{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:40Z","timestamp":1750219720183,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T00:00:00Z","timestamp":1684454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,19]]},"DOI":"10.1145\/3604078.3604141","type":"proceedings-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T16:46:07Z","timestamp":1698338767000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Reversible Data Hiding in Encrypted Images Combined with Chaotic System Based on Pixel Prediction and Bit Plane Compression"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-2178-0624","authenticated-orcid":false,"given":"Yijia","family":"Dai","sequence":"first","affiliation":[{"name":"Faculty of Applied Sciences, Macao Polytechnic University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1742-3224","authenticated-orcid":false,"given":"Ka-Cheng","family":"Choi","sequence":"additional","affiliation":[{"name":"Faculty of Applied Sciences, Macao Polytechnic University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.16644\/j.cnki.cn33-1094"},{"issue":"18","key":"e_1_3_2_1_2_1","first-page":"85","article-title":"on information hiding technology and application areas","volume":"18","author":"Pengfei Zhan","year":"2021","unstructured":"Zhan Pengfei , 'Research on information hiding technology and application areas ', Wireless Interconnection Technology , vol. 18 , no. 18 , pp. 85 - 86 , 2021 . Zhan Pengfei, 'Research on information hiding technology and application areas', Wireless Interconnection Technology, vol. 18, no. 18, pp. 85-86, 2021.","journal-title":"Wireless Interconnection Technology"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118991863745"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2019.0051"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.5.1.10-15"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.18178\/joig.6.1.64-68"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2936314"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3019490"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.855427"},{"issue":"10","key":"e_1_3_2_1_11_1","first-page":"323","article-title":"of colour image encryption schemes based on Zigzag transform with chaos","volume":"36","author":"Ping Wen He","year":"2019","unstructured":"Wen He Ping , 'Deciphering of colour image encryption schemes based on Zigzag transform with chaos ', Computer Applications and Software , vol. 36 , no. 10 , pp. 323 - 328 +333, 2019 . Wen He Ping, 'Deciphering of colour image encryption schemes based on Zigzag transform with chaos', Computer Applications and Software, vol. 36, no. 10, pp. 323-328+333, 2019.","journal-title":"Computer Applications and Software"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2013.12.003"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0115773"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2013.12.003"},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/ieeexplore.ieee.org\/document\/8301018 (accessed","author":"Encryption Algorithm An Image","year":"2023","unstructured":"An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map | IEEE Journals & Magazine | IEEE Xplore\u2019 . https:\/\/ieeexplore.ieee.org\/document\/8301018 (accessed Mar. 20, 2023 ). An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map | IEEE Journals & Magazine | IEEE Xplore\u2019. https:\/\/ieeexplore.ieee.org\/document\/8301018 (accessed Mar. 20, 2023)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1140\/epjp"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5817-8"}],"event":{"name":"ICDIP 2023: The 15th International Conference on Digital Image Processing","acronym":"ICDIP 2023","location":"Nanjing China"},"container-title":["Proceedings of the 15th International Conference on Digital Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604078.3604141","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604078.3604141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:17Z","timestamp":1750178177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604078.3604141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,19]]},"references-count":18,"alternative-id":["10.1145\/3604078.3604141","10.1145\/3604078"],"URL":"https:\/\/doi.org\/10.1145\/3604078.3604141","relation":{},"subject":[],"published":{"date-parts":[[2023,5,19]]},"assertion":[{"value":"2023-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}