{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:53Z","timestamp":1740099173946,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_34","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"392-403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram Modification"],"prefix":"10.1007","author":[{"given":"Sijin","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Fangjun","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Lossless data embedding for all image formats. In: SPIE Proceedings of Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, vol. 4675, pp. 572\u2013583 (2002)","key":"34_CR1","DOI":"10.1117\/12.465317"},{"issue":"4","key":"34_CR2","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"12","author":"MU Celik","year":"2006","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M.: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans. Image Process. 12(4), 1042\u20131049 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"34_CR3","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"2","key":"34_CR4","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Hu, Y., Lee, H.K., Li, J.: DE-based reversible data hiding with improved overflow location map. EEE Trans. Circuits Syst. Video Technol 19(2), 250\u2013260 (2009)","journal-title":"EEE Trans. Circuits Syst. Video Technol"},{"issue":"12","key":"34_CR5","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra, L., Heijmans, H.J.A.M.: Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Process. 14(12), 2082\u20132090 (2005)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"34_CR6","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y., Annsari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"doi-asserted-by":"crossref","unstructured":"Lee, S.-K., Suh, Y.-H., Ho, Y.-S.: Reversible image authentication based on watermarking. In: Proceedings of IEEE International Conference Multimedia Expo, pp. 1321\u20131324 (2006)","key":"34_CR7","DOI":"10.1109\/ICME.2006.262782"},{"issue":"6","key":"34_CR8","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li, X., Li, B., Yang, B., Zeng, T.: General framework to histogram shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181\u20132191 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"9","key":"34_CR9","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"X Li","year":"2015","unstructured":"Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016\u20132027 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"34_CR10","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jvcir.2016.05.005","volume":"39","author":"B Ou","year":"2016","unstructured":"Ou, B., Li, X., Wang, J.: High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion, Signal Processing. J. Vis. Commun. Image Represent. 39, 12\u201323 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"9","key":"34_CR12","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","volume":"26","author":"F Huang","year":"2016","unstructured":"Huang, F., Qu, X., Kim, H.J., Huang, J.: Reversible data hiding in JPEG images. IEEE Trans. Circ. Syst. Video Technol. 26(9), 1610\u20131621 (2016)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"34_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-319-53465-7_34","volume-title":"Digital Forensics and Watermarking","author":"J Yin","year":"2017","unstructured":"Yin, J., Wang, R., Guo, Y., Liu, F.: An adaptive reversible data hiding scheme for JPEG images. In: Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. (eds.) IWDW 2016. LNCS, vol. 10082, pp. 456\u2013469. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-53465-7_34"},{"key":"34_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/978-3-540-74260-9_64","volume-title":"Image Analysis and Recognition","author":"G Xuan","year":"2007","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible data hiding for JPEG images based on histogram pairs. In: Kamel, M., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 715\u2013727. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74260-9_64"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:50:42Z","timestamp":1571874642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}