{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T00:01:28Z","timestamp":1762300888224,"version":"3.41.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFB2700200"],"award-info":[{"award-number":["2021YFB2700200"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372022","62002006","U2241213","U21B2021","62172025","61932011","61932014","61972018","61972019","61772538","32071775","91646203"],"award-info":[{"award-number":["62372022","62002006","U2241213","U21B2021","62172025","61932011","61932014","61972018","61972019","61772538","32071775","91646203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Defense Industrial Technology Development Program","award":["JCKY2021211B017"],"award-info":[{"award-number":["JCKY2021211B017"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tmc.2025.3538885","type":"journal-article","created":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T19:19:45Z","timestamp":1738783185000},"page":"5808-5823","source":"Crossref","is-referenced-by-count":1,"title":["How to Prevent Social Media Platforms From Knowing the Images You Share With Friends"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1548-2666","authenticated-orcid":false,"given":"Dawei","family":"Li","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1830-0927","authenticated-orcid":false,"given":"Yuxiao","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6431-8515","authenticated-orcid":false,"given":"Di","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3853-1686","authenticated-orcid":false,"given":"Qifan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0467-6203","authenticated-orcid":false,"given":"Song","family":"Bian","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3959-338X","authenticated-orcid":false,"given":"Zhenyu","family":"Guan","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036101"},{"article-title":"On privacy-enhanced distributed analytics in online social networks","year":"2022","author":"Wainakh","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435351"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3512907"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.86"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890919"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3468220"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1236-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3165265"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC52172.2021.9615815"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2881677"},{"key":"ref14","article-title":"Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction","volume-title":"Expert Syst. Appl.","volume":"229","author":"Duan","year":"2023"},{"issue":"6","key":"ref15","first-page":"2951","article-title":"Image steganography using exploiting modification direction for compressed encrypted data","volume-title":"J. King Saud Univ. Comput. Inf. Sci.","volume":"34","author":"Younus","year":"2022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2018.8599926"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1017\/ATSIP.2018.33"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133264.3133281"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-022-00629-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01833-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08268-8"},{"article-title":"Graph analysis in decentralized online social networks with fine-grained privacy protection","year":"2022","author":"Zheng","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3494067"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517520"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737466"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205981"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93944-1_5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3158373"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3547299"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3224243"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3197781"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019487"},{"article-title":"Recovering the block-wise relationship in an encryption-then-compression system","year":"2023","author":"Li","key":"ref33"},{"issue":"6","key":"ref34","article-title":"Decentralized broadcast encryption schemes with constant size ciphertext and fast decryption","volume-title":"Symmetry","volume":"12","author":"Malluhi","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3113660"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2018.2869333"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484542"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2022.3220838"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64378-2_8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15979-4_2"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-48621-0_10","article-title":"On the cost of post-compromise security in concurrent continuous group-key agreement","volume-title":"Cryptol. ePrint Arch.","author":"Auerbach","year":"2023"},{"article-title":"TreeKEM: Asynchronous decentralized key management for large dynamic groups a protocol proposal for messaging layer security (MLS)","year":"2018","author":"Bhargavan","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00035"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560632"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484817"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243747"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-07085-3_28"},{"key":"ref50","article-title":"Decaf: Decentralizable continuous group key agreement with fast healing","volume-title":"Cryptol. ePrint Arch.","author":"Alwen","year":"2022"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2986341"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.275"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5540212"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11025553\/10874142.pdf?arnumber=10874142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T17:44:13Z","timestamp":1749231853000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10874142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":53,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3538885","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}