{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:14:29Z","timestamp":1774628069060,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2020,12,1]]},"DOI":"10.1587\/transfun.2020smp0029","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T22:14:28Z","timestamp":1606774468000},"page":"1579-1588","source":"Crossref","is-referenced-by-count":11,"title":["A Reversible Data Hiding Method in Compressible Encrypted Images"],"prefix":"10.1587","volume":"E103.A","author":[{"given":"Shoko","family":"IMAIZUMI","sequence":"first","affiliation":[{"name":"Graduate School of Engineering, Chiba University"}]},{"given":"Yusuke","family":"IZAWA","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Engineering, Chiba University"}]},{"given":"Ryoichi","family":"HIRASAWA","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Engineering, Chiba University"}]},{"given":"Hitoshi","family":"KIYA","sequence":"additional","affiliation":[{"name":"Faculty of System Design, Tokyo Metropolitan University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] Y.Q. Shi, X. Li, X. Zhang, H.T. Wu, and B. Ma, \u201cReversible data hiding: Advances in the past two decades,\u201d IEEE Access, vol.4, pp.3210-3237, 2016. 10.1109\/access.2016.2573308","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] Z. Ni, Y. -Q. Shi, N. Ansari, and W. Su, \u201cReversible data hiding,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.16, no.3, pp.354-362, 2006. 10.1109\/tcsvt.2006.869964","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] D.M. Thodi and J.J. Rodriguez, \u201cExpansion embedding techniques for reversible watermarking,\u201d IEEE Trans. Image Process., vol.16, no.3, pp.721-730, 2007. 10.1109\/tip.2006.891046","DOI":"10.1109\/TIP.2006.891046"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. Fujiyoshi, S. Sato, H.L. Jin, and H. Kiya, \u201cA location-map free reversible data hiding method using block-based single parameter,\u201d Proc. IEEE ICIP, vol.III, pp.257-260, 2007. 10.1109\/icip.2007.4379295","DOI":"10.1109\/ICIP.2007.4379295"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] X. Zhang, \u201cReversible data hiding in encrypted image,\u201d IEEE Signal Process. Lett., vol.18, no.4, pp.255-258, 2011. 10.1109\/lsp.2011.2114651","DOI":"10.1109\/LSP.2011.2114651"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] W. Hong, T.S. Chen, and H.Y. Wu, \u201cAn improved reversible data hiding in encrypted images using side match,\u201d IEEE Signal Process. Lett., vol.19, no.4, pp.199-202, 2012. 10.1109\/lsp.2012.2187334","DOI":"10.1109\/LSP.2012.2187334"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] L. Xiong, Z. Xu, and Y.Q. Shi, \u201cAn integer wavelet transform based scheme for reversible data hiding in encrypted images,\u201d Multidim. Syst. Sign. Process., vol.29, no.3, pp.1191-1202, 2018. 10.1007\/s11045-017-0497-5","DOI":"10.1007\/s11045-017-0497-5"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] X. Zhang, \u201cSeparable reversible data hiding in encrypted image,\u201d IEEE Trans. Inf. Forensics Security, vol.7, no.2, pp.826-832, 2012. 10.1109\/tifs.2011.2176120","DOI":"10.1109\/TIFS.2011.2176120"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] K. Ma, W. Zhang, X. Zhao, N. Yu, and F. Li, \u201cReversible data hiding in encrypted images by reserving room before encryption,\u201d IEEE Trans. Inf. Forensics Security, vol.8, no.3, pp.553-562, 2013. 10.1109\/tifs.2013.2248725","DOI":"10.1109\/TIFS.2013.2248725"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] X. Zhang, \u201cCommutative reversible data hiding and encryption,\u201d Secur. Commun. Netw., vol.6, no.11, pp.1396-1403, 2013. 10.1002\/sec.742","DOI":"10.1002\/sec.742"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] M.J. Weinberger, G. Seroussi, and G. Sapiro, \u201cThe LOCO-I lossless image compression algorithm: Principles and standardization into JPEG-LS,\u201d IEEE Trans. Image Process., vol.9, no.8, pp.1309-1324, 2000. 10.1109\/83.855427","DOI":"10.1109\/83.855427"},{"key":"12","unstructured":"[12] \u201cInformation technology-JPEG 2000 image coding system-Part 1: Core coding system,\u201d International Standard ISO\/IEC IS-15444-1, Dec. 2000."},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] M. Kumar and A. Vaish, \u201cAn efficient encryption-then-compression technique for encrypted images using SVD,\u201d Digit. Signal Process., vol.60, pp.81-89, 2017. 10.1016\/j.dsp.2016.08.011","DOI":"10.1016\/j.dsp.2016.08.011"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] J. Zhou, X. Liu, O.C. Au, and Y.Y. Tang, \u201cDesigning an efficient image encryption-then-compression system via prediction error clustering and random permutation,\u201d IEEE Trans. Inf. Forensics Security, vol.9, no.1, pp.39-50, 2014. 10.1109\/tifs.2013.2291625","DOI":"10.1109\/TIFS.2013.2291625"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] W. Liu, W. Zeng, L. Dong, and Q. Yao, \u201cEfficient compression of encrypted gray-scale images,\u201d IEEE Trans. Image Process., vol.19, no.4, pp.1097-1102, 2010. 10.1109\/tip.2009.2038773","DOI":"10.1109\/TIP.2009.2038773"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] M. Johnson, P. Ishwar, V. Prabhakaran, D. Schinberg, and K. Ramchandran, \u201cOn compressing encrypted data,\u201d IEEE Trans. Signal Process., vol.52, no.10, pp.2992-3006, 2004. 10.1109\/tsp.2004.833860","DOI":"10.1109\/TSP.2004.833860"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] K. Kurihara, M. Kikuchi, S. Imaizumi, S. Shiota, and H. Kiya, \u201cAn encryption-then-compression system for JPEG\/Motion JPEG standard,\u201d IEICE Trans. Fundamentals, vol.E98-A, no.11, pp.2238-2245, Nov. 2015. 10.1587\/transfun.e98.a.2238","DOI":"10.1587\/transfun.E98.A.2238"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] S. Imaizumi and H. Kiya, \u201cA block-permutation-based encryption scheme with independent processing of RGB components,\u201d IEICE Trans. Inf. &amp; Syst., vol.E101-D, no.12, pp.3150-3157, Dec. 2018. 10.1587\/transinf.2018edt0002","DOI":"10.1587\/transinf.2018EDT0002"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] K. Kurihara, S. Imaizumi, S. Shiota, and H. Kiya, \u201cAn encryption-then-compression system for lossless image compression standards,\u201d IEICE Trans. Inf. &amp; Syst., vol.E100-D, no.1, pp.52-56, Jan. 2017. 10.1587\/transinf.2016mul0002","DOI":"10.1587\/transinf.2016MUL0002"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] O. Watanabe, A. Uchida, T. Fukuhara, and H. Kiya, \u201cAn encryption-then-compression system for JPEG 2000 standard,\u201d Proc. IEEE ICASSP, pp.1226-1230, 2015. 10.1109\/icassp.2015.7178165","DOI":"10.1109\/ICASSP.2015.7178165"},{"key":"21","unstructured":"[21] [Online] Available: https:\/\/www.math.purdue.edu\/~lucier\/PHOTO_CD\/D65_TIFF_IMAGES\/"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] T. Chuman, K. Kurihara, and H. Kiya, \u201cOn the security of block scrambling-based EtC systems against extended jigsaw puzzle solver attacks,\u201d IEICE Trans. Inf. &amp; Syst., vol.E101-D, no.1, pp.37-44, Jan. 2018. 10.1587\/transinf.2017mup0001","DOI":"10.1587\/transinf.2017MUP0001"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] W. Sirichotedumrong and H. Kiya, \u201cGrayscale-based block scrambling image encryption using YCbCr color space for encryption-then-compression systems,\u201d APSIPA Trans. Signal Inform. Process., vol.8, e7, 2019. 10.1017\/atsip.2018.33","DOI":"10.1017\/ATSIP.2018.33"},{"key":"24","unstructured":"[24] A.G. Bluman, Elementary Statistics: A Step by Step Approach, 10th ed., McGraw-Hill, 2018."},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] C.K. Huang and H.H. Nien, \u201cMulti chaotic systems based pixel shuffle for image encryption,\u201d Opt. Commun., vol.282, no.11, pp.2123-2127, 2009. 10.1016\/j.optcom.2009.02.044","DOI":"10.1016\/j.optcom.2009.02.044"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] A. Belazi, A.A. Abd El-Latif, and S. Belghith, \u201cA novel image encryption scheme based on substitution-permutation network and chaos,\u201d Signal Process., vol.128, pp.155-170, 2016. 10.1016\/j.sigpro.2016.03.021","DOI":"10.1016\/j.sigpro.2016.03.021"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/12\/E103.A_2020SMP0029\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,5]],"date-time":"2020-12-05T05:20:57Z","timestamp":1607145657000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E103.A\/12\/E103.A_2020SMP0029\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,1]]},"references-count":26,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2020smp0029","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12,1]]}}}