{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T09:41:27Z","timestamp":1773740487374,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031251146","type":"print"},{"value":"9783031251153","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25115-3_2","type":"book-chapter","created":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T13:57:23Z","timestamp":1674914243000},"page":"20-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["High-Capacity Adaptive Steganography Based on\u00a0Transform Coefficient for\u00a0HEVC"],"prefix":"10.1007","author":[{"given":"Lin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Rangding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dawen","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Li","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Songhan","family":"He","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,29]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Wang, Y., Cao, Y., Zhao, X., Xu, Z., Zhu, M.: Maintaining rate-distortion optimization for IPM-based video steganography by constructing isolated channels in HEVC. In: 6th ACM Workshop on Information Hiding and Multimedia Security (IH and MMSec), Innsbruck, Austria, pp. 97\u2013107. ACM (2018)","DOI":"10.1145\/3206004.3206020"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Jia, X., Wang, J., Liu, Y., Kang, X., Shi, Y.: A layered embedding-based scheme to cope with intra-frame distortion drift in IPM-based HEVC steganography. In: 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Toronto, Canada, pp. 2720\u20132724. IEEE (2021)","DOI":"10.1109\/ICASSP39728.2021.9413728"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-030-11389-6_18","volume-title":"Digital Forensics and Watermarking","author":"Y Dong","year":"2019","unstructured":"Dong, Y., Sun, T., Jiang, X.: A high capacity HEVC steganographic algorithm using intra prediction modes in multi-sized prediction blocks. In: Yoo, C.D., Shi, Y.-Q., Kim, H.J., Piva, A., Kim, G. (eds.) IWDW 2018. LNCS, vol. 11378, pp. 233\u2013247. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11389-6_18"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Dong, Y., Jiang, X., Li, Z., Sun, T., Zhang, Z.: Multi-channel HEVC steganography by minimizing IPM steganographic distortions. IEEE Trans. Multimed. https:\/\/doi.org\/10.1109\/TMM.2022.3150180","DOI":"10.1109\/TMM.2022.3150180"},{"issue":"10","key":"2_CR5","doi-asserted-by":"publisher","first-page":"11979","DOI":"10.1007\/s11042-017-4844-1","volume":"77","author":"J Yang","year":"2017","unstructured":"Yang, J., Li, S.: An efficient information hiding method based on motion vector space encoding for HEVC. Multimed. Tools Appl. 77(10), 11979\u201312001 (2017). https:\/\/doi.org\/10.1007\/s11042-017-4844-1","journal-title":"Multimed. Tools Appl."},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"11163","DOI":"10.1007\/s11042-014-2223-8","volume":"74","author":"Y Yao","year":"2015","unstructured":"Yao, Y., Zhang, W., Yu, N., Zhao, X.: Defining embedding distortion for motion vector-based video steganography. Multimed. Tools Appl. 74, 11163\u201311186 (2015)","journal-title":"Multimed. Tools Appl."},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-030-43575-2_25","volume-title":"Digital Forensics and Watermarking","author":"M Guo","year":"2020","unstructured":"Guo, M., Sun, T., Jiang, X., Dong, Y., Xu, K.: A motion vector-based steganographic algorithm for HEVC with MTB mapping strategy. In: Wang, H., Zhao, X., Shi, Y., Kim, H.J., Piva, A. (eds.) IWDW 2019. LNCS, vol. 12022, pp. 293\u2013306. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43575-2_25"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.1109\/LSP.2021.3111565","volume":"28","author":"S Liu","year":"2021","unstructured":"Liu, S., Liu, B., Hu, Y., Zhao, X.: Non-degraded adaptive HEVC steganography by advanced motion vector prediction. IEEE Signal Process. Lett. 28, 1843\u20131847 (2021)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"2_CR9","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1109\/TCSVT.2010.2070950","volume":"20","author":"X Ma","year":"2010","unstructured":"Ma, X., Li, Z., Tu, H., Zhang, B.: A data hiding algorithm for H.264\/AVC video streams without intra-frame distortion drift. IEEE Trans. Circuits Syst. Video Technol. 20(4), 1320\u20131330 (2010)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2_CR10","first-page":"22","volume":"76","author":"Y Xue","year":"2019","unstructured":"Xue, Y., Zhou, J., Zeng, H., Zhong, P., Wen, J.: An adaptive steganographic scheme for H.264\/AVC video with distortion optimization. Signal Process.: Image Commun. 76, 22\u201330 (2019)","journal-title":"Signal Process.: Image Commun."},{"issue":"3","key":"2_CR11","first-page":"1320","volume":"18","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Wang, H., Wu, H., Wu, Z., Li, T., Malik, A.: Adaptive video data hiding through cost assignment and STCs. IEEE Trans. Depend. Secure Comput. 18(3), 1320\u20131335 (2021)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"4","key":"2_CR12","doi-asserted-by":"publisher","first-page":"2405","DOI":"10.1109\/TDSC.2021.3058134","volume":"19","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Wang, H., Choo, K., He, P., Salcic, Z., Kaafar, M., et al.: DDCA: a distortion drift-based cost assignment method for adaptive video steganography in the transform domain. IEEE Trans. Depend. Secure Comput. 19(4), 2405\u20132420 (2021)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"6459","DOI":"10.1007\/s11042-018-6320-y","volume":"78","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Liu, S., Zhao, H., Liu, S.: A new data hiding method for H.265\/HEVC video streams without intra-frame distortion drift. Multimed. Tools Appl. 78, 6459\u20136486 (2019)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"2_CR14","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.jvcir.2013.10.007","volume":"25","author":"P Chang","year":"2014","unstructured":"Chang, P., Chung, K., Chen, J., Lin, C., Lin, T.: A DCT\/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames. J. Vis. Commun. Image Represent. 25(2), 239\u2013253 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Zhou, A., Jiang, X., Sun, T., Li, Z., Dong, Y.: A HEVC steganography algorithm based on DCT\/DST coefficients with BLB distortion model. In: 14th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Shanghai, China, pp. 1\u20139. IEEE (2021)","DOI":"10.1109\/CISP-BMEI53629.2021.9624353"},{"issue":"7","key":"2_CR16","doi-asserted-by":"publisher","first-page":"8423","DOI":"10.1007\/s11042-018-6859-7","volume":"78","author":"Y Yang","year":"2018","unstructured":"Yang, Y., Li, Z., Xie, W., Zhang, Z.: High capacity and multilevel information hiding algorithm based on PU partition modes for HEVC videos. Multimed. Tools Appl. 78(7), 8423\u20138446 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"2_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2022.103549","volume":"87","author":"S He","year":"2022","unstructured":"He, S., Xu, D., Yang, L., Liu, Y.: HEVC video information hiding scheme based on adaptive double-layer embedding strategy. J. Vis. Commun. Image Represent. 87, 103549 (2022)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"2_CR18","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2011.2134094","volume":"6","author":"T Filler","year":"2011","unstructured":"Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inf. Forensics Secur. 6(3), 920\u2013935 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"1762","DOI":"10.1109\/TIFS.2019.2949428","volume":"15","author":"L Zhai","year":"2020","unstructured":"Zhai, L., Wang, L., Ren, Y.: Universal detection of video steganography in multiple domains based on the consistency of motion vectors. IEEE Trans. Inf. Forensics Secur. 15, 1762\u20131777 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Wang, Y., Cao, Y., Zhao, X.: Video steganalysis based on centralized error detection in spatial domain. Infor. Secur. Cryptol. 472\u2013483 (2017)","DOI":"10.1007\/978-3-319-54705-3_29"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25115-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,28]],"date-time":"2023-01-28T13:58:00Z","timestamp":1674914280000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25115-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031251146","9783031251153"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25115-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guilin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw.site\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.23","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.43","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}