{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:12:32Z","timestamp":1725869552241},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_5","type":"book-chapter","created":{"date-parts":[[2016,10,30]],"date-time":"2016-10-30T23:53:29Z","timestamp":1477871609000},"page":"48-62","source":"Crossref","is-referenced-by-count":3,"title":["Reversible Data Hiding with Low Bit-Rate Growth in H.264\/AVC Compressed Video by Adaptive Hybrid Coding"],"prefix":"10.1007","author":[{"given":"Tian-Qi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hong-Xia","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"7","key":"5_CR1","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"W Zhang","year":"2013","unstructured":"Zhang, W., Hu, X., Li, X., et al.: Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans. Image Process. 22(7), 2775\u20132785 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"5_CR2","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/TCSVT.2013.2276710","volume":"24","author":"Y Tew","year":"2014","unstructured":"Tew, Y., Wong, K.S.: An overview of information hiding in H.264\/AVC compressed video. IEEE Trans. Circuits Syst. Video Technol. 24(2), 305\u2013319 (2014)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-662-43886-2_10","volume-title":"Digital-Forensics and Watermarking","author":"D Xu","year":"2014","unstructured":"Xu, D., Wang, R., Shi, Y.Q.: Reversible data hiding in encrypted H.264\/AVC video streams. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 141\u2013152. Springer, Heidelberg (2014)"},{"key":"5_CR4","doi-asserted-by":"crossref","first-page":"1076","DOI":"10.1016\/j.neucom.2014.03.089","volume":"151","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Hu, M., Ma, X., et al.: A new robust data hiding method for H.264\/AVC without intra-frame distortion drift. Neurocomputing 151, 1076\u20131085 (2015)","journal-title":"Neurocomputing"},{"key":"5_CR5","unstructured":"Barton, J.M.: Method and apparatus for embedding authentication information within digital data: US. US 6047374 A[P] (2000)"},{"issue":"8","key":"5_CR6","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"5_CR7","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., et al.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"5_CR8","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Hu, Y., Lee, H.K., Li, J.: DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol. 19(2), 250\u2013260 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2\u20133","key":"5_CR9","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s11042-010-0476-4","volume":"52","author":"X Zeng","year":"2011","unstructured":"Zeng, X., Chen, Z., Xiong, Z.: Issues and solution on distortion drift in reversible video data hiding. Multimed. Tools Appl. 52(2\u20133), 465\u2013484 (2011)","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"5_CR10","first-page":"1059","volume":"7","author":"YX Liu","year":"2012","unstructured":"Liu, Y.X., Li, Z., Ma, X.: Reversible data hiding scheme based on H.264\/AVC without distortion drift. J. Softw. 7(5), 1059\u20131065 (2012)","journal-title":"J. Softw."},{"key":"5_CR11","unstructured":"Li, R., Wang, R., Li, R., et al.: Video error resilience scheme using reversible data hiding technique for intra-frame in H.264\/AVC. In: Proceedings of International Conference on Multimedia Technology, vol. 84, pp. 462\u2013469 (2013)"},{"key":"5_CR12","doi-asserted-by":"crossref","first-page":"1053","DOI":"10.1016\/j.neucom.2014.03.088","volume":"151","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Ju, L., Hu, M., et al.: A robust reversible data hiding scheme for H.264 without distortion drift. Neurocomputing 151, 1053\u20131062 (2015)","journal-title":"Neurocomputing"},{"issue":"5","key":"5_CR13","doi-asserted-by":"crossref","first-page":"053022","DOI":"10.1117\/1.JEI.23.5.053022","volume":"23","author":"D Xu","year":"2014","unstructured":"Xu, D., Wang, R.: Efficient reversible data hiding in encrypted H.264\/AVC videos. J. Electron. Imaging 23(5), 053022 (2014)","journal-title":"J. Electron. Imaging"},{"issue":"4","key":"5_CR14","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1109\/TIFS.2014.2302899","volume":"9","author":"D Xu","year":"2014","unstructured":"Xu, D., Wang, R., Shi, Y.Q.: Data hiding in encrypted H.264\/AVC video streams by codeword substitution. IEEE Trans. Inf. Forensics Secur. 9(4), 596\u2013606 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR15","unstructured":"H.264\/AVC Reference Software JM8.6. http:\/\/iphome.hhi.de\/suehring\/tml\/download\/"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T22:25:06Z","timestamp":1498343106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}