Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group

This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded into the rest of the image to make room for data...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on circuits and systems for video technology Vol. 28; no. 11; pp. 3099 - 3110
Main Authors Xiang, Shijun, Luo, Xinrong
Format Journal Article
LanguageEnglish
Published New York IEEE 01.11.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded into the rest of the image to make room for data embedding. In each group, there are a reference pixel and a few host pixels. Least significant bits (LSBs) of the reference pixels are reset before encryption and the encrypted host pixels are replaced with the encrypted reference pixel in the same group to form mirroring ciphertext groups (MCGs). In such a way, the modification on MCGs for data embedding will not cause any pixel oversaturation in plaintext domain and the embedded data can be directly extracted from the encrypted domain. In an MCG, the reference ciphertext pixel is kept unchanged as a reference while data hider embeds the encrypted additional data into the LSBs of the host ciphertext pixels by employing homomorphic multiplication. On the receiver side, the hidden ciphertext data can be retrieved by employing a modular multiplicative inverse operation between the marked host ciphertext pixels and their corresponding reference ciphertext pixels, respectively. After that, the hidden data are extracted promptly by looking for a one-to-one mapping table from ciphertext to plaintext. Data extraction and image restoration can be accomplished without any error after decryption. Compared with the existing works, the proposed scheme has lower computation complexity, higher security performance, and better embedding performance. The experiments on the standard image files also certify the effectiveness of the proposed scheme.
AbstractList This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded into the rest of the image to make room for data embedding. In each group, there are a reference pixel and a few host pixels. Least significant bits (LSBs) of the reference pixels are reset before encryption and the encrypted host pixels are replaced with the encrypted reference pixel in the same group to form mirroring ciphertext groups (MCGs). In such a way, the modification on MCGs for data embedding will not cause any pixel oversaturation in plaintext domain and the embedded data can be directly extracted from the encrypted domain. In an MCG, the reference ciphertext pixel is kept unchanged as a reference while data hider embeds the encrypted additional data into the LSBs of the host ciphertext pixels by employing homomorphic multiplication. On the receiver side, the hidden ciphertext data can be retrieved by employing a modular multiplicative inverse operation between the marked host ciphertext pixels and their corresponding reference ciphertext pixels, respectively. After that, the hidden data are extracted promptly by looking for a one-to-one mapping table from ciphertext to plaintext. Data extraction and image restoration can be accomplished without any error after decryption. Compared with the existing works, the proposed scheme has lower computation complexity, higher security performance, and better embedding performance. The experiments on the standard image files also certify the effectiveness of the proposed scheme.
Author Luo, Xinrong
Xiang, Shijun
Author_xml – sequence: 1
  givenname: Shijun
  orcidid: 0000-0002-3481-7057
  surname: Xiang
  fullname: Xiang, Shijun
  email: shijun_xiang@qq.com
  organization: School of Information Science and Technology, Jinan University, Guangzhou, China
– sequence: 2
  givenname: Xinrong
  surname: Luo
  fullname: Luo, Xinrong
  email: 610377796@qq.com
  organization: School of Information Science and Technology, Jinan University, Guangzhou, China
BookMark eNp9kMFKw0AQhhepYK2-gF4CnlN3J7vJ5ihpbYWKoNFr2GwmdkubjZut2Lc3tcWDB5nDDMz_zcB3TgaNbZCQK0bHjNH0Ns9e3vIxUJaMIeFAITohQyaEDAGoGPQzFSyUwMQZOe-6FaWMS54MSf6Mn-g6U64xmCivgrmpTPMemCaY201frl0aHUwb7XatxyqY2I3ql-UueDTOWbcPZ6ZdovP45YOZs9v2gpzWat3h5bGPyOv9NM_m4eJp9pDdLUINqfChjCCWWHMVaQlQceSxqKiMKgClUgQOMknSWmvGVVwjx6TSiLIUJVYJEzQakZvD3dbZjy12vljZrWv6lwWwiMaUQ8z7lDyktLNd57AutPHKG9t4p8y6YLTYOyx-HBZ7h8XRYY_CH7R1ZqPc7n_o-gAZRPwFJGVRAiL6Bm90f7Q
CODEN ITCTEM
CitedBy_id crossref_primary_10_1109_ACCESS_2021_3135050
crossref_primary_10_1007_s11042_022_13266_4
crossref_primary_10_1109_TDSC_2022_3228385
crossref_primary_10_1109_TIFS_2024_3362592
crossref_primary_10_1109_TCSVT_2019_2921812
crossref_primary_10_1049_iet_ipr_2018_6120
crossref_primary_10_1109_TIFS_2021_3080497
crossref_primary_10_1016_j_sigpro_2019_05_035
crossref_primary_10_1016_j_sigpro_2025_109918
crossref_primary_10_1016_j_sigpro_2019_05_036
crossref_primary_10_1093_comjnl_bxab203
crossref_primary_10_1109_TCSVT_2021_3091319
crossref_primary_10_1007_s00530_020_00700_6
crossref_primary_10_1109_ACCESS_2018_2880904
crossref_primary_10_3390_sym13061090
crossref_primary_10_1016_j_sigpro_2020_107657
crossref_primary_10_1016_j_ijleo_2021_168010
crossref_primary_10_1109_ACCESS_2020_2969252
crossref_primary_10_1007_s00034_019_01321_9
crossref_primary_10_1007_s11042_021_10896_y
crossref_primary_10_1016_j_heliyon_2021_e08381
crossref_primary_10_1109_TIFS_2019_2914557
crossref_primary_10_1049_ise2_12062
crossref_primary_10_1109_TCYB_2022_3163245
crossref_primary_10_1109_ACCESS_2020_3040005
crossref_primary_10_1016_j_jvcir_2019_102744
crossref_primary_10_1049_ipr2_12461
crossref_primary_10_1109_TCSVT_2022_3163905
crossref_primary_10_1016_j_heliyon_2020_e03464
crossref_primary_10_3390_sym12030347
crossref_primary_10_3390_e21070625
crossref_primary_10_1109_TCSVT_2022_3184949
crossref_primary_10_1631_FITEE_2300750
crossref_primary_10_1007_s11554_018_0838_0
crossref_primary_10_1007_s11042_019_07874_w
crossref_primary_10_1016_j_sigpro_2024_109664
crossref_primary_10_1016_j_sigpro_2019_107288
crossref_primary_10_1109_TIFS_2021_3128817
crossref_primary_10_1117_1_JEI_33_1_013020
crossref_primary_10_1109_ACCESS_2020_3029420
crossref_primary_10_1007_s10489_021_02789_2
crossref_primary_10_1007_s11042_022_12949_2
crossref_primary_10_1109_TCC_2022_3155744
crossref_primary_10_1109_TDSC_2020_3011923
crossref_primary_10_1109_ACCESS_2024_3434576
crossref_primary_10_1109_ACCESS_2020_3009275
crossref_primary_10_1016_j_jvcir_2019_04_015
crossref_primary_10_1109_TCSVT_2019_2963393
crossref_primary_10_1109_ACCESS_2020_2990903
crossref_primary_10_1016_j_jisa_2022_103223
crossref_primary_10_1109_TCC_2023_3259478
crossref_primary_10_3390_math9172166
crossref_primary_10_1109_TCSVT_2021_3125711
crossref_primary_10_1016_j_image_2019_115705
crossref_primary_10_1109_TCSVT_2021_3081575
crossref_primary_10_1109_ACCESS_2019_2916355
crossref_primary_10_3390_math12142262
crossref_primary_10_1016_j_comcom_2021_03_018
crossref_primary_10_1109_ACCESS_2020_3001385
crossref_primary_10_1016_j_jvcir_2022_103478
crossref_primary_10_1016_j_image_2021_116462
crossref_primary_10_2139_ssrn_4003204
crossref_primary_10_1109_ACCESS_2019_2908924
crossref_primary_10_1007_s11042_023_16493_5
crossref_primary_10_1016_j_jvcir_2018_11_017
crossref_primary_10_1016_j_jisa_2019_102361
crossref_primary_10_1016_j_micpro_2019_05_015
crossref_primary_10_32604_cmc_2022_030372
crossref_primary_10_1007_s11042_023_17242_4
crossref_primary_10_1109_ACCESS_2019_2919376
crossref_primary_10_1016_j_sigpro_2020_107584
crossref_primary_10_1007_s11042_020_09098_9
crossref_primary_10_1109_ACCESS_2020_3015882
crossref_primary_10_1109_ACCESS_2020_2993604
crossref_primary_10_1007_s11042_022_12493_z
crossref_primary_10_1007_s11042_023_16984_5
crossref_primary_10_1109_TLT_2021_3103006
crossref_primary_10_3390_math12010032
crossref_primary_10_1016_j_image_2021_116274
crossref_primary_10_1016_j_jisa_2019_102374
crossref_primary_10_1007_s11042_023_15083_9
crossref_primary_10_1016_j_sigpro_2019_07_020
crossref_primary_10_1109_TCSVT_2021_3055072
crossref_primary_10_1016_j_eswa_2024_124151
crossref_primary_10_1016_j_jvcir_2021_103085
crossref_primary_10_1016_j_knosys_2024_112198
Cites_doi 10.1016/j.jvcir.2014.04.003
10.1109/TMM.2010.2098850
10.1109/TMM.2016.2569497
10.1109/TIP.2004.840686
10.1109/LSP.2012.2187334
10.1007/978-3-642-38715-9_25
10.1109/TMM.2008.2007341
10.1109/TCSVT.2006.869964
10.1109/TCSVT.2015.2433194
10.1109/ICME.2006.262782
10.1109/TMM.2014.2340695
10.1109/TIFS.2009.2036230
10.1109/LSP.2011.2114651
10.1109/TIFS.2013.2248725
10.1109/TMM.2014.2316154
10.1109/TIP.2011.2150233
10.1109/TMM.2016.2589208
10.1109/TIP.2013.2253474
10.1109/TIFS.2009.2035975
10.1109/TMM.2012.2229262
10.1155/S1110865702000537
10.1016/j.sigpro.2013.06.023
10.1109/TCSVT.2003.815962
10.1109/TIFS.2008.2011087
10.1109/TCSVT.2015.2473235
10.1109/TIFS.2011.2176120
10.1109/TCSVT.2015.2418611
10.1109/TIP.2006.891046
10.1109/TSP.2005.855393
10.1016/j.jss.2009.05.051
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCSVT.2017.2742023
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2205
EndPage 3110
ExternalDocumentID 10_1109_TCSVT_2017_2742023
8013725
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61772234; 61272414
  funderid: 10.13039/501100001809
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
RXW
TAE
TN5
VH1
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c295t-83268ef4a3c822d4e465d083d22aa9e2428779fcc14a6fe4e7dcee8b5bed71503
IEDL.DBID RIE
ISSN 1051-8215
IngestDate Mon Jun 30 06:16:53 EDT 2025
Tue Jul 01 00:41:11 EDT 2025
Thu Apr 24 23:03:17 EDT 2025
Wed Aug 27 02:49:25 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 11
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c295t-83268ef4a3c822d4e465d083d22aa9e2428779fcc14a6fe4e7dcee8b5bed71503
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3481-7057
PQID 2130604264
PQPubID 85433
PageCount 12
ParticipantIDs crossref_primary_10_1109_TCSVT_2017_2742023
ieee_primary_8013725
crossref_citationtrail_10_1109_TCSVT_2017_2742023
proquest_journals_2130604264
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-11-01
PublicationDateYYYYMMDD 2018-11-01
PublicationDate_xml – month: 11
  year: 2018
  text: 2018-11-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on circuits and systems for video technology
PublicationTitleAbbrev TCSVT
PublicationYear 2018
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref34
ref12
ref15
ref14
ref31
ref30
macq (ref1) 2000
ref33
ref11
ref32
ref10
luo (ref16) 2010; 5
ref19
honsinger (ref2) 2001
ref18
ni (ref13) 2006; 16
zhang (ref25) 2014; 94
paillier (ref28) 1999; 1592
ref24
li (ref17) 2011; 20
ref26
ref22
hong (ref20) 2013; 7929
ref21
qian (ref23) 0
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
donald (ref35) 1997; 2
References_xml – ident: ref32
  doi: 10.1016/j.jvcir.2014.04.003
– ident: ref6
  doi: 10.1109/TMM.2010.2098850
– year: 0
  ident: ref23
  article-title: Separable reversible data hiding in encrypted JPEG bitstreams
  publication-title: IEEE Trans Depend and Sec Comp
– ident: ref27
  doi: 10.1109/TMM.2016.2569497
– ident: ref10
  doi: 10.1109/TIP.2004.840686
– ident: ref19
  doi: 10.1109/LSP.2012.2187334
– volume: 7929
  start-page: 208
  year: 2013
  ident: ref20
  article-title: Reversible data embedment for encrypted cartoon images using unbalanced bit flipping
  publication-title: Advances in Swarm Intelligence
  doi: 10.1007/978-3-642-38715-9_25
– start-page: 533
  year: 2000
  ident: ref1
  article-title: Lossless multiresolution transform for image authenticating watermarking
  publication-title: Proc Eur Signal Process Conf
– ident: ref3
  doi: 10.1109/TMM.2008.2007341
– volume: 16
  start-page: 354
  year: 2006
  ident: ref13
  article-title: Reversible data hiding
  publication-title: IEEE Trans Circuits Syst Video Technol
  doi: 10.1109/TCSVT.2006.869964
– volume: 2
  year: 1997
  ident: ref35
  publication-title: The art of computer programming
– ident: ref33
  doi: 10.1109/TCSVT.2015.2433194
– ident: ref14
  doi: 10.1109/ICME.2006.262782
– ident: ref7
  doi: 10.1109/TMM.2014.2340695
– ident: ref30
  doi: 10.1109/TIFS.2009.2036230
– year: 2001
  ident: ref2
  article-title: Lossless recovery of an original image containing embedded data
– ident: ref18
  doi: 10.1109/LSP.2011.2114651
– ident: ref24
  doi: 10.1109/TIFS.2013.2248725
– ident: ref22
  doi: 10.1109/TMM.2014.2316154
– volume: 20
  start-page: 3524
  year: 2011
  ident: ref17
  article-title: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2011.2150233
– ident: ref8
  doi: 10.1109/TMM.2016.2589208
– ident: ref31
  doi: 10.1109/TIP.2013.2253474
– volume: 5
  start-page: 187
  year: 2010
  ident: ref16
  article-title: Reversible image watermarking using interpolation technique
  publication-title: IEEE Trans Inf Forensics Security
  doi: 10.1109/TIFS.2009.2035975
– ident: ref4
  doi: 10.1109/TMM.2012.2229262
– ident: ref9
  doi: 10.1155/S1110865702000537
– volume: 94
  start-page: 174
  year: 2014
  ident: ref25
  article-title: Reversibility improved data hiding in encrypted images by reserving images
  publication-title: Signal Process
  doi: 10.1016/j.sigpro.2013.06.023
– ident: ref11
  doi: 10.1109/TCSVT.2003.815962
– volume: 1592
  start-page: 223
  year: 1999
  ident: ref28
  article-title: Public-key cryptosystems based on composite degree residuosity classes
  publication-title: Advances in Cryptology
– ident: ref29
  doi: 10.1109/TIFS.2008.2011087
– ident: ref5
  doi: 10.1109/TCSVT.2015.2473235
– ident: ref21
  doi: 10.1109/TIFS.2011.2176120
– ident: ref26
  doi: 10.1109/TCSVT.2015.2418611
– ident: ref12
  doi: 10.1109/TIP.2006.891046
– ident: ref34
  doi: 10.1109/TSP.2005.855393
– ident: ref15
  doi: 10.1016/j.jss.2009.05.051
SSID ssj0014847
Score 2.5636806
Snippet This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3099
SubjectTerms Algorithms
Data mining
Embedding
Encryption
homomorphic property
image encryption
Image restoration
mirroring ciphertext group
Pixels
Probabilistic logic
Public key cryptography
Receivers
Reversible data hiding
Title Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group
URI https://ieeexplore.ieee.org/document/8013725
https://www.proquest.com/docview/2130604264
Volume 28
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT-MwEB4BJzjwXlFe8oHbbkri2HkcUQFVSOXAFsQt8mMiRQspKukBfj1jJ61gQQjlYil2ZHk8-b6x5wFwkhgplUIe2JK0SehIkc7pPEgjE5XKYiSNMxRH18nwVlzdy_sl-LOIhUFE73yGfdf0d_l2YmbuqOw0c_nxuFyGZTLc2litxY2ByHwxMaILUZARjs0DZML8dDz4ezd2Xlxp311Mhjz-AEK-qsqnX7HHl8sNGM1n1rqV_OvPGt03r_8lbfzp1DdhvSOa7KzdGVuwhPU2rL1LP7gD4xv0Thn6Adm5ahQbVg7JWFWz4eSRHpJBZdhFbaYvT8RM2fnkUdFL_cJG1XTqXffYoHKJCZz_CPPnWLtwe3kxHgyDrspCYHgum4BUOsmwFCo2RBasQJFIS8TMcq5UjtzZVGleGhMJlZQoMLUErJmWGm1KdDL-BSv1pMY9YILQMNSEhXGqRKwl9eexMolSaSnDxPYgmi97YboU5K4SxkPhTZEwL7yoCieqohNVD34vxjy1CTi-7b3j1n7Rs1v2HhzOpVt0OvpccILvxJmQYv_rUQewSt_O2sjDQ1hppjM8IgrS6GO_994AGzjXtg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV1Lb9QwEB6VcgAO5VEqFgr4ACeUbeLYeRw4oN1WKe32ACnqLdjORIpos9U2q2r5LfwV_htjJ1nxErdKKJdIsRPF89nfjD0PgFeRkVIp5F5Z0WwSOlA053TqxYEJKlViII01FGcnUXYq3p_Jsw34to6FQUTnfIZje-vO8su5Wdqtsr3E5sfjgwvlEa6uyUC7ens4JWm-5vxgP59kXl9DwDM8la1HgI0SrIQKDVFhKVBEsiS1o-RcqRS5tRjitDImECqqUGBcEm0kWmosY1KWQnrvLbhNeobkXXTY-oxCJK58GSkogZcQcw4hOX66l08-fsqt31g8tkehPg9_oT1Xx-WPxd8x2sF9-D6MRefI8mW8bPXYfP0tTeT_OlgPYKtXpdm7DvsPYQObR3DvpwSL25B_QOd2os-RTVWrWFZbrmZ1w7L5BV2Estqw_cYsVpeke7Pp_ELRQ71is3qxcM6JbFLb1AvWQ4a5nbrHcHojv7UDm828wSfABPG9r4ntw1iJUEtqz0NlIqXiSvpROYJgEHNh-iTrttbHeeGMLT8tHDQKC42ih8YI3qz7XHYpRv7ZetvKet2yF_MIdgc0Ff0qdFVwUlAiaySLp3_v9RLuZPnsuDg-PDl6BnfpO0kXZ7kLm-1iic9J4Wr1C4d7Bp9vGjs_AJjtNkM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Reversible+Data+Hiding+in+Homomorphic+Encrypted+Domain+by+Mirroring+Ciphertext+Group&rft.jtitle=IEEE+transactions+on+circuits+and+systems+for+video+technology&rft.au=Xiang%2C+Shijun&rft.au=Luo%2C+Xinrong&rft.date=2018-11-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1051-8215&rft.eissn=1558-2205&rft.volume=28&rft.issue=11&rft.spage=3099&rft_id=info:doi/10.1109%2FTCSVT.2017.2742023&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1051-8215&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1051-8215&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1051-8215&client=summon