{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:19:37Z","timestamp":1743110377966,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030420574"},{"type":"electronic","value":"9783030420581"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42058-1_49","type":"book-chapter","created":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T12:03:51Z","timestamp":1583237031000},"page":"582-592","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Reversible Watermarking Based on Pixel Value Ordering and Prediction Error Expansion"],"prefix":"10.1007","author":[{"given":"Le Quang","family":"Hoa","sequence":"first","affiliation":[]},{"given":"Cao Thi","family":"Luyen","sequence":"additional","affiliation":[]},{"given":"Nguyen Kim","family":"Sao","sequence":"additional","affiliation":[]},{"given":"Pham Van","family":"At","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"issue":"11","key":"49_CR1","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1016\/j.jss.2009.05.051","volume":"82","author":"W Hong","year":"2009","unstructured":"Hong, W., Chen, T.S., Shiu, C.W.: Reversible data hiding for high quality images using modification of prediction errors. J. Syst. Softw. 82(11), 1833\u20131842 (2009)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"49_CR2","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1016\/j.dsp.2012.12.014","volume":"23","author":"YY Tsai","year":"2013","unstructured":"Tsai, Y.Y., Tsai, D.S., Liu, C.L.: Reversible data hiding scheme based on neighboring pixel differences. Digit. Signal Process. 23(3), 919\u2013927 (2013)","journal-title":"Digit. Signal Process."},{"key":"49_CR3","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar, A.M.: Reversible watermarking using the difference expansion of a generalized integer. IEEE Trans. Image Process. 13, 1147\u20131156 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"49_CR4","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.image.2014.05.003","volume":"29","author":"B Ou","year":"2014","unstructured":"Ou, B., Li, X., Zhao, Y., Ni, R.: Reversible data hiding using invariant pixel-value ordering and prediction-error expansion. Signal Process. Image Commun. 29(7), 760\u2013772 (2014)","journal-title":"Signal Process. Image Commun."},{"issue":"30","key":"49_CR5","first-page":"1481","volume":"11","author":"CT Luyen","year":"2017","unstructured":"Luyen, C.T., At, P.V.: An efficient reversible watermarking method and its application in public key fragile watermarking. Appl. Math. Sci. 11(30), 1481\u20131494 (2017)","journal-title":"Appl. Math. Sci."},{"issue":"3","key":"49_CR6","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"Coltuc, D.: Improved embedding for prediction-based reversible watermarking. IEEE Trans. Inf. Forensic Secur. 6(3), 873\u2013882 (2011)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"3","key":"49_CR7","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for Reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.dsp.2013.11.002","volume":"25","author":"F Peng","year":"2014","unstructured":"Peng, F., Li, X., Yang, B.: Improved pvo-based reversible data hiding. Digit. Signal Proc. 25, 255\u2013265 (2014)","journal-title":"Digit. Signal Proc."},{"issue":"12","key":"49_CR9","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.1016\/j.sigpro.2012.05.034","volume":"92","author":"HT Wu","year":"2012","unstructured":"Wu, H.T., Huang, J.: Reversible image watermarking on prediction errors efficient histogram modification. Signal Process. 92(12), 3000\u20133009 (2012)","journal-title":"Signal Process."},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. The Morgan Kaufmann Series in Computer Security (2007)","DOI":"10.1016\/B978-012372585-1.50015-2"},{"key":"49_CR11","first-page":"197","volume":"4314","author":"J Fridrich","year":"2001","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication in Security and Watermarking of Multimedia Contents III. SPIE 4314, 197\u2013208 (2001)","journal-title":"SPIE"},{"issue":"1","key":"49_CR12","first-page":"65","volume":"20","author":"JJ Li","year":"2018","unstructured":"Li, J.J., Wu, Y.H., Lee, C.F., Chang, C.C.: Generalized PVO-K embedding technique for reversible data hiding. Int. J. Network Secur. 20(1), 65\u201377 (2018)","journal-title":"Int. J. Network Secur."},{"key":"49_CR13","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Technol. 13, 890\u2013896 (2003)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"1","key":"49_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo, L., Chen, Z., Chen, M., Zeng, X., Xiong, Z.: Reversible image watermarking using interpolation technique. IEEE Trans. Forensic Secure 5(1), 187\u2013193 (2010)","journal-title":"IEEE Trans. Forensic Secure"},{"key":"49_CR15","first-page":"870","volume":"5","author":"M Fallahpour","year":"2008","unstructured":"Fallahpour, M.: Reversible image data hiding based on gradient. IEICE 5, 870\u2013876 (2008)","journal-title":"IEICE"},{"issue":"4","key":"49_CR16","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"15","author":"MU Celik","year":"2006","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M.: Lossless watermarking for image authentication, a new framework and an implementation. IEEE Trans. Image Process 15(4), 1042\u20131049 (2006)","journal-title":"IEEE Trans. Image Process"},{"issue":"7","key":"49_CR17","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Hong, W.: An efficient prediction-and-shifting embedding technique for high quality reversible data hiding. EURASIPJ. Adv. Signal Process (2010)","DOI":"10.1155\/2010\/104835"},{"key":"49_CR19","unstructured":"Weng, S., Shi, Y., Hong, W., Yao, Y.: Dynamic improved pixel value ordering reversible data hiding. Inf. Sci. 489, 136\u2013154 (2019). Elsevier"},{"issue":"7","key":"49_CR20","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"W Zhang","year":"2013","unstructured":"Zhang, W., Hu, X., Li, X., Yu, N.: Recursive histogram modification establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775\u20132785 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"49_CR21","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1109\/TCSVT.2011.2130410","volume":"21","author":"X Gao","year":"2011","unstructured":"Gao, X., An, L., Yuan, Y., Tao, D., Li, X.: Lossless data embedding using Generalized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 21(8), 1061\u20131070 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"6","key":"49_CR22","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li, X., Li, B., Yang, B., Zeng, T.: General framework to histogram shifting based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181\u20132191 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"49_CR23","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2156803","volume":"20","author":"X Li","year":"2011","unstructured":"Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on Adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20(12), 3524\u20133533 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"49_CR24","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"Li, X., Li, J., Li, B., Yang, B.: High fidelity reversible data hiding scheme based on pixel value ordering and prediction error expansion. Signal Process 93(1), 198\u2013205 (2013)","journal-title":"Signal Process"},{"key":"49_CR25","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2015.01.002","volume":"111","author":"X Qu","year":"2011","unstructured":"Qu, X., Kim, H.J.: Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 111, 249\u2013260 (2011)","journal-title":"Signal Process."},{"issue":"2","key":"49_CR26","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Hu, Y., Lee, H.K., Li, J.: DE-based reversible data hiding with improved Overflow location map. IEEE Trans. Circuits Syst. Video Technol. 19(2), 250\u2013260 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"49_CR27","first-page":"354","volume":"16","author":"Z Ni","year":"2007","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2007)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42058-1_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T00:38:43Z","timestamp":1584059923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-42058-1_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030420574","9783030420581"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42058-1_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}