{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T20:33:27Z","timestamp":1770582807005,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"36","license":[{"start":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:00:00Z","timestamp":1748649600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T00:00:00Z","timestamp":1748649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20924-w","type":"journal-article","created":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:50:56Z","timestamp":1748670656000},"page":"45175-45195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible data hiding in encrypted 3D mesh models via reference vertex circulation strategy"],"prefix":"10.1007","volume":"84","author":[{"given":"Jui-Chuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,31]]},"reference":[{"issue":"3","key":"20924_CR1","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"ZC Ni","year":"2006","unstructured":"Ni ZC, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"20924_CR2","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi Y-Q, Li X, Zhang X, Wu H-T, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210\u20133237","journal-title":"IEEE Access"},{"key":"20924_CR3","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.measurement.2018.12.016","volume":"135","author":"Q Zhang","year":"2019","unstructured":"Zhang Q, Song X, Wen T, Fu C (2019) Reversibility improved data hiding in 3D mesh models using prediction-error expansion and sorting. Measurement 135:738\u2013746","journal-title":"Measurement"},{"issue":"5","key":"20924_CR4","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1007\/s11042-017-4430-6","volume":"77","author":"R Jiang","year":"2018","unstructured":"Jiang R, Zhang W, Hou D, Wang H, Yu N (2018) Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification. Multimedia Tools Appl 77(5):5263\u20135280","journal-title":"Multimedia Tools Appl"},{"issue":"12","key":"20924_CR5","doi-asserted-by":"publisher","first-page":"4947","DOI":"10.1007\/s12652-019-01179-4","volume":"10","author":"A Girdhar","year":"2019","unstructured":"Girdhar A, Kumar V (2019) A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map. J Ambient Intell Humanized Comput 10(12):4947\u20134961","journal-title":"J Ambient Intell Humanized Comput"},{"key":"20924_CR6","doi-asserted-by":"crossref","unstructured":"Huang Y-H, Tsai Y-Y (2015) A reversible data hiding scheme for 3D polygonal models based on histogram shifting with high embedding capacity. 3D Res 6(2):1\u201312","DOI":"10.1007\/s13319-015-0051-x"},{"key":"20924_CR7","unstructured":"Wu H-T, Cheung Y-M (2005) A reversible data hiding approach to mesh authentication. In: The 2005\u00a0IEEE\/WIC\/ACM international conference on web intelligence (WI\u201905). IEEE, pp 774\u2013777"},{"key":"20924_CR8","doi-asserted-by":"crossref","unstructured":"Luo H, Lu Z-M, Pan J-S (2006) A reversible data hiding scheme for 3D point cloud model. In: 2006\u00a0IEEE international symposium on signal processing and information technology. IEEE, pp 863\u2013867","DOI":"10.1109\/ISSPIT.2006.270919"},{"key":"20924_CR9","doi-asserted-by":"crossref","unstructured":"Sun Z, Lu Z-M, Li Z (2006) Reversible data hiding for 3D meshes in the PVQ-compressed domain. In: 2006 International conference on intelligent information hiding and multimedia. IEEE, pp 593\u2013596","DOI":"10.1109\/IIH-MSP.2006.265072"},{"key":"20924_CR10","doi-asserted-by":"crossref","unstructured":"Lu Z-M, Li Z (2007) High capacity reversible data hiding for 3D meshes in the PVQ domain. In: International workshop on digital watermarking. Springer, pp 233-243","DOI":"10.1007\/978-3-540-92238-4_18"},{"key":"20924_CR11","doi-asserted-by":"publisher","first-page":"103265","DOI":"10.1016\/j.bspc.2021.103265","volume":"73","author":"R Bhardwaj","year":"2022","unstructured":"Bhardwaj R (2022) Efficient separable reversible data hiding algorithm for compressed 3D mesh models. Biomed Signal Process Control 73:103265","journal-title":"Biomed Signal Process Control"},{"key":"20924_CR12","doi-asserted-by":"publisher","first-page":"103481","DOI":"10.1016\/j.jvcir.2022.103481","volume":"84","author":"K Gao","year":"2022","unstructured":"Gao K, Horng J-H, Chang C-C (2022) High-capacity reversible data hiding in encrypted images based on adaptive block encoding. J Vis Commun Image Represent 84:103481","journal-title":"J Vis Commun Image Represent"},{"key":"20924_CR13","doi-asserted-by":"publisher","first-page":"102609","DOI":"10.1016\/j.displa.2023.102609","volume":"81","author":"K Gao","year":"2024","unstructured":"Gao K, Horng J-H, Chang C-C (2024) Dual mode data hiding in fully encrypted images with pixel-shuffling for cloud applications. Displays 81:102609","journal-title":"Displays"},{"key":"20924_CR14","doi-asserted-by":"publisher","first-page":"108146","DOI":"10.1016\/j.sigpro.2021.108146","volume":"187","author":"ZX Yin","year":"2021","unstructured":"Yin ZX, She X, Tang J, Luo B (2021) Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement. Signal Process 187:108146","journal-title":"Signal Process"},{"key":"20924_CR15","doi-asserted-by":"publisher","first-page":"108621","DOI":"10.1016\/j.sigpro.2022.108621","volume":"199","author":"M Dzwonkowski","year":"2022","unstructured":"Dzwonkowski M, Czaplewski B (2022) Reversible data hiding in encrypted DICOM images using sorted binary sequences of pixels. Signal Process 199:108621","journal-title":"Signal Process"},{"issue":"12","key":"20924_CR16","doi-asserted-by":"publisher","first-page":"8145","DOI":"10.1007\/s13369-018-3354-4","volume":"43","author":"M Shah","year":"2018","unstructured":"Shah M, Zhang W, Hu H, Zhou H, Mahmood T (2018) Homomorphic encryption-based reversible data hiding for 3D mesh models. Arab J Sci Eng 43(12):8145\u20138157","journal-title":"Arab J Sci Eng"},{"issue":"1","key":"20924_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TMM.2017.2723244","volume":"20","author":"RQ Jiang","year":"2018","unstructured":"Jiang RQ, Zhou H, Zhang WM, Yu NH (2018) Reversible data hiding in encrypted three-dimensional mesh models. IEEE Trans Multimedia 20(1):55\u201367","journal-title":"IEEE Trans Multimedia"},{"key":"20924_CR18","doi-asserted-by":"crossref","unstructured":"van Rensburg BJ, Puteaux P, Puech W, Pedeboy J-P (2021) Homomorphic two tier reversible data hiding in encrypted 3D objects. In: 2021 IEEE international conference on image processing (ICIP), pp 3068\u20133072","DOI":"10.1109\/ICIP42928.2021.9506320"},{"key":"20924_CR19","doi-asserted-by":"publisher","first-page":"2286","DOI":"10.1109\/TMM.2020.3009492","volume":"23","author":"Y-Y Tsai","year":"2020","unstructured":"Tsai Y-Y (2020) Separable reversible data hiding for encrypted three-dimensional models based on spatial subdivision and space encoding. IEEE Trans Multimedia 23:2286\u20132296","journal-title":"IEEE Trans Multimedia"},{"key":"20924_CR20","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1007\/s12559-021-09919-5","volume":"17","author":"N Xu","year":"2022","unstructured":"Xu N, Tang J, Luo B, Yin ZX (2022) Separable reversible data hiding based on integer mapping and MSB prediction for encrypted 3D mesh models. Cogn Comput 17:1172\u20131181","journal-title":"Cogn Comput"},{"key":"20924_CR21","doi-asserted-by":"crossref","unstructured":"Yin ZX, Xu N, Wang F, Cheng LL, Luo B (2021) Separable reversible data hiding based on integer mapping and multi-MSB prediction for encrypted 3D mesh models. In: Chinese conference on pattern recognition and computer vision (PRCV), pp 336\u2013348","DOI":"10.1007\/978-3-030-88007-1_28"},{"key":"20924_CR22","doi-asserted-by":"publisher","first-page":"108686","DOI":"10.1016\/j.sigpro.2022.108686","volume":"201","author":"W-L Lyu","year":"2022","unstructured":"Lyu W-L, Cheng LL, Yin ZX (2022) High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Signal Process 201:108686","journal-title":"Signal Process"},{"key":"20924_CR23","doi-asserted-by":"crossref","unstructured":"Tsai Y-Y, Liu H-L (2022) Integrating coordinate transformation and random sampling into high-capacity reversible data hiding in encrypted polygonal models. In: IEEE transactions on dependable and secure computing (Early Access)","DOI":"10.1109\/TDSC.2022.3204291"},{"key":"20924_CR24","doi-asserted-by":"crossref","unstructured":"Gao K, Horng J-H, Chang C-C (2024) Reversible data hiding for encrypted 3D mesh models with secret sharing over galois field. IEEE Trans Multimedia 26:5499\u20135510","DOI":"10.1109\/TMM.2023.3334972"},{"key":"20924_CR25","unstructured":"Shilane P, Funkhouser T, Min P, Halderman A. The Princeton Shape Benchmark. [Online]. Available: http:\/\/shape.cs.princeton.edu\/benchmark\/. Accessed 24 Nov 2003"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20924-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20924-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20924-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T22:34:43Z","timestamp":1765319683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20924-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,31]]},"references-count":25,"journal-issue":{"issue":"36","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["20924"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20924-w","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,31]]},"assertion":[{"value":"18 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}