-health. Int J Inf Manag 45:262\u2013275","journal-title":"Int J Inf Manag"},{"key":"11122_CR14","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/j.procs.2019.11.057","volume":"160","author":"A Kovalchuk","year":"2019","unstructured":"Kovalchuk A, Izonin I, Kustra N (2019) Information protection service using topological image coverage. Procedia Comput Sci 160:503\u2013508","journal-title":"Procedia Comput Sci"},{"key":"11122_CR15","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.procs.2019.11.059","volume":"160","author":"A Kovalchuk","year":"2019","unstructured":"Kovalchuk A, Izonin I, Lotoshynska N (2019) An approach towards image encryption and decryption using quaternary fractional-linear operations. Procedia Comput Sci 160:491\u2013496","journal-title":"Procedia Comput Sci"},{"key":"11122_CR16","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.procs.2019.11.043","volume":"160","author":"A Kovalchuk","year":"2019","unstructured":"Kovalchuk A, Izonin I, Riznyk O (2019) An efficient image encryption scheme using projective transformations. Procedia Comput Sci 160:584\u2013589","journal-title":"Procedia Comput Sci"},{"key":"11122_CR17","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1016\/j.procs.2019.08.089","volume":"155","author":"A Kovalchuk","year":"2019","unstructured":"Kovalchuk A, Lotoshynska N, Izonin I, Berezko L (2019) An approach towards an efficient encryption-decryption of grayscale and color images. Procedia Comput Sci 155:630\u2013635","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"11122_CR18","doi-asserted-by":"publisher","first-page":"2719","DOI":"10.1007\/s11042-019-08295-5","volume":"79","author":"X Liang","year":"2020","unstructured":"Liang X, Tan X, Tao L (2020) Plaintext related image hybrid encryption scheme using algebraic interpolation and generalized chaotic map. Multimed Tools Appl 79(3):2719\u20132743","journal-title":"Multimed Tools Appl"},{"key":"11122_CR19","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.dam.2016.06.028","volume":"241","author":"S Liu","year":"2018","unstructured":"Liu S, Rho S, Jifara W, Jiang F, Liu C (2018) A hybrid framework of data hiding and encryption in H. 264\/SVC. Discret Appl Math 241:48\u201357","journal-title":"Discret Appl Math"},{"issue":"3","key":"11122_CR20","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inform Forens Secur 8(3):553\u2013562","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"11122_CR21","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.procs.2020.04.103","volume":"171","author":"VM Manikandan","year":"2020","unstructured":"Manikandan VM, Bini AA (2020) An improved reversible data hiding through encryption scheme with block prechecking. Procedia Comput Sci 171:951\u2013958","journal-title":"Procedia Comput Sci"},{"key":"11122_CR22","unstructured":"Ntahobari M (2018) Enhancing image-based data hiding method using reduced difference expansion and difference integer transform (Doctoral dissertation, Institut Teknologi Sepuluh Nopember)"},{"key":"11122_CR23","doi-asserted-by":"crossref","unstructured":"Puteaux P, Puech W (2020) A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Trans Multimed","DOI":"10.1109\/TMM.2020.2985537"},{"issue":"5","key":"11122_CR24","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimed 16(5):1486\u20131491","journal-title":"IEEE Trans Multimed"},{"key":"11122_CR25","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","volume":"31","author":"C Qin","year":"2015","unstructured":"Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154\u2013164","journal-title":"J Vis Commun Image Represent"},{"key":"11122_CR26","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2019.03.008","volume":"487","author":"C Qin","year":"2019","unstructured":"Qin C, Qian X, Hong W, Zhang X (2019) An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf Sci 487:176\u2013192","journal-title":"Inf Sci"},{"key":"11122_CR27","doi-asserted-by":"publisher","first-page":"107288","DOI":"10.1016\/j.sigpro.2019.107288","volume":"167","author":"Y Qiu","year":"2020","unstructured":"Qiu Y, Qian Z, Zeng H, Lin X, Zhang X (2020) Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process 167:107288","journal-title":"Signal Process"},{"issue":"1","key":"11122_CR28","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1118\/1.2400624","volume":"34","author":"M Rosu","year":"2007","unstructured":"Rosu M, Balter JM, Chetty IJ, Kessler ML, McShan DL, Balter P, Haken RKT (2007) How extensive of a 4D dataset is needed to estimate cumulative dose distribution plan evaluation metrics in conformal lung therapy? A. Med Phys 34(1):233\u2013245","journal-title":"Med Phys"},{"key":"11122_CR29","doi-asserted-by":"crossref","unstructured":"Sharma S, Singh S (2019) An analysis of reversible data hiding algorithms for encrypted domain. In 2019 third international conference on I-SMAC (IoT in social, Mobile, analytics and cloud) (I-SMAC), IEEE, 644-648","DOI":"10.1109\/I-SMAC47947.2019.9032554"},{"issue":"16","key":"11122_CR30","doi-asserted-by":"publisher","first-page":"20535","DOI":"10.1007\/s11042-017-5446-7","volume":"77","author":"H Shi","year":"2018","unstructured":"Shi H, Liu D, Lu H, Zhou C (2018) A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multimed Tools Appl 77(16):20535\u201320567","journal-title":"Multimed Tools Appl"},{"key":"11122_CR31","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ins.2017.08.077","volume":"422","author":"P Singh","year":"2018","unstructured":"Singh P, Raman B (2018) Reversible data hiding based on Shamir\u2019s secret sharing for color images over cloud. Inf Sci 422:77\u201397","journal-title":"Inf Sci"},{"key":"11122_CR32","doi-asserted-by":"crossref","unstructured":"Sun YX, Li Q, Yan B, Pan JS, Yang HM (2020) Reversible data hiding in dual encrypted halftone images using matrix embedding. Multimedia Tools Appl 1-24","DOI":"10.3390\/app9245311"},{"key":"11122_CR33","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.ins.2019.10.070","volume":"515","author":"N Tsafack","year":"2020","unstructured":"Tsafack N, Kengne J, Abd-El-Atty B, Iliyasu AM, Hirota K, Abd EL-Latif AA (2020) Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf Sci 515:191\u2013217","journal-title":"Inf Sci"},{"key":"11122_CR34","doi-asserted-by":"crossref","unstructured":"Wang Y, Cai Z, He W (2020) High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Trans Multimed","DOI":"10.1007\/s11042-021-11143-0"},{"key":"11122_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jvcir.2017.02.001","volume":"45","author":"D Xiao","year":"2017","unstructured":"Xiao D, Xiang Y, Zheng H, Wang Y (2017) Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J Vis Commun Image Represent 45:1\u201310. https:\/\/doi.org\/10.1016\/j.jvcir.2017.02.001","journal-title":"J Vis Commun Image Represent"},{"issue":"9","key":"11122_CR36","doi-asserted-by":"publisher","first-page":"3231","DOI":"10.1007\/s11042-013-1784-2","volume":"74","author":"X Yan","year":"2015","unstructured":"Yan X, Wang S, Abd El-Latif AA, Niu X (2015) Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multimed Tools Appl 74(9):3231\u20133252","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"11122_CR37","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s11760-013-0465-y","volume":"9","author":"X Yan","year":"2015","unstructured":"Yan X, Wang S, Abd El-Latif AA, Niu X (2015) New approaches for efficient information hiding-based secret image sharing schemes. SIViP 9(3):499\u2013510","journal-title":"SIViP"},{"key":"11122_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-020-00502-w","volume":"2020","author":"M Yu","year":"2020","unstructured":"Yu M, Liu Y, Sun H, Yao H, Qiao T (2020) Adaptive and separable multiary reversible data hiding in encryption domain. EURASIP Journal on Image and Video Processing 2020:1\u201315","journal-title":"EURASIP Journal on Image and Video Processing"},{"issue":"4","key":"11122_CR39","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255\u2013258","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"11122_CR40","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inform Forens Secur 7(2):826\u2013832","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"7","key":"11122_CR41","first-page":"217","volume":"9","author":"T Zhang","year":"2015","unstructured":"Zhang T, El-Fatyany A, Li L, Amin M, El-Latif AAA (2015) Secret sharing-based chaotic image encryption. Int J Secur Appl 9(7):217\u2013224","journal-title":"Int J Secur Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11122-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11122-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11122-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T18:15:36Z","timestamp":1629396936000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11122-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,26]]},"references-count":41,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["11122"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11122-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,26]]},"assertion":[{"value":"28 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}