{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:38:39Z","timestamp":1725611919024},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Natural Science Foundation of Guangdong Province of China","award":["2021A1515011798"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772208","61672444"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSFC RGC Joint Research Scheme","award":["N_HKBU214\/21"]},{"name":"RGC General Research Fund","award":["12201321"]},{"DOI":"10.13039\/501100001747","name":"Hong Kong Baptist University","doi-asserted-by":"publisher","award":["RC-FNRA-IG\/18-19\/SCI\/03","RC-IRCMs\/18-19\/SCI\/01"],"id":[{"id":"10.13039\/501100001747","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation and Technology Fund of Innovation and Technology Commission of the Hong Kong Government","award":["ITS\/339\/18"]},{"name":"Shenzhen Science and Technology Innovation Commission SZSTC","award":["SGDX20190816230207535"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/tcyb.2022.3163245","type":"journal-article","created":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T19:25:13Z","timestamp":1650050713000},"page":"3688-3701","source":"Crossref","is-referenced-by-count":11,"title":["Lossless Data Hiding in Encrypted Images Compatible With Homomorphic Processing"],"prefix":"10.1109","volume":"53","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-6462-7193","authenticated-orcid":false,"given":"Hao-Tian","family":"Wu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7629-4648","authenticated-orcid":false,"given":"Yiu-Ming","family":"Cheung","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Hong Kong Baptist University, Hong Kong, SAR, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1537-8199","authenticated-orcid":false,"given":"Zhenwei","family":"Zhuang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8054-6059","authenticated-orcid":false,"given":"Lingling","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Engineering and Information Technology, The University of New South Wales, Australian Defence Force Academy, Canberra, ACT, Australia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2882850"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2634161"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2986782"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.2967593"},{"key":"ref52","author":"silverman","year":"2013","journal-title":"A Friendly Introduction to Number Theory"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2799381"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2418611"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3011923"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2992817"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3140974"},{"key":"ref18","first-page":"1420","article-title":"High capacity lossless data hiding in JPEG bitstream based on general VLC mapping","volume":"19","author":"du","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref51","article-title":"Cryptanalyzing two image encryption algorithms based on a first-order time-delay system","author":"liu","year":"2021","journal-title":"IEEE Trans Multimedia"},{"key":"ref50","article-title":"Secure halftone image steganography based on feature space and layer embedding","author":"lu","year":"2020","journal-title":"IEEE Trans Cybern"},{"key":"ref46","year":"2022","journal-title":"USC-SIPI Image Database"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","article-title":"Image feature extraction in encrypted domain with privacy-preserving SIFT","volume":"21","author":"hsu","year":"2012","journal-title":"IEEE Trans Image Process"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.855393"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2181342"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054868"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2036230"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2229069"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2735989"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2416591"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248725"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2423678"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.04.032"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2598528"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2302899"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2514110"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2549458"},{"key":"ref37","first-page":"169","article-title":"On data banks and privacy homomorphisms","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2899520"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.05.034"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","article-title":"Reversible image watermarking using interpolation technique","volume":"5","author":"luo","year":"2010","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2921812"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2742023"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2433194"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.07.002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.08.021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2963393"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.05.002"},{"key":"ref28","first-page":"141","article-title":"Reversible data hiding in homomorphic encrypted images without preprocessing","volume":"11897","author":"wu","year":"2019","journal-title":"Proc 20th World Conf Inf Security Appl"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.04.015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2913422"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/10128814\/09758638.pdf?arnumber=9758638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:17:55Z","timestamp":1686593875000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9758638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":52,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2022.3163245","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}