Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group
This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded into the rest of the image to make room for data...
Saved in:
Published in | IEEE transactions on circuits and systems for video technology Vol. 28; no. 11; pp. 3099 - 3110 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.11.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded into the rest of the image to make room for data embedding. In each group, there are a reference pixel and a few host pixels. Least significant bits (LSBs) of the reference pixels are reset before encryption and the encrypted host pixels are replaced with the encrypted reference pixel in the same group to form mirroring ciphertext groups (MCGs). In such a way, the modification on MCGs for data embedding will not cause any pixel oversaturation in plaintext domain and the embedded data can be directly extracted from the encrypted domain. In an MCG, the reference ciphertext pixel is kept unchanged as a reference while data hider embeds the encrypted additional data into the LSBs of the host ciphertext pixels by employing homomorphic multiplication. On the receiver side, the hidden ciphertext data can be retrieved by employing a modular multiplicative inverse operation between the marked host ciphertext pixels and their corresponding reference ciphertext pixels, respectively. After that, the hidden data are extracted promptly by looking for a one-to-one mapping table from ciphertext to plaintext. Data extraction and image restoration can be accomplished without any error after decryption. Compared with the existing works, the proposed scheme has lower computation complexity, higher security performance, and better embedding performance. The experiments on the standard image files also certify the effectiveness of the proposed scheme. |
---|---|
AbstractList | This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded into the rest of the image to make room for data embedding. In each group, there are a reference pixel and a few host pixels. Least significant bits (LSBs) of the reference pixels are reset before encryption and the encrypted host pixels are replaced with the encrypted reference pixel in the same group to form mirroring ciphertext groups (MCGs). In such a way, the modification on MCGs for data embedding will not cause any pixel oversaturation in plaintext domain and the embedded data can be directly extracted from the encrypted domain. In an MCG, the reference ciphertext pixel is kept unchanged as a reference while data hider embeds the encrypted additional data into the LSBs of the host ciphertext pixels by employing homomorphic multiplication. On the receiver side, the hidden ciphertext data can be retrieved by employing a modular multiplicative inverse operation between the marked host ciphertext pixels and their corresponding reference ciphertext pixels, respectively. After that, the hidden data are extracted promptly by looking for a one-to-one mapping table from ciphertext to plaintext. Data extraction and image restoration can be accomplished without any error after decryption. Compared with the existing works, the proposed scheme has lower computation complexity, higher security performance, and better embedding performance. The experiments on the standard image files also certify the effectiveness of the proposed scheme. |
Author | Luo, Xinrong Xiang, Shijun |
Author_xml | – sequence: 1 givenname: Shijun orcidid: 0000-0002-3481-7057 surname: Xiang fullname: Xiang, Shijun email: shijun_xiang@qq.com organization: School of Information Science and Technology, Jinan University, Guangzhou, China – sequence: 2 givenname: Xinrong surname: Luo fullname: Luo, Xinrong email: 610377796@qq.com organization: School of Information Science and Technology, Jinan University, Guangzhou, China |
BookMark | eNp9kMFKw0AQhhepYK2-gF4CnlN3J7vJ5ihpbYWKoNFr2GwmdkubjZut2Lc3tcWDB5nDDMz_zcB3TgaNbZCQK0bHjNH0Ns9e3vIxUJaMIeFAITohQyaEDAGoGPQzFSyUwMQZOe-6FaWMS54MSf6Mn-g6U64xmCivgrmpTPMemCaY201frl0aHUwb7XatxyqY2I3ql-UueDTOWbcPZ6ZdovP45YOZs9v2gpzWat3h5bGPyOv9NM_m4eJp9pDdLUINqfChjCCWWHMVaQlQceSxqKiMKgClUgQOMknSWmvGVVwjx6TSiLIUJVYJEzQakZvD3dbZjy12vljZrWv6lwWwiMaUQ8z7lDyktLNd57AutPHKG9t4p8y6YLTYOyx-HBZ7h8XRYY_CH7R1ZqPc7n_o-gAZRPwFJGVRAiL6Bm90f7Q |
CODEN | ITCTEM |
CitedBy_id | crossref_primary_10_1109_ACCESS_2021_3135050 crossref_primary_10_1007_s11042_022_13266_4 crossref_primary_10_1109_TDSC_2022_3228385 crossref_primary_10_1109_TIFS_2024_3362592 crossref_primary_10_1109_TCSVT_2019_2921812 crossref_primary_10_1049_iet_ipr_2018_6120 crossref_primary_10_1109_TIFS_2021_3080497 crossref_primary_10_1016_j_sigpro_2019_05_035 crossref_primary_10_1016_j_sigpro_2025_109918 crossref_primary_10_1016_j_sigpro_2019_05_036 crossref_primary_10_1093_comjnl_bxab203 crossref_primary_10_1109_TCSVT_2021_3091319 crossref_primary_10_1007_s00530_020_00700_6 crossref_primary_10_1109_ACCESS_2018_2880904 crossref_primary_10_3390_sym13061090 crossref_primary_10_1016_j_sigpro_2020_107657 crossref_primary_10_1016_j_ijleo_2021_168010 crossref_primary_10_1109_ACCESS_2020_2969252 crossref_primary_10_1007_s00034_019_01321_9 crossref_primary_10_1007_s11042_021_10896_y crossref_primary_10_1016_j_heliyon_2021_e08381 crossref_primary_10_1109_TIFS_2019_2914557 crossref_primary_10_1049_ise2_12062 crossref_primary_10_1109_TCYB_2022_3163245 crossref_primary_10_1109_ACCESS_2020_3040005 crossref_primary_10_1016_j_jvcir_2019_102744 crossref_primary_10_1049_ipr2_12461 crossref_primary_10_1109_TCSVT_2022_3163905 crossref_primary_10_1016_j_heliyon_2020_e03464 crossref_primary_10_3390_sym12030347 crossref_primary_10_3390_e21070625 crossref_primary_10_1109_TCSVT_2022_3184949 crossref_primary_10_1631_FITEE_2300750 crossref_primary_10_1007_s11554_018_0838_0 crossref_primary_10_1007_s11042_019_07874_w crossref_primary_10_1016_j_sigpro_2024_109664 crossref_primary_10_1016_j_sigpro_2019_107288 crossref_primary_10_1109_TIFS_2021_3128817 crossref_primary_10_1117_1_JEI_33_1_013020 crossref_primary_10_1109_ACCESS_2020_3029420 crossref_primary_10_1007_s10489_021_02789_2 crossref_primary_10_1007_s11042_022_12949_2 crossref_primary_10_1109_TCC_2022_3155744 crossref_primary_10_1109_TDSC_2020_3011923 crossref_primary_10_1109_ACCESS_2024_3434576 crossref_primary_10_1109_ACCESS_2020_3009275 crossref_primary_10_1016_j_jvcir_2019_04_015 crossref_primary_10_1109_TCSVT_2019_2963393 crossref_primary_10_1109_ACCESS_2020_2990903 crossref_primary_10_1016_j_jisa_2022_103223 crossref_primary_10_1109_TCC_2023_3259478 crossref_primary_10_3390_math9172166 crossref_primary_10_1109_TCSVT_2021_3125711 crossref_primary_10_1016_j_image_2019_115705 crossref_primary_10_1109_TCSVT_2021_3081575 crossref_primary_10_1109_ACCESS_2019_2916355 crossref_primary_10_3390_math12142262 crossref_primary_10_1016_j_comcom_2021_03_018 crossref_primary_10_1109_ACCESS_2020_3001385 crossref_primary_10_1016_j_jvcir_2022_103478 crossref_primary_10_1016_j_image_2021_116462 crossref_primary_10_2139_ssrn_4003204 crossref_primary_10_1109_ACCESS_2019_2908924 crossref_primary_10_1007_s11042_023_16493_5 crossref_primary_10_1016_j_jvcir_2018_11_017 crossref_primary_10_1016_j_jisa_2019_102361 crossref_primary_10_1016_j_micpro_2019_05_015 crossref_primary_10_32604_cmc_2022_030372 crossref_primary_10_1007_s11042_023_17242_4 crossref_primary_10_1109_ACCESS_2019_2919376 crossref_primary_10_1016_j_sigpro_2020_107584 crossref_primary_10_1007_s11042_020_09098_9 crossref_primary_10_1109_ACCESS_2020_3015882 crossref_primary_10_1109_ACCESS_2020_2993604 crossref_primary_10_1007_s11042_022_12493_z crossref_primary_10_1007_s11042_023_16984_5 crossref_primary_10_1109_TLT_2021_3103006 crossref_primary_10_3390_math12010032 crossref_primary_10_1016_j_image_2021_116274 crossref_primary_10_1016_j_jisa_2019_102374 crossref_primary_10_1007_s11042_023_15083_9 crossref_primary_10_1016_j_sigpro_2019_07_020 crossref_primary_10_1109_TCSVT_2021_3055072 crossref_primary_10_1016_j_eswa_2024_124151 crossref_primary_10_1016_j_jvcir_2021_103085 crossref_primary_10_1016_j_knosys_2024_112198 |
Cites_doi | 10.1016/j.jvcir.2014.04.003 10.1109/TMM.2010.2098850 10.1109/TMM.2016.2569497 10.1109/TIP.2004.840686 10.1109/LSP.2012.2187334 10.1007/978-3-642-38715-9_25 10.1109/TMM.2008.2007341 10.1109/TCSVT.2006.869964 10.1109/TCSVT.2015.2433194 10.1109/ICME.2006.262782 10.1109/TMM.2014.2340695 10.1109/TIFS.2009.2036230 10.1109/LSP.2011.2114651 10.1109/TIFS.2013.2248725 10.1109/TMM.2014.2316154 10.1109/TIP.2011.2150233 10.1109/TMM.2016.2589208 10.1109/TIP.2013.2253474 10.1109/TIFS.2009.2035975 10.1109/TMM.2012.2229262 10.1155/S1110865702000537 10.1016/j.sigpro.2013.06.023 10.1109/TCSVT.2003.815962 10.1109/TIFS.2008.2011087 10.1109/TCSVT.2015.2473235 10.1109/TIFS.2011.2176120 10.1109/TCSVT.2015.2418611 10.1109/TIP.2006.891046 10.1109/TSP.2005.855393 10.1016/j.jss.2009.05.051 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TCSVT.2017.2742023 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2205 |
EndPage | 3110 |
ExternalDocumentID | 10_1109_TCSVT_2017_2742023 8013725 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61772234; 61272414 funderid: 10.13039/501100001809 |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 ICLAB IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS RXW TAE TN5 VH1 AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c295t-83268ef4a3c822d4e465d083d22aa9e2428779fcc14a6fe4e7dcee8b5bed71503 |
IEDL.DBID | RIE |
ISSN | 1051-8215 |
IngestDate | Mon Jun 30 06:16:53 EDT 2025 Tue Jul 01 00:41:11 EDT 2025 Thu Apr 24 23:03:17 EDT 2025 Wed Aug 27 02:49:25 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 11 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c295t-83268ef4a3c822d4e465d083d22aa9e2428779fcc14a6fe4e7dcee8b5bed71503 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-3481-7057 |
PQID | 2130604264 |
PQPubID | 85433 |
PageCount | 12 |
ParticipantIDs | crossref_primary_10_1109_TCSVT_2017_2742023 ieee_primary_8013725 crossref_citationtrail_10_1109_TCSVT_2017_2742023 proquest_journals_2130604264 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-11-01 |
PublicationDateYYYYMMDD | 2018-11-01 |
PublicationDate_xml | – month: 11 year: 2018 text: 2018-11-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on circuits and systems for video technology |
PublicationTitleAbbrev | TCSVT |
PublicationYear | 2018 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref34 ref12 ref15 ref14 ref31 ref30 macq (ref1) 2000 ref33 ref11 ref32 ref10 luo (ref16) 2010; 5 ref19 honsinger (ref2) 2001 ref18 ni (ref13) 2006; 16 zhang (ref25) 2014; 94 paillier (ref28) 1999; 1592 ref24 li (ref17) 2011; 20 ref26 ref22 hong (ref20) 2013; 7929 ref21 qian (ref23) 0 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 donald (ref35) 1997; 2 |
References_xml | – ident: ref32 doi: 10.1016/j.jvcir.2014.04.003 – ident: ref6 doi: 10.1109/TMM.2010.2098850 – year: 0 ident: ref23 article-title: Separable reversible data hiding in encrypted JPEG bitstreams publication-title: IEEE Trans Depend and Sec Comp – ident: ref27 doi: 10.1109/TMM.2016.2569497 – ident: ref10 doi: 10.1109/TIP.2004.840686 – ident: ref19 doi: 10.1109/LSP.2012.2187334 – volume: 7929 start-page: 208 year: 2013 ident: ref20 article-title: Reversible data embedment for encrypted cartoon images using unbalanced bit flipping publication-title: Advances in Swarm Intelligence doi: 10.1007/978-3-642-38715-9_25 – start-page: 533 year: 2000 ident: ref1 article-title: Lossless multiresolution transform for image authenticating watermarking publication-title: Proc Eur Signal Process Conf – ident: ref3 doi: 10.1109/TMM.2008.2007341 – volume: 16 start-page: 354 year: 2006 ident: ref13 article-title: Reversible data hiding publication-title: IEEE Trans Circuits Syst Video Technol doi: 10.1109/TCSVT.2006.869964 – volume: 2 year: 1997 ident: ref35 publication-title: The art of computer programming – ident: ref33 doi: 10.1109/TCSVT.2015.2433194 – ident: ref14 doi: 10.1109/ICME.2006.262782 – ident: ref7 doi: 10.1109/TMM.2014.2340695 – ident: ref30 doi: 10.1109/TIFS.2009.2036230 – year: 2001 ident: ref2 article-title: Lossless recovery of an original image containing embedded data – ident: ref18 doi: 10.1109/LSP.2011.2114651 – ident: ref24 doi: 10.1109/TIFS.2013.2248725 – ident: ref22 doi: 10.1109/TMM.2014.2316154 – volume: 20 start-page: 3524 year: 2011 ident: ref17 article-title: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection publication-title: IEEE Trans Image Process doi: 10.1109/TIP.2011.2150233 – ident: ref8 doi: 10.1109/TMM.2016.2589208 – ident: ref31 doi: 10.1109/TIP.2013.2253474 – volume: 5 start-page: 187 year: 2010 ident: ref16 article-title: Reversible image watermarking using interpolation technique publication-title: IEEE Trans Inf Forensics Security doi: 10.1109/TIFS.2009.2035975 – ident: ref4 doi: 10.1109/TMM.2012.2229262 – ident: ref9 doi: 10.1155/S1110865702000537 – volume: 94 start-page: 174 year: 2014 ident: ref25 article-title: Reversibility improved data hiding in encrypted images by reserving images publication-title: Signal Process doi: 10.1016/j.sigpro.2013.06.023 – ident: ref11 doi: 10.1109/TCSVT.2003.815962 – volume: 1592 start-page: 223 year: 1999 ident: ref28 article-title: Public-key cryptosystems based on composite degree residuosity classes publication-title: Advances in Cryptology – ident: ref29 doi: 10.1109/TIFS.2008.2011087 – ident: ref5 doi: 10.1109/TCSVT.2015.2473235 – ident: ref21 doi: 10.1109/TIFS.2011.2176120 – ident: ref26 doi: 10.1109/TCSVT.2015.2418611 – ident: ref12 doi: 10.1109/TIP.2006.891046 – ident: ref34 doi: 10.1109/TSP.2005.855393 – ident: ref15 doi: 10.1016/j.jss.2009.05.051 |
SSID | ssj0014847 |
Score | 2.5636806 |
Snippet | This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3099 |
SubjectTerms | Algorithms Data mining Embedding Encryption homomorphic property image encryption Image restoration mirroring ciphertext group Pixels Probabilistic logic Public key cryptography Receivers Reversible data hiding |
Title | Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group |
URI | https://ieeexplore.ieee.org/document/8013725 https://www.proquest.com/docview/2130604264 |
Volume | 28 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwEB4BJzjwXlFe8oHbbkri2HkcUQFVSOXAFsQt8mMiRQspKukBfj1jJ61gQQjlYil2ZHk8-b6x5wFwkhgplUIe2JK0SehIkc7pPEgjE5XKYiSNMxRH18nwVlzdy_sl-LOIhUFE73yGfdf0d_l2YmbuqOw0c_nxuFyGZTLc2litxY2ByHwxMaILUZARjs0DZML8dDz4ezd2Xlxp311Mhjz-AEK-qsqnX7HHl8sNGM1n1rqV_OvPGt03r_8lbfzp1DdhvSOa7KzdGVuwhPU2rL1LP7gD4xv0Thn6Adm5ahQbVg7JWFWz4eSRHpJBZdhFbaYvT8RM2fnkUdFL_cJG1XTqXffYoHKJCZz_CPPnWLtwe3kxHgyDrspCYHgum4BUOsmwFCo2RBasQJFIS8TMcq5UjtzZVGleGhMJlZQoMLUErJmWGm1KdDL-BSv1pMY9YILQMNSEhXGqRKwl9eexMolSaSnDxPYgmi97YboU5K4SxkPhTZEwL7yoCieqohNVD34vxjy1CTi-7b3j1n7Rs1v2HhzOpVt0OvpccILvxJmQYv_rUQewSt_O2sjDQ1hppjM8IgrS6GO_994AGzjXtg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1Lb9QwEB6VcgAO5VEqFgr4ACeUbeLYeRw4oN1WKe32ACnqLdjORIpos9U2q2r5LfwV_htjJ1nxErdKKJdIsRPF89nfjD0PgFeRkVIp5F5Z0WwSOlA053TqxYEJKlViII01FGcnUXYq3p_Jsw34to6FQUTnfIZje-vO8su5Wdqtsr3E5sfjgwvlEa6uyUC7ens4JWm-5vxgP59kXl9DwDM8la1HgI0SrIQKDVFhKVBEsiS1o-RcqRS5tRjitDImECqqUGBcEm0kWmosY1KWQnrvLbhNeobkXXTY-oxCJK58GSkogZcQcw4hOX66l08-fsqt31g8tkehPg9_oT1Xx-WPxd8x2sF9-D6MRefI8mW8bPXYfP0tTeT_OlgPYKtXpdm7DvsPYQObR3DvpwSL25B_QOd2os-RTVWrWFZbrmZ1w7L5BV2Estqw_cYsVpeke7Pp_ELRQ71is3qxcM6JbFLb1AvWQ4a5nbrHcHojv7UDm828wSfABPG9r4ntw1iJUEtqz0NlIqXiSvpROYJgEHNh-iTrttbHeeGMLT8tHDQKC42ih8YI3qz7XHYpRv7ZetvKet2yF_MIdgc0Ff0qdFVwUlAiaySLp3_v9RLuZPnsuDg-PDl6BnfpO0kXZ7kLm-1iic9J4Wr1C4d7Bp9vGjs_AJjtNkM |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Reversible+Data+Hiding+in+Homomorphic+Encrypted+Domain+by+Mirroring+Ciphertext+Group&rft.jtitle=IEEE+transactions+on+circuits+and+systems+for+video+technology&rft.au=Xiang%2C+Shijun&rft.au=Luo%2C+Xinrong&rft.date=2018-11-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1051-8215&rft.eissn=1558-2205&rft.volume=28&rft.issue=11&rft.spage=3099&rft_id=info:doi/10.1109%2FTCSVT.2017.2742023&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1051-8215&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1051-8215&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1051-8215&client=summon |