{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T03:58:51Z","timestamp":1768449531595,"version":"3.49.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T00:00:00Z","timestamp":1494547200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41371402"],"award-info":[{"award-number":["41371402"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672294"],"award-info":[{"award-number":["61672294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2011CB302204"],"award-info":[{"award-number":["2011CB302204"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Doctoral Program of Higher Education of China","award":["20110141110056"],"award-info":[{"award-number":["20110141110056"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multidim Syst Sign Process"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11045-017-0497-5","type":"journal-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T10:44:20Z","timestamp":1494585860000},"page":"1191-1202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":103,"title":["An integer wavelet transform based scheme for reversible data hiding in encrypted images"],"prefix":"10.1007","volume":"29","author":[{"given":"Lizhi","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Zhengquan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,12]]},"reference":[{"key":"497_CR1","unstructured":"Fridrich, J., & Goljan, M. (2002). Lossless data embedding for all image formats. In SPIE proceedings of photonics west, electronic imaging, security and watermarking of multimedia contents (Vol. 4675, pp. 572\u2013583). San Jose."},{"issue":"9","key":"497_CR2","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., & Huang, F. (2016). Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems, 27(9), 2546\u20132559.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"4","key":"497_CR3","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T. S., & Wu, H. Y. (2012). An improved reversible data hiding in encrypted images using side match. IEEE Signal Processing Letters, 19(4), 199\u2013202.","journal-title":"IEEE Signal Processing Letters"},{"key":"497_CR4","doi-asserted-by":"crossref","unstructured":"Korshunov, P., & Ebrahimi, T. (2014). Scrambling-based tool for secure protection of JPEG images. In 2014 IEEE international conference on image processing (ICIP) (pp. 3423\u20133425). IEEE.","DOI":"10.1109\/ICIP.2014.7025694"},{"issue":"12","key":"497_CR5","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","volume":"20","author":"XL Li","year":"2011","unstructured":"Li, X. L., Yang, B., & Zeng, T. Y. (2011). Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Transactions on Image Processing, 20(12), 3524\u20133533.","journal-title":"IEEE Transactions on Image Processing"},{"key":"497_CR6","unstructured":"Miscellaneous gray level images. \n                        http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/g512.php\n                        \n                    ."},{"issue":"3","key":"497_CR7","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"ZC Ni","year":"2006","unstructured":"Ni, Z. C., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354\u2013362.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"497_CR8","unstructured":"Puech, W., & Rodrigues, J. M. (2005). Crypto-compression of medical images by selective encryption of DCT. In 2005 13th European signal processing conference (pp. 1\u20134). IEEE."},{"issue":"7","key":"497_CR9","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H. J., Nam, J., Suresh, S., & Shi, Y. Q. (2009). Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 989\u2013999.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"8","key":"497_CR10","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890\u2013896.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"497_CR11","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","volume":"104","author":"X Wu","year":"2014","unstructured":"Wu, X., & Sun, W. (2014). High-capacity reversible data hiding in encrypted images by prediction error. Signal Processing, 104, 387\u2013400.","journal-title":"Signal Processing"},{"key":"497_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2590944","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security,. doi:\n                        10.1109\/TIFS.2016.2590944\n                        \n                    .","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"497_CR13","doi-asserted-by":"crossref","first-page":"4573","DOI":"10.1002\/cpe.3423","volume":"27","author":"L Xiong","year":"2015","unstructured":"Xiong, L., Xu, Z., & Xu, Y. (2015). A secure re-encryption scheme for data services in a cloud computing environment. Concurrency and Computation: Practice and Experience, 27(12), 4573\u20134585.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"497_CR14","unstructured":"Xuan, G., Yao, Q., Yang, C., Gao, J., Chai, P., Shi, Y. Q., & Ni, Z. C. (2006). Lossless data hiding using histogram shifting method based on integer wavelets. In 2016 international workshop on digital watermarking (IWDW), lecture notes in computer science (Vol. 4283, pp. 323\u2013332). Berlin, Heidelberg: Springer."},{"issue":"25","key":"497_CR15","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1049\/el:20021131","volume":"38","author":"G Xuan","year":"2002","unstructured":"Xuan, G., Zhu, J., Chen, J., Shi, Y. Q., Ni, Z., & Su, W. (2002). Distortionless data hiding based on integer wavelet transform. Electronics Letters, 38(25), 1646\u20131648.","journal-title":"Electronics Letters"},{"issue":"4","key":"497_CR16","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"XP Zhang","year":"2011","unstructured":"Zhang, X. P. (2011). Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18(4), 255\u2013258.","journal-title":"IEEE Signal Processing Letters"},{"issue":"2","key":"497_CR17","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"XP Zhang","year":"2012","unstructured":"Zhang, X. P. (2012). Separable reversible data hiding in encrypted image. IEEE Transactions on Information Forensics and Security, 7(2), 826\u2013832.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"497_CR18","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"WM Zhang","year":"2014","unstructured":"Zhang, W. M., Ma, K. D., & Yu, N. H. (2014). Reversibility improved data hiding in encrypted images. Signal Processing, 94, 118\u2013127.","journal-title":"Signal Processing"}],"container-title":["Multidimensional Systems and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11045-017-0497-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-017-0497-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-017-0497-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T22:02:24Z","timestamp":1589752944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11045-017-0497-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,12]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["497"],"URL":"https:\/\/doi.org\/10.1007\/s11045-017-0497-5","relation":{},"ISSN":["0923-6082","1573-0824"],"issn-type":[{"value":"0923-6082","type":"print"},{"value":"1573-0824","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,12]]}}}