{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:16:01Z","timestamp":1770884161819,"version":"3.50.1"},"reference-count":28,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2021,1,1]]},"DOI":"10.1587\/transinf.2020mup0006","type":"journal-article","created":{"date-parts":[[2020,12,31]],"date-time":"2020-12-31T22:31:03Z","timestamp":1609453863000},"page":"43-50","source":"Crossref","is-referenced-by-count":7,"title":["A Scheme of Reversible Data Hiding for the Encryption-Then-Compression System"],"prefix":"10.1587","volume":"E104.D","author":[{"given":"Masaaki","family":"FUJIYOSHI","sequence":"first","affiliation":[{"name":"Tokyo Metropolitan University"}]},{"given":"Ruifeng","family":"LI","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University"}]},{"given":"Hitoshi","family":"KIYA","sequence":"additional","affiliation":[{"name":"Tokyo Metropolitan University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] A. Piva and S. Katzenbeisser, eds., \u201cEditorial: signal processing in the encrypted domain,\u201d EURASIP J. Information Security, vol.2007, July 2007. 10.1155\/2007\/82790","DOI":"10.1155\/2007\/82790"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] M. Fujiyoshi, K. Kuroiwa, and H. Kiya, \u201cA scrambling method for Motion JPEG videos enabling moving objects detection from scrambled videos,\u201d Proc. IEEE Int. Conf. Image Process., San Diego, CA, the U.S., pp.773-776, Oct. 2008. 10.1109\/ICIP.2008.4711869","DOI":"10.1109\/ICIP.2008.4711869"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, and K. Ramchandran, \u201cOn compressing encrypted data,\u201d IEEE Trans. Signal Process., vol.52, no.10, pp.2992-3006, Oct. 2004. 10.1109\/TSP.2004.833860","DOI":"10.1109\/TSP.2004.833860"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] D. Schonberg, S.C. Draper, C. Yeo, and K. Ramchandran, \u201cToward compression of encrypted images and video sequences,\u201d IEEE Trans. Inf. Forensics Security, vol.3, no.4, pp.749-762, Dec. 2008. 10.1109\/TIFS.2008.2007244","DOI":"10.1109\/TIFS.2008.2007244"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] W. Liu, W. Zeng, L. Dong, and Q. Yao, \u201cEfficient compression of encrypted grayscale images,\u201d IEEE Trans. Image Process., vol.19, no.4, pp.1097-1102, April 2010. 10.1109\/TIP.2009.2038773","DOI":"10.1109\/TIP.2009.2038773"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] X. Zhang, \u201cLossy compression and iterative reconstruction for encrypted image,\u201d IEEE Trans. Inf. Forensics Security, vol.6, no.1, pp.53-58, March 2011. 10.1109\/TIFS.2010.2099114","DOI":"10.1109\/TIFS.2010.2099114"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] X. Zhang, G. Feng, Y. Ren, and Z. Qian, \u201cScalable coding of encrypted images,\u201d IEEE Trans. Image Process., vol.21, no.6, pp.3108-3114, June 2012. 10.1109\/TIP.2012.2187671","DOI":"10.1109\/TIP.2012.2187671"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] J. Zhou, X. Liu, O.C. Au, and Y.Y. Tang, \u201cDesigning an efficient image encryption-then-compression system via prediction error clustering and random permutation,\u201d IEEE Trans. Inf. Forensics Security, vol.9, no.1, pp.39-50, Jan. 2014. 10.1109\/TIFS.2013.2291625","DOI":"10.1109\/TIFS.2013.2291625"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] K. Kurihara, M. Kikuchi, S. Imaizumi, S. Shiota, and H. Kiya, \u201cAn encryption-then-compression system for JPEG\/Motion JPEG standard,\u201d IEICE Trans. Fundamentals, vol.E98-A, no.11, pp.2238-2245, Nov. 2015. 10.1587\/transfun.E98.A.2238","DOI":"10.1587\/transfun.E98.A.2238"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] W. Sirichotedumrong, Y. Kinoshita, and H. Kiya, \u201cPixel-based image encryption without key management for privacy-preserving deep neural networks,\u201d IEEE Access, vol.7, pp.177844-177855, Dec. 2019. 10.1109\/ACCESS.2019.2959017","DOI":"10.1109\/ACCESS.2019.2959017"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] T. Nakachi, Y. Bandoh, and H. Kiya, \u201cSecure overcomplete dictionary learning for sparse representation,\u201d IEICE Trans. Inf. &amp; Syst., vol.E103-D, no.1, pp.50-58, Jan. 2020. 10.1587\/transinf.2019MUP0009","DOI":"10.1587\/transinf.2019MUP0009"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] X. Zhang, \u201cSeparable reversible data hiding in encrypted image,\u201d IEEE Trans. Inf. Forensics Security, vol.7, no.2, pp.826-832, April 2012. 10.1109\/TIFS.2011.2176120","DOI":"10.1109\/TIFS.2011.2176120"},{"key":"13","unstructured":"[13] M. Fujiyoshi, \u201cA separable lossless data embedding scheme in encrypted images considering hierarchical privilege,\u201d Proc. EURASIP European Signal Process. Conference, Tu-P3.13, Marrakech, Morocco, Sept. 2013."},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] X. Zhang, \u201cCommutative reversible data hiding and encryption,\u201d Security and Communication Networks, vol.6, no.11, pp.1396-1403, Nov. 2013. 10.1002\/sec.742","DOI":"10.1002\/sec.742"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] K. Wong and H. Kiya, \u201cReversible data hiding for compression-friendly image encryption method,\u201d Proc. APSIPA Annual Sumit and Conference, Kuala Lumpur, Malaysia, Dec. 2017. 10.1109\/APSIPA.2017.8282213","DOI":"10.1109\/APSIPA.2017.8282213"},{"key":"16","unstructured":"[16] Y. Izawa, R. Hirasawa, S. Imaizumi, and H. Kiya, \u201cA reversible data hiding method for both plain and encrypted images,\u201d IEICE Technical Report, vol.119, no.335, pp.29-34, Dec. 2019."},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] T. Chuman, K. Kurihara, and H. Kiya, \u201cOn the security of block scrambling-based EtC systems against extended jigsaw puzzle solver attacks,\u201d IEICE Trans. Inf. &amp; Syst., vol.E101-D, no.1, pp.37-44, Jan. 2018. 10.1587\/transinf.2017MUP0001","DOI":"10.1587\/transinf.2017MUP0001"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] R. Caldelli, F. Filippini, and R. Becarelli, \u201cReversible watermarking techniques: An overview and a classification,\u201d EURASIP J. Information Security, vol.2010, no.134546, 2010. 10.1155\/2010\/134546","DOI":"10.1155\/2010\/134546"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] Y.Q. Shi, X. Li, X. Zhang, H.T. Wu, and B. Ma, \u201cReversible data hiding: Advances in the past two decades,\u201d IEEE Access, vol.4, pp.3210-3237, May 2016. 10.1109\/ACCESS.2016.2573308","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] S. Han, M. Fujiyoshi, and H. Kiya, \u201cA reversible image authentication method without memorization of hiding parameters,\u201d IEICE Trans. Fundamentals, vol.E92-A, no.10, pp.2572-2579, Oct. 2009. 10.1587\/transfun.E92.A.2572","DOI":"10.1587\/transfun.E92.A.2572"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] M. Fujiyoshi and H. Kiya, \u201cA blind reversible data hiding method for high dynamic range images taking advantage of sparse histogram,\u201d LNCS, vol.10431, pp.347-361, Springer Berlin Heidelberg, Magdeburg, Germany, Aug. 2017. 10.1007\/978-3-319-64185-0_26","DOI":"10.1007\/978-3-319-64185-0_26"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, \u201cReversible data hiding,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.16, no.3, pp.354-362, March 2006. 10.1109\/TCSVT.2006.869964","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] J. Tian, \u201cReversible data embedding using a difference expansion,\u201d IEEE Trans. Circuits Syst. Video Technol., vol.13, no.8, pp.890-896, Aug. 2003. 10.1109\/TCSVT.2003.815962","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"24","unstructured":"[24] Signal &amp; Image Processing Institute, University of Southern Cali-fornia, \u201cThe USC-SIPI Image Database.\u201d http:\/\/sipi.usc.edu\/database\/"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[25] Z. Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli, \u201cImage quality assessment: From error visibility to structural similarity,\u201d IEEE Trans. Image Process., vol.13, no.4, pp.600-612, April 2004. 10.1109\/TIP.2003.819861","DOI":"10.1109\/TIP.2003.819861"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] H.L. Jin, M. Fujiyoshi, and H. Kiya, \u201cLossless data hiding in the spatial domain for high quality images,\u201d IEICE Trans. Fundamentals, vol.E90, no.4, pp.771-777, April 2007. 10.1093\/ietfec\/e90-a.4.771","DOI":"10.1093\/ietfec\/e90-a.4.771"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] M. Fujiyoshi, S. Sato, H.L. Jin, and H. Kiya, \u201cA location-map free reversible data hiding method using block-based single parameter,\u201d Proc. IEEE Int. Conf. Image Process., San Antonio, TX, the U.S., vol.III, pp.257-260, Sept. 2007. 10.1109\/ICIP.2007.4379295","DOI":"10.1109\/ICIP.2007.4379295"},{"key":"28","unstructured":"[28] Information technology \u2014 JPEG 2000 image coding system-Part 1: Core coding system, Int. Std. ISO\/IEC IS-15444-1, Dec. 2000. JPEG 2000."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/1\/E104.D_2020MUP0006\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T03:26:37Z","timestamp":1609557997000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/1\/E104.D_2020MUP0006\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2020mup0006","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}