{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T08:26:37Z","timestamp":1775809597793,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:00:00Z","timestamp":1630713600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T00:00:00Z","timestamp":1630713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872003"],"award-info":[{"award-number":["61872003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61860206004"],"award-info":[{"award-number":["61860206004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s12559-021-09919-5","type":"journal-article","created":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T17:17:40Z","timestamp":1630775860000},"page":"1172-1181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Separable Reversible Data Hiding Based on Integer Mapping and MSB Prediction for Encrypted 3D Mesh Models"],"prefix":"10.1007","volume":"14","author":[{"given":"Na","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0387-4806","authenticated-orcid":false,"given":"Zhaoxia","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,4]]},"reference":[{"key":"9919_CR1","doi-asserted-by":"crossref","unstructured":"Dashtipour K, Gogate M, Cambria E, et al. A novel context-aware multimodal framework for Persian sentiment analysis[J]. Neurocomputing. 2021.","DOI":"10.1016\/j.neucom.2021.02.020"},{"key":"9919_CR2","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/s12559-015-9357-5","volume":"8","author":"Jinchang Ren","year":"2016","unstructured":"Ren Jinchang, Zhao Huimin. Cognitive Computation of Compreesed Sensing for Watermark Signal Measurement[J]. Cogn Comput. 2016;8:246\u201360.","journal-title":"Cogn Comput"},{"issue":"2","key":"9919_CR3","first-page":"863","volume":"12","author":"BH Behrouz","year":"2020","unstructured":"Behrouz BH, Taherinia AH, et al. An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network[J]. Cogn Comput. 2020;12(2):863\u201390.","journal-title":"Cogn Comput"},{"issue":"2","key":"9919_CR4","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/s12559-010-9033-8","volume":"2","author":"X Gao","year":"2010","unstructured":"Gao X, Deng C, Li X, et al. Local Feature Based Geometric-Resistant Image Information Hiding[J]. Cogn Comput. 2010;2(2):68\u201377.","journal-title":"Cogn Comput"},{"issue":"1","key":"9919_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s12559-014-9268-x","volume":"7","author":"V Sachnev","year":"2015","unstructured":"Sachnev V, Savitha R, Suresh S, et al. A Cognitive Ensemble of Extreme Learning Machines for Steganalysis Based on Risk-Sensitive Hinge Loss Function[J]. Cogn Comput. 2015;7(1):103\u201310.","journal-title":"Cogn Comput"},{"key":"9919_CR6","doi-asserted-by":"crossref","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E. Lossless generalized-lsb data embedding. IEEE Trans Image Process.\u00a02005;14(2):253-266.","DOI":"10.1109\/TIP.2004.840686"},{"issue":"8","key":"9919_CR7","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J. Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol. 2003;13(8):890\u20136.","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"8","key":"9919_CR8","doi-asserted-by":"publisher","first-page":"1500","DOI":"10.1109\/TMM.2008.2007341","volume":"10","author":"H Yongjian","year":"2008","unstructured":"Yongjian H, Lee HK, Chen K, Li J. Difference expansion based reversible data hiding using two embedding directions. IEEE Trans Multimedia. 2008;10(8):1500\u201312.","journal-title":"IEEE Trans Multimedia"},{"issue":"9","key":"9919_CR9","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"X Li","year":"2015","unstructured":"Li X, Zhang W, Gui X, Yang B. Efficient reversible data hiding based on multiple histograms modification. IEEE Trans Inf Forensics Secur. 2015;10(9):2016\u201327.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"9919_CR10","first-page":"315","volume":"47","author":"J Wang","year":"2016","unstructured":"Wang J, Ni J, Zhang X, Shi Y. Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans Cybern. 2016;47(2):315\u201326.","journal-title":"IEEE Trans Cybern"},{"issue":"4","key":"9919_CR11","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X. Reversible data hiding in encrypted image. Signal Process Lett IEEE. 2011;18(4):255\u20138.","journal-title":"Signal Process Lett IEEE"},{"issue":"2","key":"9919_CR12","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2011","unstructured":"Zhang X. Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur. 2011;7(2):826\u201332.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"9919_CR13","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","volume":"26","author":"Z Qian","year":"2015","unstructured":"Qian Z, Zhang X. Reversible data hiding in encrypted images with distributed source encoding. IEEE Trans Circuits Syst Video Technol. 2015;26(4):636\u201346.","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"9919_CR14","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Nenghai Y, Li F. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur. 2013;8(3):553\u201362.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"9919_CR15","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"Pauline Puteaux","year":"2018","unstructured":"Puteaux Pauline, Puech William. An efficient msb prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur. 2018;13(7):1670\u201381.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9919_CR16","unstructured":"Wu H, Cheung Y. A reversible data hiding approach to mesh authentication. In IEEE\/WIC\/ACM International Conference on Web Intelligence, Compiegne, France. 2005."},{"key":"9919_CR17","unstructured":"Chuang CH, Cheng CW, Yen ZY. Reversible data hiding with affine invariance for 3d models. In IET International Conference on Frontier Computing Theory.\u00a02010. p 77\u201381."},{"key":"9919_CR18","first-page":"1-10","volume":"2016","author":"Tsai YY","year":"2016","unstructured":"Tsai YY. A distortion-free data hiding scheme for triangular meshes based on recursive subdivision. Adv Multimed. 2016;2016:1\u201310.","journal-title":"Adv Multimed"},{"issue":"5","key":"9919_CR19","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1007\/s11042-017-4430-6","volume":"77","author":"R Jiang","year":"2018","unstructured":"Jiang R, Zhang W, Hou D, Wang H, Nenghai Y. Reversible data hiding for 3d mesh models with three-dimensional prediction-error histogram modification. Multimed Tools Appl. 2018;77(5):5263\u201380.","journal-title":"Multimed Tools Appl"},{"key":"9919_CR20","doi-asserted-by":"crossref","unstructured":"Zhang Q, Song X, Tao W, Fu C. Reversible data hiding for 3d mesh models with hybrid prediction and multilayer strategy. Multimed Tools Appl. 2018;1\u201317.","DOI":"10.1007\/s11042-018-6219-7"},{"key":"9919_CR21","doi-asserted-by":"crossref","unstructured":"Luo H, Lu ZM, Pan JS. A reversible data hiding scheme for 3d point cloud model. In IEEE International Symposium on Signal Processing and Information Technology,\u00a0Vancouver, BC, Canada. 2006. p 863\u201367.","DOI":"10.1109\/ISSPIT.2006.270919"},{"key":"9919_CR22","doi-asserted-by":"crossref","unstructured":"Sun Z, Lu ZM, Li Z. Reversible data hiding for 3d meshes in the pvq-compressed domain. In International Conference on Intelligent Information Hiding and Multimedia.\u00a0Vancouver, BC, Canada. 2006. p 593\u2013596.","DOI":"10.1109\/IIH-MSP.2006.265072"},{"issue":"6\u20138","key":"9919_CR23","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1007\/s00371-011-0586-7","volume":"27","author":"H Lee","year":"2011","unstructured":"Lee H, Dikici Ca, Lavoue G, Dupont Fl. Joint reversible watermarking and progressive compression of 3d meshes. Vis Comput. 2011;27(6\u20138):781\u201392.","journal-title":"Vis Comput"},{"issue":"99","key":"9919_CR24","first-page":"289","volume":"29","author":"L Li","year":"2019","unstructured":"Li L, Zhu L, Zakharchenko V, et al. Advanced 3D motion prediction for video based dynamic point cloud compression. IEEE Trans Image Process. 2019;29(99):289\u2013302.","journal-title":"IEEE Trans Image Process"},{"key":"9919_CR25","doi-asserted-by":"crossref","unstructured":"Li L, Li Z, Liu S, Li H. Rate control for video-based point cloud compression. IEEE Trans Image Process. 2020;(99):1\u20131.","DOI":"10.1109\/TMM.2022.3167810"},{"issue":"1","key":"9919_CR26","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TMM.2017.2723244","volume":"20","author":"R Jiang","year":"2018","unstructured":"Jiang R, Zhou H, Zhang W, Nenghai Y. Reversible data hiding in encrypted three-dimensional mesh models. IEEE Trans Multimed. 2018;20(1):55\u201367.","journal-title":"IEEE Trans Multimed"},{"issue":"12","key":"9919_CR27","doi-asserted-by":"publisher","first-page":"8145","DOI":"10.1007\/s13369-018-3354-4","volume":"43","author":"M Shah","year":"2018","unstructured":"Shah M, Zhang W, Honggang H, Zhou H, Mahmood T. Homomorphic encryption-based reversible data hiding for 3d mesh models. Arab J Sci Eng. 2018;43(12):8145\u201357.","journal-title":"Arab J Sci Eng"},{"key":"9919_CR28","doi-asserted-by":"crossref","unstructured":"Deering M. Geometry compression. In Proceedings of the 22nd Annual Conference on Computer Graphics and Interactive Techniques.\u00a0New York, United States. 1995. p 13\u201320.","DOI":"10.1145\/218380.218391"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-021-09919-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12559-021-09919-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-021-09919-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T11:44:02Z","timestamp":1652787842000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12559-021-09919-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,4]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["9919"],"URL":"https:\/\/doi.org\/10.1007\/s12559-021-09919-5","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"value":"1866-9956","type":"print"},{"value":"1866-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,4]]},"assertion":[{"value":"30 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Informed consent was not required as no human or animals were involved.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}