{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:20:33Z","timestamp":1762377633090,"version":"3.38.0"},"reference-count":39,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055120","type":"journal-article","created":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T08:38:58Z","timestamp":1728117538000},"page":"1123-1155","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":3,"title":["Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption"],"prefix":"10.32604","volume":"81","author":[{"given":"Zongbao","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weina","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Fuqiang","family":"Di","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","article-title":"Industrial internet of things: Challenges, opportunities, and directions","volume":"14","author":"Sisinni","year":"Nov. 2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref2","first-page":"1323","article-title":"Encryption with image steganography based data hiding technique in IIoT environment","volume":"72","author":"Ragab","year":"Feb. 2022","journal-title":"Comput. Mater. Contin."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"7373","DOI":"10.1007\/s10489-021-02789-2","article-title":"Reversible data hiding: A contemporary survey of state-of-the-art, opportunities and challenges","volume":"52","author":"Kumar","year":"Sep. 2022","journal-title":"Appl. Intell."},{"key":"ref4","series-title":"Proc. Secur., Forensic., Steganograp., Watermarking Multimed. Contents X","first-page":"534","article-title":"A reversible data hiding method for encrypted images","author":"Puech","year":"Mar. 18, 2008"},{"key":"ref5","series-title":"2018 IEEE Int. Workshop Inform. Forensic. Secur. (WIFS)","first-page":"1","article-title":"Reversible data hiding in encrypted images with two-MSB prediction","author":"Puyang","year":"Dec. 2018"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"214732","DOI":"10.1109\/ACCESS.2020.3040048","article-title":"A reversible data hiding algorithm based on prediction error with large amounts of data hiding in spatial domain","volume":"8","author":"Li","year":"Nov. 2020","journal-title":"IEEE Access"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"4993","DOI":"10.1007\/s11042-023-15319-8","article-title":"A prediction error based reversible data hiding scheme in encrypted image using block marking and cover image pre-processing","volume":"83","author":"Panchikkil","year":"May 2023","journal-title":"Multimed. Tools Appl."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"3688","DOI":"10.1109\/TCYB.2022.3163245","article-title":"Lossless data hiding in encrypted images compatible with homomorphic processing","volume":"53","author":"Wu","year":"Jun. 2023","journal-title":"IEEE Trans. Cybern."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"3332","DOI":"10.1109\/TIFS.2019.2914557","article-title":"A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms","volume":"14","author":"Chen","year":"May 2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref10","first-page":"2924","article-title":"Cryptanalysis of reversible data hiding in encrypted images by block permutation and co-modulation","volume":"24","author":"Qu","year":"Jun. 2021","journal-title":"IEEE Trans. Multimed."},{"key":"ref11","doi-asserted-by":"crossref","first-page":"40607","DOI":"10.1007\/s11042-023-17242-4","article-title":"Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering","volume":"83","author":"Ren","year":"Apr. 2024","journal-title":"Multimed. Tools Appl."},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.114959","article-title":"A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion","volume":"183","author":"Wang","year":"Jun. 2024, Art. no. 114959","journal-title":"Chaos Solit. Fractals"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1016\/j.apm.2024.06.016","article-title":"Development of a video encryption algorithm for critical areas using 2D extended schaffer function map and neural networks","volume":"134","author":"Gao","year":"Oct. 2024","journal-title":"Appl. Math. Model."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"697","DOI":"10.19139\/soic-2310-5070-1952","article-title":"Securing color images with an innovative hybrid method combining DNA computing and chaotic systems","volume":"12","author":"Mansouri","year":"Feb. 2024","journal-title":"Stat. Optim. Inform. Comput."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1871","DOI":"10.1007\/s11071-022-07922-5","article-title":"Two-variable boosting bifurcation in a hyperchaotic map and its hardware implementation","volume":"111","author":"Wang","year":"Jan. 2023","journal-title":"Nonlinear Dyn."},{"key":"ref16","article-title":"A novel multistable chaotic system with 2 m-scroll attractor and its application","volume":"139","author":"Wang","year":"Jan. 2024","journal-title":"Eur. Phys. J. Plus"},{"key":"ref17","article-title":"Multiple mixed state variable incremental integration for reconstructing extreme multistability in a novel memristive hyperchaotic jerk system with multiple cubic nonlinearity","volume":"33","author":"Wang","year":"Jun. 2023","journal-title":"Chin. Phys. B"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2021.103060","article-title":"High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels","volume":"76","author":"Chen","year":"Apr. 2021, Art. no. 103060","journal-title":"J. Vis. Commun. Image Rep."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.ins.2021.02.079","article-title":"Reversible data hiding in encrypted images with block-based adaptive MSB encoding","volume":"567","author":"Wang","year":"Aug. 2021","journal-title":"Inf. Sci."},{"key":"ref20","article-title":"Optimal algorithm for color medical encryption and compression images based on DNA coding and a hyperchaotic system in the moments","volume":"50","author":"Bencherqui","year":"Feb. 2024, Art. no. 101612","journal-title":"Eng. Sci. Technol., Int. J."},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.114958","article-title":"Temporal action segmentation for video encryption","volume":"183","author":"Gao","year":"Jun. 2024, Art. no. 114958","journal-title":"Chaos Solit. Fractals"},{"key":"ref22","article-title":"High-capacity reversible data hiding in encrypted images based on prediction error compression and block selection","volume":"2021","author":"Wang","year":"2021, Art. no. 9606116","journal-title":"Secur. Commun. Netw."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"29347","DOI":"10.1007\/s11042-022-12710-9","article-title":"Efficient reversible data hiding in encrypted binary image with Huffman encoding and weight prediction","volume":"81","author":"Zhang","year":"Apr. 2022","journal-title":"Multimed. Tools Appl."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1109\/TCSVT.2019.2963393","article-title":"Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain","volume":"30","author":"Ke","year":"Aug. 2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref25","first-page":"978","article-title":"Secret sharing based reversible data hiding in encrypted images with multiple data-hiders","volume":"19","author":"Chen","year":"Jul. 2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref26","series-title":"Digit. Forensic. Watermarking: 19th Int. Workshop, IWDW 2020","first-page":"94","article-title":"On the sharing-based model of steganography","author":"Zhao","year":"Nov. 2020"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"3085","DOI":"10.1109\/TCC.2023.3259478","article-title":"Reversible data hiding in shared images based on syndrome decoding and homomorphism","volume":"11","author":"Xiong","year":"Mar. 2023","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"4968","DOI":"10.1109\/TCSVT.2022.3140974","article-title":"Reversible data hiding in encrypted images using cipher-feedback secret sharing","volume":"32","author":"Hua","year":"Jan. 2022","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1109\/TDSC.2022.3218570","article-title":"Matrix-based secret sharing for reversible data hiding in encrypted images","volume":"20","author":"Hua","year":"Nov. 2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"6443","DOI":"10.1109\/TCSVT.2023.3270882","article-title":"Reversible data hiding in encrypted images with secret sharing and hybrid coding","volume":"33","author":"Yu","year":"Apr. 2023","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1109\/TCSVT.2023.3298803","article-title":"Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing","volume":"34","author":"Hua","year":"Jul. 2023","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"Li","year":"Jun. 2015","journal-title":"IEEE Trans. Inf. Forensic. Secur."},{"key":"ref33","article-title":"A review of different prediction methods for reversible data hiding","volume":"7878","author":"Kumar","year":"Nov. 2023, Art. no. 103572","journal-title":"J. Inf. Secur. Appl."},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsp.2022.103870","article-title":"High-performance reversible data hiding in encrypted images with adaptive Huffman code","volume":"133","author":"Gao","year":"Mar. 2023, Art. no. 103870","journal-title":"Digit. Signal Process."},{"key":"ref35","series-title":"2007 IEEE Symp. Secur. Priv. (SP\u201907)","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"Bethencourt","year":"Jun. 2007"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","article-title":"Break our steganographic system: The ins and outs of organizing BOSS","author":"Bas","year":"May 2011","journal-title":"Information Hiding"},{"key":"ref37","unstructured":"P. Bas and T. Furon, \u201cImage database of BOWS-2,\u201d vol. 20, pp. 2016\u20132017. Accessed: Jun. 20, 2017. [Online]. Available: https:\/\/dde.binghamton.edu\/download\/"},{"key":"ref38","series-title":"Storage Retr. Methods Appl. Multimed. 2004","first-page":"472","article-title":"UCID: An uncompressed color image database","author":"Schaefer","year":"Dec. 2003"},{"key":"ref39","first-page":"31","article-title":"NPCR and UACI randomness tests for image encryption","volume":"1","author":"Wu","year":"2011","journal-title":"Cyber J.: Multidiscip. J. Sci. Technol., J. Selected Areas Telecommun. (JSAT)"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_55120\/TSP_CMC_55120.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:37:21Z","timestamp":1741315041000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58330"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":39,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055120","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}