{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:50:23Z","timestamp":1701478223694},"reference-count":0,"publisher":"IOS Press","isbn-type":[{"value":"9781643684444","type":"print"},{"value":"9781643684451","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>Reversible data hiding in encrypted domain takes encrypted data as the carrier to be embedded, which can embed secret information for lossless transmission on the basis of protecting data content. The reversibility of this technology can ensure that the original data can be recovered lossless after the secret information is extracted, which has important research significance for sensitive carrier data fields such as military, medical and judicial forensics. To better carry out related research of reversible data hiding in encrypted domain, different embedding frameworks of this technology are summarized in this paper.<\/jats:p>","DOI":"10.3233\/faia230885","type":"book-chapter","created":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T15:56:45Z","timestamp":1701446205000},"source":"Crossref","is-referenced-by-count":0,"title":["Different Embedding Frameworks of Reversible Information Hiding in Encrypted Domain"],"prefix":"10.3233","author":[{"given":"Yongjun","family":"Kong","sequence":"first","affiliation":[{"name":"Key Laboratory of Network and Information Security under Chinese People Armed Police Force, Chinese People\u2019s Armed Police Force Engineering University, Xi An 710086, China"}]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Network and Information Security under Chinese People Armed Police Force, Chinese People\u2019s Armed Police Force Engineering University, Xi An 710086, China"}]},{"given":"Zhang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Key Laboratory of Network and Information Security under Chinese People Armed Police Force, Chinese People\u2019s Armed Police Force Engineering University, Xi An 710086, China"}]},{"given":"Zhechao","family":"Song","sequence":"additional","affiliation":[{"name":"Fujian Corps of the Chinese People Armed Police Force, Fu Zhou, 350000"}]}],"member":"7437","container-title":["Frontiers in Artificial Intelligence and Applications","Advances in Artificial Intelligence, Big Data and Algorithms"],"original-title":[],"link":[{"URL":"https:\/\/ebooks.iospress.nl\/pdf\/doi\/10.3233\/FAIA230885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T15:56:46Z","timestamp":1701446206000},"score":1,"resource":{"primary":{"URL":"https:\/\/ebooks.iospress.nl\/doi\/10.3233\/FAIA230885"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"ISBN":["9781643684444","9781643684451"],"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/faia230885","relation":{},"ISSN":["0922-6389","1879-8314"],"issn-type":[{"value":"0922-6389","type":"print"},{"value":"1879-8314","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,30]]}}}