{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:25:29Z","timestamp":1766298329665,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T00:00:00Z","timestamp":1697068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T00:00:00Z","timestamp":1697068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Scientific Research Program Funded by Liaoning Provincial Education Department","award":["WQ2020014"],"award-info":[{"award-number":["WQ2020014"]}]},{"DOI":"10.13039\/100014717","name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61601214"],"award-info":[{"award-number":["61601214"]}],"id":[{"id":"10.13039\/100014717","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Key Research Project of Dalian academy of social sciences","award":["2021dlsky027"],"award-info":[{"award-number":["2021dlsky027"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16984-5","type":"journal-article","created":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T15:01:56Z","timestamp":1697122916000},"page":"41525-41553","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A reversible data hiding in encrypted image based on additive secret sharing with adaptive bit-plane prediction"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5029-7461","authenticated-orcid":false,"given":"Hui","family":"Shi","sequence":"first","affiliation":[]},{"given":"Ziyi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jianhao","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Jianing","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Mingchu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,12]]},"reference":[{"key":"16984_CR1","doi-asserted-by":"publisher","first-page":"3084153","DOI":"10.1155\/2021\/3084153","volume":"2021","author":"C Gong","year":"2021","unstructured":"Gong C, Li J, Bhatti UA et al (2021) Robust and secure zero-watermarking algorithm for medical images based on Harris-SURF-DCT and chaotic map[J]. Secur Commun Netw 2021:3084153","journal-title":"Secur Commun Netw"},{"issue":"1","key":"16984_CR2","first-page":"1","volume":"24","author":"T Li","year":"2022","unstructured":"Li T, Li J, Liu J et al (2022) Robust watermarking algorithm for medical images based on log-polar transform[J]. EURASIP J Wirel Commun Netw 24(1):1\u201311","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"16984_CR3","doi-asserted-by":"publisher","first-page":"4944797","DOI":"10.1155\/2021\/4944797","volume":"2021","author":"C Yang","year":"2021","unstructured":"Yang C, Li J, Bhatti UA et al (2021) Robust zero watermarking algorithm for medical images based on zernike-DCT[J]. Secur Commun Netw 2021:4944797","journal-title":"Secur Commun Netw"},{"key":"16984_CR4","first-page":"534","volume":"6819","author":"W Puech","year":"2008","unstructured":"Puech W, Chaumont M, Strauss O (2008) A reversible data hiding method for encrypted images[C]. Security, forensics, steganography, and watermarking of multimedia contents X. SPIE 6819:534\u2013542","journal-title":"SPIE"},{"issue":"4","key":"16984_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image[J]. IEEE Signal Process Lett 18(4):255\u2013258","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"16984_CR6","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match[J]. IEEE Signal Process Lett 19(4):199\u2013202","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"16984_CR7","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Separable reversible data hiding in encrypted image[J]. IEEE Trans Inf Forensics Secur 7(2):826\u2013832","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"16984_CR8","doi-asserted-by":"crossref","unstructured":"Cui W, Liu J, Li J et al (2021) A zero watermarking scheme for encrypted medical images based on Tetrolet-DCT[C]. Innovation in Medicine and Healthcare: Proceedings of 9th KES-InMed 2021. Springer Singapore, 242, 87\u201399","DOI":"10.1007\/978-981-16-3013-2_8"},{"key":"16984_CR9","doi-asserted-by":"crossref","unstructured":"Xiao X, Li J, Yi D et al (2021) Robust zero watermarking algorithm for encrypted medical images based on DWT-Gabor[C]. Innovation in Medicine and Healthcare: Proceedings of 9th KES-InMed 2021. Springer Singapore, 242, 75\u201386","DOI":"10.1007\/978-981-16-3013-2_7"},{"issue":"7","key":"16984_CR10","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images[J]. IEEE Trans Inf Forensics Secur 13(7):1670\u20131681","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"16984_CR11","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"Z Yin","year":"2020","unstructured":"Yin Z, Xiang Y, Zhang X (2020) Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J]. IEEE Trans Multimedia 22(4):874\u2013884","journal-title":"IEEE Trans Multimedia"},{"issue":"8","key":"16984_CR12","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TCSVT.2020.2990952","volume":"30","author":"A Mohammadi","year":"2020","unstructured":"Mohammadi A, Nakhkash M, Akhaee MA (2020) A high-capacity reversible data hiding in encrypted images employing local difference predictor[J]. IEEE Trans Circuits Syst Video Technol 30(8):2366\u20132376","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"16984_CR13","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1109\/TMM.2021.3062699","volume":"24","author":"Y Wang","year":"2021","unstructured":"Wang Y, He W (2021) High capacity reversible data hiding in encrypted image based on adaptive MSB prediction[J]. IEEE Trans Multimedia 24:1288\u20131298","journal-title":"IEEE Trans Multimedia"},{"issue":"9","key":"16984_CR14","doi-asserted-by":"publisher","first-page":"5874","DOI":"10.1109\/TCSVT.2022.3163905","volume":"32","author":"Y Qiu","year":"2022","unstructured":"Qiu Y, Ying Q, Yang Y et al (2022) High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding[J]. IEEE Trans Circuits Syst Video Technol 32(9):5874\u20135887","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"5","key":"16984_CR15","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"Thien CC, Lin JC (2002) Secret image sharing[J]. Comput Graph 26(5):765\u2013770","journal-title":"Comput Graph"},{"key":"16984_CR16","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.sigpro.2017.09.017","volume":"143","author":"X Wu","year":"2018","unstructured":"Wu X, Weng J, Yan WQ (2018) Adopting secret sharing for reversible data hiding in encrypted images[J]. Sig Process 143:269\u2013281","journal-title":"Sig Process"},{"issue":"12","key":"16984_CR17","doi-asserted-by":"publisher","first-page":"3332","DOI":"10.1109\/TIFS.2019.2914557","volume":"14","author":"YC Chen","year":"2019","unstructured":"Chen YC, Hung TH, Hsieh SH et al (2019) A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms[J]. IEEE Trans Inf Forensics Secur 14(12):3332\u20133343","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"16984_CR18","first-page":"1558","volume":"1","author":"Z Hua","year":"2022","unstructured":"Hua Z, Wang Y, Yi S et al (2022) Reversible data hiding in encrypted images using cipher-feedback secret sharing[J]. IEEE Trans Circuits Syst Video Technol 1(1):1558\u20132205","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"11","key":"16984_CR19","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret[J]. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"13","key":"16984_CR20","doi-asserted-by":"publisher","first-page":"17527","DOI":"10.1007\/s11042-022-12430-0","volume":"81","author":"JY Lin","year":"2022","unstructured":"Lin JY, Horng JH, Chang CC (2022) A reversible and authenticable secret sharing scheme using dual images[J]. Multimed Tools Appl 81(13):17527\u201317545","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"16984_CR21","doi-asserted-by":"publisher","first-page":"18807","DOI":"10.1007\/s11042-022-12684-8","volume":"81","author":"CS Tsai","year":"2022","unstructured":"Tsai CS, Zhang YS, Weng CY (2022) Separable reversible data hiding in encrypted images based on Paillier cryptosystem[J]. Multimed Tools Appl 81(13):18807\u201318827","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"16984_CR22","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1109\/TCSVT.2021.3091319","volume":"32","author":"C Qin","year":"2021","unstructured":"Qin C, Jiang C, Mo Q et al (2021) Reversible data hiding in encrypted image via secret sharing based on GF (p) and GF (28)[J]. IEEE Trans Circuits Syst Video Technol 32(4):1928\u20131941","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"11","key":"16984_CR23","doi-asserted-by":"publisher","first-page":"3099","DOI":"10.1109\/TCSVT.2017.2742023","volume":"28","author":"S Xiang","year":"2017","unstructured":"Xiang S, Luo X (2017) Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group[J]. IEEE Trans Circuits Syst Video Technol 28(11):3099\u20133110","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"11","key":"16984_CR24","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1049\/iet-ipr.2017.0151","volume":"11","author":"W Wang","year":"2017","unstructured":"Wang W, Ye J, Wang T et al (2017) Reversible data hiding scheme based on significant-bit\u2010difference expansion[J]. IET Image Proc 11(11):1002\u20131014","journal-title":"IET Image Proc"},{"issue":"1","key":"16984_CR25","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TCSVT.2021.3055072","volume":"32","author":"L Xiong","year":"2021","unstructured":"Xiong L, Han X, Yang CN et al (2021) Robust reversible watermarking in encrypted image with secure multi-party based on lightweight cryptography[J]. IEEE Trans Circuits Syst Video Technol 32(1):75\u201391","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"16984_CR26","doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevn\u00fd T Break our steganographic system: the ins and outs of organizing BOSS[C]. International workshop on information hiding. Springer, Berlin, Heidelberg, 2011, 59\u201370","DOI":"10.1007\/978-3-642-24178-9_5"},{"key":"16984_CR27","unstructured":"Bas P, Furon T (2017) Image database of BOWS-2, http:\/\/bows2.ec-lille.fr\/"},{"issue":"1","key":"16984_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.matcom.2004.09.001","volume":"68","author":"JCH Castro","year":"2005","unstructured":"Castro JCH, Sierra JM, Seznec A et al (2005) The strict avalanche criterion randomness test[J]. Math Comput Simul 68(1):1\u20137","journal-title":"Math Comput Simul"},{"issue":"3","key":"16984_CR29","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/LSP.2012.2227726","volume":"20","author":"M Anish","year":"2013","unstructured":"Anish M, Rajiv S, Alan CB (2013) Making a completely blind image quality analyzer[J]. IEEE Signal Process Lett 20(3):209\u2013212","journal-title":"IEEE Signal Process Lett"},{"issue":"8","key":"16984_CR30","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","volume":"22","author":"Y Wu","year":"2020","unstructured":"Wu Y, Xiang Y, Guo Y et al (2020) An improved reversible data hiding in encrypted images using parametric binary tree labeling[J]. IEEE Trans Multimedia 22(8):1929\u20131938","journal-title":"IEEE Trans Multimedia"},{"issue":"2","key":"16984_CR31","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TCSVT.2021.3062947","volume":"32","author":"C Yu","year":"2022","unstructured":"Yu C, Zhang X, Zhang X et al (2022) Reversible data hiding with hierarchical embedding for encrypted images[J]. IEEE Trans Circuits Syst Video Technol 32(2):451\u2013466","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"16984_CR32","first-page":"992","volume":"19","author":"Z Yin","year":"2020","unstructured":"Yin Z, Peng Y, Xiang Y (2020) Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression[J]. IEEE Trans Dependable Secur Comput 19(2):992\u20131002","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"02","key":"16984_CR33","first-page":"978","volume":"19","author":"B Chen","year":"2022","unstructured":"Chen B, Lu W, Huang J et al (2022) Secret sharing based reversible data hiding in encrypted images with multiple data-hiders[J]. IEEE Trans Dependable Secur Comput 19(02):978\u2013991","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"16984_CR34","doi-asserted-by":"publisher","first-page":"103478","DOI":"10.1016\/j.jvcir.2022.103478","volume":"85","author":"A Mohammadi","year":"2022","unstructured":"Mohammadi A (2022) A general framework for reversible data hiding in encrypted images by reserving room before encryption[J]. J Vis Commun Image Represent 85:103478","journal-title":"J Vis Commun Image Represent"},{"key":"16984_CR35","doi-asserted-by":"crossref","unstructured":"Katz J, Lindell Y (2020) Introduction to modern cryptography[M]. CRC Press,\u00a0Boca Raton","DOI":"10.1201\/9781351133036"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16984-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16984-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16984-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,4]],"date-time":"2024-04-04T13:31:40Z","timestamp":1712237500000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16984-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,12]]},"references-count":35,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["16984"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16984-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,10,12]]},"assertion":[{"value":"25 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}