{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T17:21:03Z","timestamp":1717867263051},"reference-count":43,"publisher":"Institution of Engineering and Technology (IET)","issue":"10","license":[{"start":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T00:00:00Z","timestamp":1563148800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T00:00:00Z","timestamp":1563148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572452","U1636201"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET image process"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1049\/iet-ipr.2018.6120","type":"journal-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T02:51:25Z","timestamp":1559789485000},"page":"1705-1713","source":"Crossref","is-referenced-by-count":7,"title":["Prediction error expansion\u2010based reversible data hiding in encrypted images with public key cryptosystem"],"prefix":"10.1049","volume":"13","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2227-9797","authenticated-orcid":false,"given":"Mohsin","family":"Shah","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefei230026People's Republic of China"}]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefei230026People's Republic of China"}]},{"given":"Honggang","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefei230026People's Republic of China"}]},{"given":"Xiaojuan","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefei230026People's Republic of China"}]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of ChinaHefei230026People's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2019,7,15]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"BartonJ.M.: \u2018Method and apparatus for embedding authentication information within digital data\u2019. Google Patents US Patent 5 646 997 1997"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"issue":"2","key":"e_1_2_7_5_1","doi-asserted-by":"crossref","first-page":"986842","DOI":"10.1155\/S1110865702000537","article-title":"Lossless data embedding, new paradigm in digital watermarking","volume":"2002","author":"Fridrich J.","year":"2002","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2017.0151"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.891046"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2009.0316"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"issue":"2","key":"e_1_2_7_11_1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MSP.2012.2228533","article-title":"Secure signal processing in the cloud: enabling technologies for privacy\u2010preserving multimedia cloud processing","volume":"30","author":"Troncoso\u2010Pastoriza J.R.","year":"2013","journal-title":"IEEE Signal Process. Mag."},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2187334"},{"key":"e_1_2_7_14_1","unstructured":"2013 Int. Conf. in Swarm Intelligence Berlin Germany W. Hong T.S. Chen J. Chen Reversible data embedment for encrypted cartoon images using unbalanced bit flipping 208 214"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248725"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.06.023"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2316154"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4957-6"},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","article-title":"High\u2010capacity reversible data hiding in encrypted images by prediction error","volume":"104","author":"Wu X.","year":"2014","journal-title":"Signal Process."},{"issue":"7","key":"e_1_2_7_21_1","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","article-title":"An efficient MSB prediction\u2010based method for highcapacity reversible data hiding in encrypted images","volume":"13","author":"Puteaux P.","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"e_1_2_7_22_1","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1016\/j.ijleo.2017.11.154","article-title":"Error\u2010free reversible data hiding with high capacity in encrypted image","volume":"157","author":"Tang Z.","year":"2018","journal-title":"Optik\u2010Int. J. Light Electron Opt."},{"key":"e_1_2_7_23_1","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.ins.2018.07.021","article-title":"Reversible data hiding in encrypted image with separable capability and high embedding capacity","volume":"465","author":"Qin C.","year":"2018","journal-title":"Inf. Sci."},{"issue":"11","key":"e_1_2_7_24_1","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest R.L.","year":"1978","journal-title":"Found. Secure Comput."},{"key":"e_1_2_7_25_1","unstructured":"1999 Int. Conf. on the Theory and Applications of Cryptographic Techniques Berlin Germany P. Paillier Public\u2010key cryptosystems based on composite degree residuosity classes 223 238"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_2_7_27_1","unstructured":"2001 Int. Workshop on Public Key Cryptography Cheju Island South Korea I. Damg\u00e5rd M. Jurik A generalisation a simplification and some applications of Paillier's probabilistic public\u2010key system 119 136"},{"key":"e_1_2_7_28_1","unstructured":"2011 Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques Berlin Germany C. Gentry S. Halevi Implementing gentry's fully\u2010homomorphic encryption scheme 129 148"},{"issue":"5","key":"e_1_2_7_29_1","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","article-title":"Encrypted signal\u2010based reversible data hiding with public key cryptosystem","volume":"25","author":"Chen Y.\u2010C.","year":"2014","journal-title":"J. Vis. Commun. Image Represent."},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.09.014"},{"key":"e_1_2_7_31_1","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jvcir.2016.09.005","article-title":"Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer","volume":"41","author":"Wu X.","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"key":"e_1_2_7_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2433194"},{"issue":"11","key":"e_1_2_7_33_1","doi-asserted-by":"crossref","first-page":"3099","DOI":"10.1109\/TCSVT.2017.2742023","article-title":"Reversible data hiding in homomorphic encrypted domain by mirroring ciphertext group","volume":"28","author":"Xiang S.","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"e_1_2_7_34_1","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1186\/s13634-017-0496-6","article-title":"Efficient reversible data hiding in encrypted image with public key cryptosystem","volume":"2017","author":"Xiang S.","year":"2017","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855393"},{"key":"e_1_2_7_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"issue":"1","key":"e_1_2_7_37_1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.2307\/1967798","article-title":"On the numerical factors of the arithmetic forms","volume":"15","author":"Carmichael R.D.","year":"1913","journal-title":"The Ann. Math."},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"e_1_2_7_39_1","unstructured":"2001 Cryptography and Lattices Berlin Germany P.Q. Nguyen J. Stern The two faces of lattices in cryptology 146 180"},{"key":"e_1_2_7_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"e_1_2_7_41_1","unstructured":"RitterH. andR\u00f6ssnerC.: \u2018Factoring via strong lattice reduction algorithms\u2019. IACR Cryptology ePrint Archive 1997 1997 p.8"},{"key":"e_1_2_7_42_1","unstructured":"2000 Int. Conf. on the Theory and Applications of Cryptographic Techniques Berlin Germany G. Poupard J. Stern Fair encryption of RSA keys 172 189"},{"key":"e_1_2_7_43_1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1017\/CBO9781139012843","volume-title":"Mathematics of public key cryptography","author":"Galbraith S.D.","year":"2012"},{"issue":"1","key":"e_1_2_7_44_1","doi-asserted-by":"crossref","first-page":"716357","DOI":"10.1186\/1687-417X-2009-716357","article-title":"Encrypted domain DCT based on homomorphic cryptosystems","volume":"2009","author":"Bianchi T.","year":"2009","journal-title":"EURASIP J. Inf. Secur."}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2018.6120","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ipr.2018.6120","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ipr.2018.6120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T08:56:18Z","timestamp":1614761778000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ipr.2018.6120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,15]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["10.1049\/iet-ipr.2018.6120"],"URL":"https:\/\/doi.org\/10.1049\/iet-ipr.2018.6120","archive":["Portico"],"relation":{},"ISSN":["1751-9659","1751-9667"],"issn-type":[{"value":"1751-9659","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,15]]}}}