{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:53:14Z","timestamp":1767970394901,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Joint Project for Development Innovation of Shandong Natural Science Foundation","award":["ZR2022LZH012"],"award-info":[{"award-number":["ZR2022LZH012"]}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2023YFE0208800"],"award-info":[{"award-number":["2023YFE0208800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Joint Project for Smart Computing of Shandong Natural Science Foundation","award":["ZR2020LZH015"],"award-info":[{"award-number":["ZR2020LZH015"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s44443-025-00012-7","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T11:45:05Z","timestamp":1745495105000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multi-party reversible data hiding in shared medical images based on texture-guided hierarchical quantization coding"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1447-0524","authenticated-orcid":false,"given":"Wenbo","family":"Wan","sequence":"first","affiliation":[]},{"given":"Haina","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lingchen","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Yannan","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Jiande","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,24]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","volume":"8","author":"J Canny","year":"1986","unstructured":"Canny J (1986) A computational approach to edge detection. IEEE Trans Pattern Anal Mach Intell 8:679\u2013698. https:\/\/doi.org\/10.1109\/TPAMI.1986.4767851","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"3332","DOI":"10.1109\/TIFS.2019.2914557","volume":"14","author":"Y Chen","year":"2019","unstructured":"Chen Y, Hung T, Hsieh S et al (2019) A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans Inf Forensics Secur 14:3332\u20133343","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/TDSC.2020.2982197","volume":"19","author":"B Chen","year":"2020","unstructured":"Chen B, Lu W, Huang J et al (2020) Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans Dependable Secure Comput 19:978\u2013991. https:\/\/doi.org\/10.1109\/TDSC.2020.2982197","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"12_CR4","first-page":"978","volume":"19","author":"B Chen","year":"2022","unstructured":"Chen B, Lu W, Huang J et al (2022) Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans Dependable Secure Comput 19:978\u2013991","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3390\/sym16010045","volume":"16","author":"B Chen","year":"2024","unstructured":"Chen B, Yang R, Fang W, Zhan X, Cai J (2024) On the design of multi-party reversible data hiding over ciphered overexposed images. Symmetry 16:45. https:\/\/doi.org\/10.3390\/sym16010045","journal-title":"Symmetry"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"4968","DOI":"10.1109\/TCSVT.2022.3140974","volume":"32","author":"Z Hua","year":"2022","unstructured":"Hua Z, Wang Y, Yi S et al (2022) Reversible data hiding in encrypted images using cipher-feedback secret sharing. IEEE Trans Circ Syst Vid Technol 32:4968\u20134982","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","volume":"11","author":"F Huang","year":"2016","unstructured":"Huang F, Huang J, Shi YQ (2016) New framework for reversible data hiding in encrypted domain. IEEE Trans Inf Forensics Secur 11:2777\u20132789","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"2382","DOI":"10.1109\/JIOT.2023.3293165","volume":"11","author":"J Huang","year":"2024","unstructured":"Huang J, Cui Q, Zhou Z, Yu K, Yang CN, Choo KKR (2024) Encrypted domain secret medical-image sharing with secure outsourcing computation in iot environment. IEEE Internet Things J 11:2382\u20132393","journal-title":"IEEE Internet Things J"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22:2181\u20132191","journal-title":"IEEE Trans Image Process"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5:187\u2013193","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8:553\u2013562","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Ni Z, Shi Y, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Vid Technol 16:354\u2013362","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"12_CR13","first-page":"1831","volume":"18","author":"C Qin","year":"2021","unstructured":"Qin C, Jiang C, Mo Q et al (2021) Reversible data hiding in encrypted image via secret sharing based on $$GF(q)$$ and $$GF(2^{8})$$. J Real-Time Image Process 18:1831\u20131841","journal-title":"J Real-Time Image Process"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22:612\u2013613","journal-title":"Commun ACM"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"C Thien","year":"2002","unstructured":"Thien C, Lin J (2002) Secret image sharing. Comput Graph 26:765\u2013770","journal-title":"Comput Graph"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Thodi D, Rodr\u00edguez J (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721\u2013730","DOI":"10.1109\/TIP.2006.891046"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Vid Technol 13:890\u2013896","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"12_CR18","first-page":"197","volume":"41","author":"K Weng","year":"2023","unstructured":"Weng K, Qin J, Song T, Shi H (2023) Reversible data hiding in encrypted image based on dual-domain joint coding and secret sharing. J Appl Sci 41:197\u2013217","journal-title":"J Appl Sci"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.sigpro.2017.09.017","volume":"143","author":"X Wu","year":"2018","unstructured":"Wu X, Weng J, Yan W (2018) Adopting secret sharing for reversible data hiding in encrypted images. Signal Process 143:269\u2013281","journal-title":"Signal Process"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3512797","volume":"19","author":"L Xiong","year":"2023","unstructured":"Xiong L, Han X, Yang C, Xia Z (2023) RDH-DES: Reversible data hiding over distributed encrypted-image servers based on secret sharing. ACM Trans Multimed Comput Commun Appl 19:5","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.jss.2006.11.022","volume":"80","author":"C Yang","year":"2007","unstructured":"Yang C, Chen T, Yu K et al (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80:1070\u20131076","journal-title":"J Syst Softw"},{"key":"12_CR22","doi-asserted-by":"publisher","unstructured":"Yang X, He X, Zhao J, Zhang Y, Zhang S, Xie P (2020) Covidct-dataset: A ct scan dataset about covid-19. arXiv https:\/\/doi.org\/10.48550\/arXiv.2003.13865","DOI":"10.48550\/arXiv.2003.13865"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"3701","DOI":"10.1109\/TMM.2023.3314975","volume":"26","author":"Y Yao","year":"2024","unstructured":"Yao Y, Wang K, Chang Q, Weng S (2024) Reversible data hiding in encrypted images using global compression of zero-valued high bitplanes and block rearrangement. IEEE Trans Multimed 26:3701\u20133714. https:\/\/doi.org\/10.1109\/TMM.2023.3314975","journal-title":"IEEE Trans Multimed"},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"Z Yin","year":"2020","unstructured":"Yin Z, Xiang Y, Zhang X (2020) Reversible data hiding in encrypted images based on multi-msb prediction and huffman coding. IEEE Trans Multimed 22:874\u2013884. https:\/\/doi.org\/10.1109\/TMM.2019.2936314","journal-title":"IEEE Trans Multimed"},{"key":"12_CR25","first-page":"992","volume":"19","author":"Z Yin","year":"2022","unstructured":"Yin Z, Peng Y, Xiang Y (2022) Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans Dependable Secure Comput 19:992\u20131002","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1109\/TDSC.2020.3021875","volume":"19","author":"Z Yin","year":"2022","unstructured":"Yin Z, Peng Y, Xiang Y (2022) Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans Dependable Secure Comput 19:992\u20131002. https:\/\/doi.org\/10.1109\/TDSC.2020.3021875","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"6443","DOI":"10.1109\/TCSVT.2023.3271268","volume":"33","author":"CQ Yu","year":"2023","unstructured":"Yu CQ, Zhang XQ et al (2023) Reversible data hiding in encrypted images with secret sharing and hybrid coding. IEEE Trans Circ Syst Vid Technol 33:6443\u20136458. https:\/\/doi.org\/10.1109\/TCSVT.2023.3271268","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.ins.2021.12.020","volume":"584","author":"C Yu","year":"2022","unstructured":"Yu C, Zhang X, Li G, Zhan S, Tang Z (2022) Reversible data hiding with adaptive difference recovery for encrypted images. Inf Sci 584:89\u2013110. https:\/\/doi.org\/10.1016\/j.ins.2021.12.020","journal-title":"Inf Sci"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TCSVT.2021.3062947","volume":"32","author":"C Yu","year":"2022","unstructured":"Yu C, Zhang X, Zhang X, Li G, Tang Z (2022) Reversible data hiding with hierarchical embedding for encrypted images. IEEE Trans Circ Syst Vid Technol 32:451\u2013466. https:\/\/doi.org\/10.1109\/TCSVT.2021.3062947","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18:255\u2013258","journal-title":"IEEE Signal Process Lett"},{"key":"12_CR31","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensics Secur 7:826\u2013832","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00012-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00012-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00012-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T11:46:07Z","timestamp":1748605567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00012-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,24]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["12"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00012-7","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,24]]},"assertion":[{"value":"11 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose. The authors have no Conflict of interest to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"29"}}