{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:07:03Z","timestamp":1743080823711,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031459320"},{"type":"electronic","value":"9783031459337"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45933-7_28","type":"book-chapter","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:02:37Z","timestamp":1700470957000},"page":"481-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for JPEG Images"],"prefix":"10.1007","author":[{"given":"Bin","family":"Ma","sequence":"first","affiliation":[]},{"given":"Songkun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chunpeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless data embedding for all image formats, vol. 4675, pp. 572\u2013583 (2002)","DOI":"10.1155\/S1110865702000537"},{"issue":"8","key":"28_CR2","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"28_CR3","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.-Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"28_CR4","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D.M., Rodr\u00edguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"key":"28_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jvcir.2016.05.005","volume":"39","author":"B Ou","year":"2016","unstructured":"Ou, B., Li, X., Wang, J.: High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion. J. Vis. Commun. Image Represent. 39, 12\u201323 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"7","key":"28_CR6","doi-asserted-by":"publisher","first-page":"2176","DOI":"10.1109\/TCSVT.2018.2859792","volume":"29","author":"B Ou","year":"2018","unstructured":"Ou, B., Li, X., Zhang, W., Zhao, Y.: Improving pairwise pee via hybrid-dimensional histogram generation and adaptive mapping selection. IEEE Trans. Circuits Syst. Video Technol. 29(7), 2176\u20132190 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"28_CR7","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1109\/LSP.2023.3256701","volume":"30","author":"R Hu","year":"2023","unstructured":"Hu, R., Xiang, S.: Efficient 2D mapping for reversible data hiding. IEEE Signal Process. Lett. 30, 329\u2013333 (2023)","journal-title":"IEEE Signal Process. Lett."},{"key":"28_CR8","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication watermark for JPEG images. In: Proceedings International Conference on Information Technology: Coding and Computing, pp. 223\u2013227. IEEE (2001)"},{"issue":"13","key":"28_CR9","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"C-C Chang","year":"2007","unstructured":"Chang, C.-C., Lin, C.-C., Tseng, C.-S., Tai, W.-L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13), 2768\u20132786 (2007)","journal-title":"Inf. Sci."},{"issue":"7","key":"28_CR10","doi-asserted-by":"publisher","first-page":"1965","DOI":"10.1016\/j.jss.2013.03.083","volume":"86","author":"K Wang","year":"2013","unstructured":"Wang, K., Lu, Z.-M., Hu, Y.-J.: A high capacity lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(7), 1965\u20131975 (2013)","journal-title":"J. Syst. Softw."},{"issue":"4","key":"28_CR11","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/TIP.2009.2035227","volume":"19","author":"BG Mobasseri","year":"2009","unstructured":"Mobasseri, B.G., Berger, R.J., Marcinak, M.P., NaikRaikar, Y.J.: Data embedding in JPEG bitstream by code mapping. IEEE Trans. Image Process. 19(4), 958\u2013966 (2009)","journal-title":"IEEE Trans. Image Process."},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Wu, Y., Deng, R.H.: Zero-error watermarking on JPEG images by shuffling Huffman tree nodes. In: Visual Communications and Image Processing (VCIP), pp. 1\u20134. IEEE (2011)","DOI":"10.1109\/VCIP.2011.6115939"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/978-3-540-74260-9_64","volume-title":"Image Analysis and Recognition","author":"G Xuan","year":"2007","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible data hiding for JPEG images based on histogram pairs. In: Kamel, M., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 715\u2013727. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74260-9_64"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Sakai, H., Kuribayashi, M., Morii, M.: Adaptive reversible data hiding for JPEG images. In: International Symposium on Information Theory and Its Applications, pp. 1\u20136. IEEE (2008)","DOI":"10.1109\/ISITA.2008.4895529"},{"issue":"7","key":"28_CR15","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1049\/iet-ipr.2014.0689","volume":"9","author":"A Nikolaidis","year":"2015","unstructured":"Nikolaidis, A.: Reversible data hiding in JPEG images utilising zero quantised coefficients. IET Image Proc. 9(7), 560\u2013568 (2015)","journal-title":"IET Image Proc."},{"issue":"9","key":"28_CR16","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","volume":"26","author":"F Huang","year":"2015","unstructured":"Huang, F., Qu, X., Kim, H.J., Huang, J.: Reversible data hiding in JPEG images. IEEE Trans. Circuits Syst. Video Technol. 26(9), 1610\u20131621 (2015)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"28_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-017-0206-1","volume":"2017","author":"FT Wedaj","year":"2017","unstructured":"Wedaj, F.T., Kim, S., Kim, H.J., Huang, F.: Improved reversible data hiding in JPEG images based on new coefficient selection strategy. EURASIP J. Image Video Process. 2017, 1\u201311 (2017)","journal-title":"EURASIP J. Image Video Process."},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.sigpro.2018.02.002","volume":"148","author":"D Hou","year":"2018","unstructured":"Hou, D., Wang, H., Zhang, W., Yu, N.: Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process. 148, 41\u201347 (2018)","journal-title":"Signal Process."},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"34541","DOI":"10.1007\/s11042-019-08109-8","volume":"78","author":"F Di","year":"2019","unstructured":"Di, F., Zhang, M., Huang, F., Liu, J., Kong, Y.: Reversible data hiding in JPEG images based on zero coefficients and distortion cost function. Multimed. Tools Appl. 78, 34541\u201334561 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"28_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108604","volume":"198","author":"Y Chen","year":"2022","unstructured":"Chen, Y., He, J., Xian, Y.: Reversible data hiding for JPEG images based on improved mapping and frequency ordering. Signal Process. 198, 108604 (2022)","journal-title":"Signal Process."},{"key":"28_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107647","volume":"175","author":"J He","year":"2020","unstructured":"He, J., Pan, X., Wu, H.-T., Tang, S.: Improved block ordering and frequency selection for reversible data hiding in JPEG images. Signal Process. 175, 107647 (2020)","journal-title":"Signal Process."},{"key":"28_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107476","volume":"171","author":"N Li","year":"2020","unstructured":"Li, N., Huang, F.: Reversible data hiding for JPEG images based on pairwise nonzero AC coefficient expansion. Signal Process. 171, 107476 (2020)","journal-title":"Signal Process."},{"issue":"9","key":"28_CR23","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914\u20131927 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"28_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107544","volume":"172","author":"B Ma","year":"2020","unstructured":"Ma, B., Chang, L., Wang, C., Li, J., Wang, X., Shi, Y.-Q.: Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Signal Process. 172, 107544 (2020)","journal-title":"Signal Process."},{"key":"28_CR25","doi-asserted-by":"publisher","first-page":"17569","DOI":"10.1007\/s11042-021-10532-9","volume":"80","author":"B Ma","year":"2021","unstructured":"Ma, B., Hou, J.-C., Wang, C.-P., Wu, X.-M., Shi, Y.-Q.: A reversible data hiding algorithm for audio files based on code division multiplexing. Multimed. Tools Appl. 80, 17569\u201317581 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"28_CR26","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1049\/ipr2.12392","volume":"16","author":"B Ma","year":"2022","unstructured":"Ma, B., Fu, Y., Wang, C., Li, J., Wang, Y.: A high-performance insulators location scheme based on YOLOv4 deep learning network with GDIoU loss function. IET Image Proc. 16(4), 1124\u20131134 (2022)","journal-title":"IET Image Proc."},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Xiong, L., Han, X., Yang, C.-N., Zhang, X.: Reversible data hiding in shared images based on syndrome decoding and homomorphism. IEEE Trans. Cloud Comput. (2023)","DOI":"10.1109\/TCC.2023.3259478"},{"key":"28_CR28","doi-asserted-by":"publisher","first-page":"27290","DOI":"10.1109\/ACCESS.2023.3258461","volume":"11","author":"M Fan","year":"2023","unstructured":"Fan, M., Zhong, S., Xiong, X.: Reversible data hiding method for interpolated images based on modulo operation and prediction-error expansion. IEEE Access 11, 27290\u201327302 (2023)","journal-title":"IEEE Access"},{"key":"28_CR29","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1109\/LSP.2022.3231193","volume":"29","author":"X Yang","year":"2022","unstructured":"Yang, X., Huang, F.: New CNN-based predictor for reversible data hiding. IEEE Signal Process. Lett. 29, 2627\u20132631 (2022)","journal-title":"IEEE Signal Process. Lett."},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Yang, Y., He, H., Chen, F., Yuan, Y., Mao, N.: Reversible data hiding in encrypted images based on time-varying Huffman coding table. IEEE Trans. Multimed. (2023)","DOI":"10.1109\/TMM.2023.3238549"},{"key":"28_CR31","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TCSVT.2022.3208030","volume":"33","author":"Z Hua","year":"2022","unstructured":"Hua, Z., Wang, Z., Zheng, Y., Chen, Y., Li, Y.: Enabling large-capacity reversible data hiding over encrypted JPEG bitstreams. IEEE Trans. Circuits Syst. Video Technol. 33, 1003\u20131018 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"28_CR32","doi-asserted-by":"publisher","first-page":"2535","DOI":"10.1109\/TCSVT.2020.3027391","volume":"31","author":"M Xiao","year":"2020","unstructured":"Xiao, M., Li, X., Ma, B., Zhang, X., Zhao, Y.: Efficient reversible data hiding for JPEG images with multiple histograms modification. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2535\u20132546 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Weng, S., Zhou, Y., Zhang, T., Xiao, M., Zhao, Y.: General framework to reversible data hiding for JPEG images with multiple two-dimensional histograms. IEEE Trans. Multimed. (2022)","DOI":"10.1016\/j.jvcir.2022.103487"},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"Weng, S., Zhou, Y., Zhang, T., Xiao, M., Zhao, Y.: Reversible data hiding for JPEG images with adaptive multiple two-dimensional histogram and mapping generation. IEEE Trans. Multimed. (2023)","DOI":"10.1109\/TMM.2023.3241541"}],"container-title":["Lecture Notes in Computer Science","Science of Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45933-7_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T09:06:27Z","timestamp":1700471187000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45933-7_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031459320","9783031459337"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45933-7_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SciSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Science of Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"scisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/scisec.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}