{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:55Z","timestamp":1740122875162,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872090"],"award-info":[{"award-number":["61872090"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872086"],"award-info":[{"award-number":["61872086"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11042-021-11737-8","type":"journal-article","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T12:11:07Z","timestamp":1637323867000},"page":"3693-3714","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3082-2684","authenticated-orcid":false,"given":"Tianpeng","family":"Deng","sequence":"first","affiliation":[]},{"given":"Xuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jinbo","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,19]]},"reference":[{"issue":"1","key":"11737_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"C\u201323","author":"NN Ahmed","year":"1974","unstructured":"Ahmed NN, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Transactions on Computers C\u201323(1):90\u201393","journal-title":"IEEE Transactions on Computers"},{"key":"11737_CR2","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1016\/j.future.2017.04.028","volume":"93","author":"F Amato","year":"2017","unstructured":"Amato F, Moscato V, Picariello A, Piccialli F (2017) Sos: a multimedia recommender system for online social networks. Future Generation Computer Systems 93:914\u2013923","journal-title":"Future Generation Computer Systems"},{"key":"11737_CR3","doi-asserted-by":"crossref","unstructured":"Cheng B, Zhuo L, Bai Y, Peng Y, Zhang J (2014) Secure index construction for privacy-preserving large-scale image retrieval. In: 2014 IEEE fourth international conference on big data and cloud computing. IEEE Computer Society, pp 116\u2013120","DOI":"10.1109\/BDCloud.2014.36"},{"key":"11737_CR4","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1007\/s12652-018-1158-8","volume":"11","author":"S Gull","year":"2018","unstructured":"Gull S, Loan N, Parah S, Sheikh J, Bhat G (2018) An efficient watermarking technique for tamper detection and localization of medical images. Journal of Ambient Intelligence and Humanized Computing 11:1799\u20131808","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"11737_CR5","doi-asserted-by":"crossref","unstructured":"He J, Liu B, Kong D, Bao X, Wang N, Jin H, Kesidis G (2016) PUPPIES: transformation-supported personalized privacy preserving partial image sharing. In: 46th annual IEEE\/IFIP international conference on dependable systems and networks. IEEE Computer Society, pp 359\u2013370","DOI":"10.1109\/DSN.2016.40"},{"key":"11737_CR6","doi-asserted-by":"crossref","unstructured":"Ilia P, Polakis I, Athanasopoulos E, Maggi F, Ioannidis S (2015) Face\/off: preventing privacy leakage from photos in social networks. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. ACM, pp 781\u2013792","DOI":"10.1145\/2810103.2813603"},{"key":"11737_CR7","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Information Sciences 279:251\u2013272","journal-title":"Information Sciences"},{"key":"11737_CR8","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1186\/s13638-019-1572-4","volume":"2019","author":"MR Khosravi","year":"2019","unstructured":"Khosravi MR, Samadi S (2019) Efficient payload communications for iot-enabled visar vehicles using discrete cosine transform-based quasi-sparse bit injection. EURASIP J Wirel Commun Netw 2019:262","journal-title":"EURASIP J Wirel Commun Netw"},{"issue":"4","key":"11737_CR9","doi-asserted-by":"publisher","first-page":"2603","DOI":"10.1109\/JIOT.2019.2952284","volume":"7","author":"MR Khosravi","year":"2020","unstructured":"Khosravi MR, Samadi S (2020) Reliable data aggregation in internet of visar vehicles using chained dual-phase adaptive interpolation and data embedding. IEEE Internet Things J 7(4):2603\u20132610","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"11737_CR10","doi-asserted-by":"publisher","first-page":"2513","DOI":"10.1109\/TIFS.2016.2585121","volume":"11","author":"X Liu","year":"2016","unstructured":"Liu X, Deng RH, Ding W, Lu R, Qin B (2016) Privacy-preserving outsourced calculation on floating point numbers. IEEE Transactions on Information Forensics and Security 11(11):2513\u20132527","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"6","key":"11737_CR11","doi-asserted-by":"publisher","first-page":"4219","DOI":"10.1109\/TII.2020.2995348","volume":"17","author":"S Meng","year":"2021","unstructured":"Meng S, Huang W, Yin X, Khosravi MR, Li Q, Wan S, Qi L (2021) Security-aware dynamic scheduling for real-time optimization in cloud-based industrial applications. IEEE Trans Ind Informatics 17(6):4219\u20134228","journal-title":"IEEE Trans Ind Informatics"},{"key":"11737_CR12","doi-asserted-by":"crossref","unstructured":"Mondal M, Yilmaz GS, Hirsch N, Khan MT, Tang M, Tran C, Kanich C, Ur B, Zheleva E (2019) Moving beyond set-it-and-forget-it privacy settings on social media. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security. ACM, pp 991\u20131008","DOI":"10.1145\/3319535.3354202"},{"key":"11737_CR13","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.procs.2019.05.016","volume":"152","author":"D Mukherjee","year":"2019","unstructured":"Mukherjee D, Das R, Majumdar S, Ghosh S, Thepade SD, Basu A (2019) Energy efficient face recognition in mobile-fog environment. Procedia Computer Science 152:274\u2013281","journal-title":"Procedia Computer Science"},{"key":"11737_CR14","doi-asserted-by":"crossref","unstructured":"Narasimman A, Wang Q, Li F, Lee D, Luo B (2019) Arcana: enabling private posts on public microblog platforms. In: ICT systems security and privacy protection, vol 562. Springer, pp 271\u2013285","DOI":"10.1007\/978-3-030-22312-0_19"},{"key":"11737_CR15","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology - EUROCRYPT \u201999, vol 1592. Springer, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"7","key":"11737_CR16","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux P, Puech W (2018) An efficient msb prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Transactions on Information Forensics and Security 13(7):1670\u20131681","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"11737_CR17","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","volume":"26","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhang X (2016) Reversible data hiding in encrypted images with distributed source encoding. IEEE Transactions on Circuits and Systems for Video Technology 26(4):636\u2013646","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"C","key":"11737_CR18","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2015.01.002","volume":"111","author":"X Qu","year":"2015","unstructured":"Qu X, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Processing 111(C):249\u2013260","journal-title":"Signal Processing"},{"issue":"6","key":"11737_CR19","doi-asserted-by":"publisher","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"AK Singh","year":"2017","unstructured":"Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Applic 76(6):8881\u20138900","journal-title":"Multimed Tools Applic"},{"issue":"11","key":"11737_CR20","doi-asserted-by":"publisher","first-page":"13001","DOI":"10.1007\/s11042-016-3706-6","volume":"76","author":"D Singh","year":"2017","unstructured":"Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimedia Tools and Applications 76(11):13001\u201313024","journal-title":"Multimedia Tools and Applications"},{"key":"11737_CR21","doi-asserted-by":"crossref","unstructured":"Tierney M, Spiro I, Bregler C, Subramanian L (2013) Cryptagram: photo privacy for online social media. In: Proceedings of the first ACM conference on online social networks. Association for Computing Machinery, pp 75\u201388","DOI":"10.1145\/2512938.2512939"},{"key":"11737_CR22","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.jvcir.2015.06.010","volume":"31","author":"H Wu","year":"2015","unstructured":"Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. Journal of Visual Communication and Image Representation 31:146\u2013153","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"11","key":"11737_CR23","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594\u20132608","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11737_CR24","doi-asserted-by":"crossref","unstructured":"Xie S, Kirillov A, Girshick RB, He K (2019) Exploring randomly wired neural networks for image recognition. In: 2019 IEEE\/CVF international conference on computer vision. IEEE, pp 1284\u20131293","DOI":"10.1109\/ICCV.2019.00137"},{"issue":"8","key":"11737_CR25","doi-asserted-by":"publisher","first-page":"5819","DOI":"10.1109\/TII.2020.3031440","volume":"17","author":"X Xu","year":"2021","unstructured":"Xu X, Mo R, Yin X, Khosravi MR, Aghaei F, Chang V, Li G (2021) Pdm: privacy-aware deployment of machine-learning applications for industrial cyber-physical cloud systems. IEEE Transactions on Industrial Informatics 17(8):5819\u20135828","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"11737_CR26","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","volume":"479","author":"Y Yang","year":"2019","unstructured":"Yang Y, Zheng X, Guo W, Liu X, Chang V (2019) Privacy-preserving smart iot-based healthcare big data storage and self-adaptive access control system. Information Sciences 479:567\u2013592","journal-title":"Information Sciences"},{"key":"11737_CR27","doi-asserted-by":"crossref","unstructured":"Yuan L, Korshunov P, Ebrahimi T (2015) Privacy-preserving photo sharing based on a secure JPEG. In: 2015 IEEE conference on computer communications workshops. IEEE, pp 185\u2013190","DOI":"10.1109\/INFCOMW.2015.7179382"},{"issue":"4","key":"11737_CR28","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on dwt, DCT and SVD for application in medicine. Multimed Tools Applic 77(4):4863\u20134882","journal-title":"Multimed Tools Applic"},{"issue":"4","key":"11737_CR29","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Processing Letters 18(4):255\u2013258","journal-title":"IEEE Signal Processing Letters"},{"issue":"9","key":"11737_CR30","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TCSVT.2015.2433194","volume":"26","author":"X Zhang","year":"2016","unstructured":"Zhang X, Long J, Wang Z, Cheng H (2016) Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology 26(9):1622\u20131631","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11737-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11737-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11737-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T19:41:09Z","timestamp":1645472469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11737-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,19]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["11737"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11737-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,11,19]]},"assertion":[{"value":"10 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}