{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:25Z","timestamp":1750309525182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,18]]},"DOI":"10.1145\/3702370.3702374","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T07:23:21Z","timestamp":1733729001000},"page":"19-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Reversible Data Hiding in Shared Aerial Remote Sensing Images for Hierarchical Management"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9616-3098","authenticated-orcid":false,"given":"Haina","family":"Wang","sequence":"first","affiliation":[{"name":"Shandong Normal University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3882-3582","authenticated-orcid":false,"given":"Lili","family":"Meng","sequence":"additional","affiliation":[{"name":"Shandong Normal University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9132-6684","authenticated-orcid":false,"given":"Jing","family":"Li","sequence":"additional","affiliation":[{"name":"Shandong Normal University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9218-5916","authenticated-orcid":false,"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shandong Normal University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4436-479X","authenticated-orcid":false,"given":"Yannan","family":"Ren","sequence":"additional","affiliation":[{"name":"Shandong Jiao Tong University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1447-0524","authenticated-orcid":false,"given":"Wenbo","family":"Wan","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering Shandong Normal University, Jinan, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,8]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Zhengxia Zou Zhenwei Shi. 2018. Random Access Memories: A New Paradigm for Target Detection in High Resolution Aerial Remote Sensing Images. in IEEE Transactions on Image Processing. 27(3)1100-1111. 10.1109\/TIP.2017.2773199.","DOI":"10.1109\/TIP.2017.2773199"},{"key":"e_1_3_3_1_3_2","unstructured":"Naor M Shamir A.1995. 1994. Workshop on the theory and application of cryptographic techniques on Advances in cryptology. Springer-Verlag Berlin Heidelberg."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Chih-Ching Thien Ja-Chen Lin. Secret image sharing. Computers & Graphics 26(5) 765\u2013770. 10.1016\/S0097-8493(02)00131-0","DOI":"10.1016\/S0097-8493(02)00131-0"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Yanxiao liu Chingnung Yang Chiming Wu. et al. 2019. Threshold changeable secret im-age sharing scheme based on interpolation polynomial. Multimedia Tools and Applica-tions.78 18653\u201318667. 10.1007\/s11042-019-7205-4 https:\/\/dl.acm.org\/doi\/10.1007\/s11042-019-7205-4","DOI":"10.1007\/s11042-019-7205-4"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Ferucio Lauren\u0163iu \u0162iplea Constantin C\u0103t\u0103lin Dr\u0103gan. 2021. Asymptotically ideal Chinese remainder theorem -based secret sharing schemes for multilevel and compartmented access structures. IET Information 15(4). 282-296. 10.1049\/ise2.12014 https:\/\/dl.acm.org\/doi\/10.1049\/ise2.12014","DOI":"10.1049\/ise2.12014"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Xuehe Han Yuliang Lu Lintao Liu. 2019. A general progressive secret image sharing construction method. Signal Processing: Image Communication. 71 66\u201375. 10.1016\/j.image.2018.11.002","DOI":"10.1016\/j.image.2018.11.002"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Lizhi Xiong Xiao Han Chingnung Yang. 2021. CP-PSIS: CRT and polynomial-based progressive secret image sharing. Signal Processing. 185 108064.https:\/\/doi.org\/10.1016\/j.sigpro.2021.108064.","DOI":"10.1016\/j.sigpro.2021.108064"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Xiaotian Wu Jian Weng Weiqi Yan. 2018. Adopting secret sharing for reversible data hid-ing in encrypted images. Signal Processing. 143 269\u2013281. 10.1016\/j.sigpro.2017.09.017 https:\/\/dl.acm.org\/doi\/10.1016\/j.sigpro.2017.09.017","DOI":"10.1016\/j.sigpro.2017.09.017"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Yuchi Chen Tsunghsuan Hung Sung-Hsien Hsieh et al. 2019. A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans. Inf. Forensics Secur. 14(12) 3332\u20133343. 10.1109\/TIFS.2019.2914557","DOI":"10.1109\/TIFS.2019.2914557"},{"key":"e_1_3_3_1_11_2","unstructured":"Bing Chen Wei Lu Jiwu Huang Jian Weng et al. 2022. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans. Dependable Secure Com-put. 19(2) 978\u2013991. 10.1109\/TDSC.2020.3011923"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Chuan Qin Chanyu Jiang Qun Mo Heng Yao et al.2022. Reversible data hiding in encrypted image via secret sharing based on GF(p) and GF(28). IEEE Trans. Circuits Syst. Video Technol. 32(4) 1928\u20131941. 10.1109\/TCSVT.2021.3091319","DOI":"10.1109\/TCSVT.2021.3091319"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Zhongyun Hua Yanxiang Wang Shuang Yi et al.2022. Reversible data hiding in encrypted images using cipher-feedback secret sharing. IEEE Trans. Circuits Syst. Video Technol. 32(8) 4968\u20134982. 10.1109\/TCSVT.2022.3140974","DOI":"10.1109\/TCSVT.2022.3140974"}],"event":{"name":"ICAIP 2024: 2024 8th International Conference on Advances in Image Processing (ICAIP)","acronym":"ICAIP 2024","location":"Chengdu China"},"container-title":["Proceedings of the 2024 8th International Conference on Advances in Image Processing (ICAIP)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702370.3702374","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3702370.3702374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:09Z","timestamp":1750295889000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702370.3702374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"references-count":12,"alternative-id":["10.1145\/3702370.3702374","10.1145\/3702370"],"URL":"https:\/\/doi.org\/10.1145\/3702370.3702374","relation":{},"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"2024-12-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}