{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:08:38Z","timestamp":1778166518899,"version":"3.51.4"},"reference-count":47,"publisher":"Association for Computing Machinery (ACM)","issue":"12","license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62162006, 62272111, 62462006, U22B2047"],"award-info":[{"award-number":["62162006, 62272111, 62462006, U22B2047"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,12,31]]},"abstract":"<jats:p>\n            Reversible data hiding (RDH) in encrypted images has emerged as an effective technique for securely storing and managing confidential images in the cloud. However, most RDH methods in shared images (RDHSI) are designed for uncompressed images and cannot be applied for JPEG images. To address this issue, we propose a novel RDH in shared JPEG images. Our method consists of JPEG image sharing and data hiding in JPEG shares, which are both conducted on JPEG bit-stream. Specifically, the DC appended bits (DCA) and AC appended bits (ACA) derived from the original JPEG bit-stream are shared by (\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(k\\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            ,\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(n\\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            ) threshold Chinese remainder theorem-based secret sharing (CRTSS) with two different constraints, one for DC sharing and another for AC sharing. The constraint of DC sharing ensures that the DC coefficient shares do not overflow. The constraint of AC sharing ensures the sizes of ACA shares are less than the sizes of the original ACA so that the embedding room can be vacated from each shared JPEG bit-stream. Each data-hider can embed the secret data into the personal JPEG share. The original JPEG image can be recovered losslessly from any\n            <jats:inline-formula content-type=\"math\/tex\">\n              <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(k\\)<\/jats:tex-math>\n            <\/jats:inline-formula>\n            JPEG shares. The proposed sharing and data hiding are both well compatible with the JPEG standard. Experimental results demonstrate that the proposed method not only well preserves the file size whether the JPEG shares or marked JPEG shares but also achieves outstanding security performance and a high embedding capacity.\n          <\/jats:p>","DOI":"10.1145\/3695463","type":"journal-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:06:47Z","timestamp":1725901607000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Reversible Data Hiding in Shared JPEG Images"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7221-0168","authenticated-orcid":false,"given":"Chunqiang","family":"Yu","sequence":"first","affiliation":[{"name":"Key Lab of Education Blockchain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6204-5050","authenticated-orcid":false,"given":"Shichao","family":"Cheng","sequence":"additional","affiliation":[{"name":"Key Lab of Education Blockchain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3359-117X","authenticated-orcid":false,"given":"Xianquan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Lab of Education Blockchain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0212-3501","authenticated-orcid":false,"given":"Xinpeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3664-1363","authenticated-orcid":false,"given":"Zhenjun","family":"Tang","sequence":"additional","affiliation":[{"name":"Key Lab of Education Blockchain and Intelligent Technology, Ministry of Education, Guangxi Normal University, Guilin, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3237136"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3070348"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3539661"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534565"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2969463"},{"issue":"2","key":"e_1_3_1_7_2","first-page":"1420","article-title":"High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping","volume":"19","author":"Du Yang","year":"2020","unstructured":"Yang Du, Zhaoxia Yin, and Xinpeng Zhang. 2020. High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. IEEE Transactions on Dependable and Secure Computing 19, 2 (2020), 1420\u20131433.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.12.055"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4230-4"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2018.1505024"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4775-x"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3241541"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2799381"},{"issue":"1","key":"e_1_3_1_15_2","first-page":"9103418","article-title":"Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image","volume":"2018","author":"Yu Chunqiang","year":"2018","unstructured":"Chunqiang Yu, Xian quan Zhang, Zhenjun Tang, Yan Chen, and Jingyu Huang. 2018. Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image. Security and Communication Networks 2018, 1 (2018), 9103418.","journal-title":"Security and Communication Networks"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2936314"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2952979"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3062947"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3163905"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2844679"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.10.050"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2418611"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2598528"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3001735"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3225644"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.09.017"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2316154"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2634161"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.11.003"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2882850"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3208030"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2817065"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3011923"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3091319"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3081575"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3140974"},{"issue":"5","key":"e_1_3_1_40_2","first-page":"3669","article-title":"Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images","volume":"20","author":"Hua Zhongyun","year":"2022","unstructured":"Zhongyun Hua, Yanxiang Wang, Shuang Yi, Yifeng Zheng, Xingyu Liu, Yongyong Chen, and Xin Peng Zhang. 2022. Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images. IEEE Transactions on Dependable and Secure Computing 20, 5 (2023), 3669\u20133686.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3270882"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2023.3259478"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"e_1_3_1_45_2","article-title":"Digital Compression and Coding of Continuous-Tone Still Images: Requirements and Guidelines","volume":"81","author":"Mitchell J.","year":"1992","unstructured":"J. Mitchell. 1992. Digital Compression and Coding of Continuous-Tone Still Images: Requirements and Guidelines. ITU-T Recommendation T 81 (1992).","journal-title":"ITU-T Recommendation T"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2012.6466845"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.525375"},{"key":"e_1_3_1_48_2","first-page":"59","volume-title":"Proceedings of the 13th International Conference on Information Hiding","author":"Bas Patrick","year":"2011","unstructured":"Patrick Bas, Tom\u00e1\u0161 Filler, and Tom\u00e1\u0161 Pevn\u1ef3. 2011. \u201cBreak Our Steganographic System\u201d: The Ins and Outs of Organizing BOSS. In Proceedings of the 13th International Conference on Information Hiding, 59\u201370."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695463","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3695463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:11Z","timestamp":1750294691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3695463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"references-count":47,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1145\/3695463"],"URL":"https:\/\/doi.org\/10.1145\/3695463","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"2024-03-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-03","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}