{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:05:16Z","timestamp":1771668316183,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T00:00:00Z","timestamp":1543017600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61562007"],"award-info":[{"award-number":["61562007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61762017"],"award-info":[{"award-number":["61762017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502111"],"award-info":[{"award-number":["61502111"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61763003"],"award-info":[{"award-number":["61763003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636101"],"award-info":[{"award-number":["U1636101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research Development Program of China","award":["2016QY01W0200"],"award-info":[{"award-number":["2016QY01W0200"]}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2017GXNSFAA198222"],"award-info":[{"award-number":["2017GXNSFAA198222"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2016GXNSFAA380192"],"award-info":[{"award-number":["2016GXNSFAA380192"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Project of Guangxi Science and Technology","award":["GuiKeAD17195062"],"award-info":[{"award-number":["GuiKeAD17195062"]}]},{"name":"Innovation Project of Guangxi Graduate Education","award":["XYCSZ2018076"],"award-info":[{"award-number":["XYCSZ2018076"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11554-018-0838-0","type":"journal-article","created":{"date-parts":[[2018,11,24]],"date-time":"2018-11-24T06:36:01Z","timestamp":1543041361000},"page":"709-724","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3664-1363","authenticated-orcid":false,"given":"Zhenjun","family":"Tang","sequence":"first","affiliation":[]},{"given":"Shijie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Dengpan","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Jinyan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xianquan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chuanqiang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,24]]},"reference":[{"issue":"6","key":"838_CR1","doi-asserted-by":"publisher","first-page":"8257","DOI":"10.1007\/s11042-016-3476-1","volume":"76","author":"Z Tang","year":"2017","unstructured":"Tang, Z., Wang, F., Zhang, X.Q.: Image encryption based on random projection partition and chaotic system. Multimedia Tools Appl. 76(6), 8257\u20138283 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"838_CR2","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin, C., Ji, P., Zhang, X.P., Dong, J., Wang, J.W.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Sig. Process. 138, 280\u2013293 (2017)","journal-title":"Sig. Process."},{"issue":"3","key":"838_CR3","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/TKDE.2013.45","volume":"26","author":"Z Tang","year":"2014","unstructured":"Tang, Z., Zhang, X.Q., Zhang, S.C.: Robust perceptual image hashing based on ring partition and NMF. IEEE Trans. Knowl. Data Eng. 26(3), 711\u2013724 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"838_CR4","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","volume":"11","author":"Z Tang","year":"2016","unstructured":"Tang, Z., Zhang, X.Q., Li, X.X., Zhang, S.C.: Robust image hashing with ring partition and invariant vector distance. IEEE Trans. Inf. Forens. Secur. 11(1), 200\u2013214 (2016)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"838_CR5","volume-title":"Digital Watermarking and Steganography","author":"I Cox","year":"2007","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kaller, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2007)"},{"issue":"1","key":"838_CR6","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11554-017-0719-y","volume":"14","author":"KH Jung","year":"2018","unstructured":"Jung, K.H.: Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit plane. J. Real Time Image Proc. 14(1), 127\u2013136 (2018)","journal-title":"J. Real Time Image Proc."},{"issue":"3","key":"838_CR7","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin, C., Chang, C.C., Chiu, Y.P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969\u2013978 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"838_CR8","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-642-35236-2_25","volume":"7669","author":"XQ Zhang","year":"2012","unstructured":"Zhang, X.Q., Tang, Z., Liang, T., Zhang, S.C., Zhu, Y.J., Sun, Y.H.: Data hiding method based on local image feature. Lect. Notes Comput. Sci. 7669, 247\u2013256 (2012)","journal-title":"Lect. Notes Comput. Sci."},{"issue":"3","key":"838_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469\u2013474 (2004)","journal-title":"Pattern Recogn."},{"issue":"6","key":"838_CR10","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"A Ker","year":"2005","unstructured":"Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett. 12(6), 441\u2013444 (2005)","journal-title":"IEEE Signal Process Lett."},{"issue":"7","key":"838_CR11","doi-asserted-by":"publisher","first-page":"9195","DOI":"10.1007\/s11042-016-3521-0","volume":"76","author":"XQ Zhang","year":"2017","unstructured":"Zhang, X.Q., Sun, Z.R., Tang, Z., Yu, C.Q., Wang, X.Y.: High capacity data hiding based on interpolated image. Multimedia Tools Appl. 76(7), 9195\u20139218 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"838_CR12","doi-asserted-by":"publisher","first-page":"29912","DOI":"10.1109\/ACCESS.2018.2841415","volume":"6","author":"F Li","year":"2018","unstructured":"Li, F., Wu, K., Zhang, X.P., Yu, J., Lei, J., Wen, M.: Robust batch steganography in social networks with non-uniform payload and data decomposition. IEEE Access 6, 29912\u201329925 (2018)","journal-title":"IEEE Access"},{"key":"838_CR13","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS), Bangkok, Thailand, pp. 912\u2013915 (2003)"},{"issue":"15","key":"838_CR14","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Hsu, T.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools Appl. 74(15), 5861\u20135872 (2013)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"838_CR15","first-page":"156","volume":"14","author":"KH Jung","year":"2018","unstructured":"Jung, K.H.: High-capacity reversible data hiding method using block expansion in digital images. J. Real Time Image Proc. 14(1), 156\u2013170 (2018)","journal-title":"J. Real Time Image Proc."},{"issue":"1","key":"838_CR16","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim, C., Shin, D., Leng, L., Yang, C.: Lossless data hiding for absolute moment block truncation coding using histogram modification. J. Real Time Image Proc. 14(1), 101\u2013114 (2018)","journal-title":"J. Real Time Image Proc."},{"key":"838_CR17","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/j.ijleo.2017.11.154","volume":"157","author":"Z Tang","year":"2018","unstructured":"Tang, Z., Lu, Q., Lao, H., Yu, C., Zhang, X.Q.: Error-free reversible data hiding with high capacity in encrypted image. Opt. Int. J. Light Electron Opt. 157, 750\u2013760 (2018)","journal-title":"Opt. Int. J. Light Electron Opt."},{"issue":"7","key":"838_CR18","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C., Huang, Y., Liao, L.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109\u20131118 (2013)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"838_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.sigpro.2016.12.029","volume":"135","author":"H Yao","year":"2017","unstructured":"Yao, H., Qin, C., Tang, Z., Tian, Y.: Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels\u2019 coordinates with minimum distortion. Sig. Process. 135, 26\u201335 (2017)","journal-title":"Sig. Process."},{"key":"838_CR20","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Shi, Y.Q., Li, X., Zhang, X.P., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"issue":"3","key":"838_CR21","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forens. Secur. 8(3), 553\u2013562 (2013)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"1","key":"838_CR22","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang, W., Ma, K., Yu, N.: Reversibility improved data hiding in encrypted images. Sig. Process. 94(1), 118\u2013127 (2014)","journal-title":"Sig. Process."},{"issue":"5","key":"838_CR23","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","volume":"46","author":"X Cao","year":"2016","unstructured":"Cao, X., Du, L., Wei, X., Meng, D., Guo, X.: High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern. 46(5), 1132\u20131143 (2016)","journal-title":"IEEE Trans. Cybern."},{"key":"838_CR24","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1016\/j.ijleo.2016.11.059","volume":"30","author":"S Agrawal","year":"2017","unstructured":"Agrawal, S., Kumar, M.: Mean value based reversible data hiding in encrypted images. Opt. Int. J. Light Electron Opt. 30, 922\u2013934 (2017)","journal-title":"Opt. Int. J. Light Electron Opt."},{"issue":"4","key":"838_CR25","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"XP Zhang","year":"2011","unstructured":"Zhang, X.P.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"838_CR26","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T., Wu, H.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"key":"838_CR27","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28, 21\u201327 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"838_CR28","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","volume":"31","author":"C Qin","year":"2015","unstructured":"Qin, C., Zhang, X.P.: Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31, 154\u2013164 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"21","key":"838_CR29","doi-asserted-by":"publisher","first-page":"13765","DOI":"10.1007\/s11042-015-2920-y","volume":"75","author":"S Zheng","year":"2016","unstructured":"Zheng, S., Li, D., Hu, D., Ye, D., Wang, L., Wang, J.: Lossless data hiding algorithm for encrypted images with high capacity. Multimedia Tools Appl. 75(21), 13765\u201313778 (2016)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"838_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-016-4049-z","volume":"76","author":"Z Yin","year":"2017","unstructured":"Yin, Z., Abel, A., Tang, J., Zhang, X.P., Luo, B.: Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools Appl. 76(3), 1\u201322 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"838_CR31","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.image.2015.10.001","volume":"39","author":"M Li","year":"2015","unstructured":"Li, M., Xiao, D., Zhang, Y., Hai, N.: Reversible data hiding in encrypted images using cross division and additive homomorphism. Sig. Process. Image Commun. 39, 234\u2013248 (2015)","journal-title":"Sig. Process. Image Commun."},{"key":"838_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jvcir.2017.02.001","volume":"45","author":"D Xiao","year":"2017","unstructured":"Xiao, D., Xiang, Y., Zheng, H., Wang, Y.: Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism. J. Vis. Commun. Image Represent. 45, 1\u201310 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"838_CR33","first-page":"1","volume":"9103418","author":"C Yu","year":"2018","unstructured":"Yu, C., Zhang, X.Q., Tang, Z., Chen, Y., Huang, J.: Reversible data hiding with pixel prediction and additive homomorphism for encrypted image. Secur. Commun. Netw. 9103418, 1\u201313 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"838_CR34","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"Y Chen","year":"2014","unstructured":"Chen, Y., Shiu, C., Horng, G.: Encrypted signal-based reversible data hiding with public key cryptosystem. J. Vis. Commun. Image Represent. 25(5), 1164\u20131170 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"838_CR35","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.sigpro.2016.07.002","volume":"130","author":"M Li","year":"2017","unstructured":"Li, M., Li, Y.: Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Sig. Process. 130, 190\u2013196 (2017)","journal-title":"Sig. Process."},{"issue":"11","key":"838_CR36","doi-asserted-by":"publisher","first-page":"3099","DOI":"10.1109\/TCSVT.2017.2742023","volume":"28","author":"S Xiang","year":"2018","unstructured":"Xiang, S., Luo, X.: Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group. IEEE Trans. Circuits Syst. Video Technol. 28(11), 3099\u20133110 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"838_CR37","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.image.2015.09.014","volume":"39","author":"CW Shiu","year":"2015","unstructured":"Shiu, C.W., Chen, Y.C., Hong, W.: Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Sig. Process. Image Commun. 39, 226\u2013233 (2015)","journal-title":"Sig. Process. Image Commun."},{"key":"838_CR38","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern J. (ed.) EUROCRYPT'99. Lecture Notes Computure Science, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"838_CR39","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. Found. Secure Comput. 169\u2013178 (1978)"},{"key":"838_CR40","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28, 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"key":"838_CR41","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"838_CR42","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TMM.2011.2181342","volume":"14","author":"AV Subramanyam","year":"2012","unstructured":"Subramanyam, A.V., Emmanuel, S., Kankanhalli, M.S.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimed. 14, 703\u2013716 (2012)","journal-title":"IEEE Trans. Multimed."},{"issue":"12","key":"838_CR43","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","volume":"11","author":"F Huang","year":"2016","unstructured":"Huang, F., Huang, J., Shi, Y.Q.: New framework for reversible data hiding in encrypted domain. IEEE Trans. Inf. Forens. Secur. 11(12), 2777\u20132789 (2016)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"838_CR44","first-page":"89","volume":"1008","author":"RL Rivest","year":"1994","unstructured":"Rivest, R.L.: The RC4 encryption algorithm. Lect. Notes Comput. Sci. 1008, 86\u201396 (1994)","journal-title":"Lect. Notes Comput. Sci."},{"key":"838_CR45","unstructured":"Image database of BOWS-2.\u00a0\n                    http:\/\/bows2.ec-lille.fr\/\n                    \n                  . Accessed 12 July 2018"},{"issue":"4","key":"838_CR46","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"838_CR47","unstructured":"CVG (UGR) Image database.\u00a0\n                    http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/index.php\n                    \n                  . Accessed 10 Dec 2017"},{"issue":"17","key":"838_CR48","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux, P., Puech, W.: An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forens. Secur. 13(17), 1670\u20131681 (2018)","journal-title":"IEEE Trans. Inf. Forens. Secur."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-018-0838-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-018-0838-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-018-0838-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T19:06:26Z","timestamp":1574535986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-018-0838-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,24]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["838"],"URL":"https:\/\/doi.org\/10.1007\/s11554-018-0838-0","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,24]]},"assertion":[{"value":"10 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}