{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:31:04Z","timestamp":1742959864465,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319534640"},{"type":"electronic","value":"9783319534657"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-53465-7_34","type":"book-chapter","created":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T09:53:19Z","timestamp":1487152399000},"page":"456-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Adaptive Reversible Data Hiding Scheme for JPEG Images"],"prefix":"10.1007","author":[{"given":"Jiaxin","family":"Yin","sequence":"first","affiliation":[]},{"given":"Rui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuanfang","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"issue":"3","key":"34_CR1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","volume":"46","author":"N Altman","year":"1992","unstructured":"Altman, N.: An introduction to kernel and nearest-neighbor nonparametric regression. Am. Stat. 46(3), 175\u2013185 (1992)","journal-title":"Am. Stat."},{"key":"34_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas, P., Filler, T., Pevn\u00fd, T.: \u201cBreak our steganographic system\u201d: the ins and outs of organizing BOSS. In: Filler, T., Pevn\u00fd, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59\u201370. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-24178-9_5"},{"issue":"1","key":"34_CR3","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1155\/S1110865702000537","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., Du, R.: Lossless data embedding: new paradigm in digital watermarking. EURASIP J. Appl. Sig. Process. 2002(1), 185\u2013196 (2002)","journal-title":"EURASIP J. Appl. Sig. Process."},{"issue":"8","key":"34_CR4","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1016\/j.jss.2013.03.102","volume":"86","author":"Y Hu","year":"2013","unstructured":"Hu, Y., Wang, K., Lu, Z.: An improved VLC-based lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(8), 2166\u20132173 (2013)","journal-title":"J. Syst. Softw."},{"issue":"9","key":"34_CR5","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","volume":"26","author":"F Huang","year":"2016","unstructured":"Huang, F., Qu, X., Kim, H., Huang, J.: Reversible data hiding in JPEG images. IEEE Trans. Circ. Syst. Video Technol. 26(9), 1610\u20131621 (2016)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Jaiswal, S.P., Au, O.C., Jakhetiya, V., Guo, Y., Tiwari, A.K., Yue, K.: Efficient adaptive prediction based reversible image watermarking. In: 2013 IEEE International Conference on Image Processing, pp. 4540\u20134544. IEEE (2013)","DOI":"10.1109\/ICIP.2013.6738935"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Li, Q., Wu, Y., Bao, F.: A reversible data hiding scheme for JPEG images. In: Proceedings of 11th Pacific Rim Conference on Multimedia, pp. 653\u2013664 (2010)","DOI":"10.1007\/978-3-642-15702-8_60"},{"issue":"4","key":"34_CR8","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/TIP.2009.2035227","volume":"19","author":"B Mobasseri","year":"2010","unstructured":"Mobasseri, B., Berger, R., Marcinak, M.P., NaikRaikar, Y.: Data embedding in JPEG bitstream by code mapping. IEEE Trans. Image Process. 19(4), 958\u2013966 (2010)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"34_CR9","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"7","key":"34_CR10","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1049\/iet-ipr.2014.0689","volume":"9","author":"A Nikolaidis","year":"2015","unstructured":"Nikolaidis, A.: Reversible data hiding in JPEG images utilising zero quantised coefficients. IET Image Proc. 9(7), 560\u2013568 (2015)","journal-title":"IET Image Proc."},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Pevn\u1ef3, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of 12th International Workshop on Information Hiding, pp. 161\u2013177, April 2010","DOI":"10.1007\/978-3-642-16435-4_13"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Sakai, H., Kuribayashi, M., Morii, M.: Adaptive reversible data hiding for JPEG images. In: International Symposium on Information Theory and its Applications, ISITA 2008, pp. 1\u20136. IEEE (2008)","DOI":"10.1109\/ISITA.2008.4895529"},{"issue":"3","key":"34_CR13","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TMM.2011.2181342","volume":"14","author":"A Subramanyam","year":"2012","unstructured":"Subramanyam, A., Emmanuel, S., Kankanhalli, M.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimedia 14(3), 703\u2013716 (2012)","journal-title":"IEEE Trans. Multimedia"},{"issue":"8","key":"34_CR14","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Techn. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Techn."},{"key":"34_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.displa.2015.10.005","volume":"41","author":"T Tuncer","year":"2016","unstructured":"Tuncer, T., Avci, E.: A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images. Displays 41, 1\u20138 (2016)","journal-title":"Displays"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Wallace, G.: The JPEG still picture compression standard. IEEE Trans. Consum. Electron. 38(1), xviii\u2013xxxiv (1992)","DOI":"10.1109\/30.125072"},{"issue":"7","key":"34_CR17","doi-asserted-by":"publisher","first-page":"1965","DOI":"10.1016\/j.jss.2013.03.083","volume":"86","author":"K Wang","year":"2013","unstructured":"Wang, K., Lu, Z., Hu, Y.: A high capacity lossless data hiding scheme for JPEG images. J. Syst. Softw. 86(7), 1965\u20131975 (2013)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"34_CR18","first-page":"52","volume":"18","author":"ZH Wang","year":"2016","unstructured":"Wang, Z.H., Zhuang, X., Chang, C.C., Qin, C., Zhu, Y.: Reversible data hiding based on geometric structure of pixel groups. Int. J. Netw. Secur. 18(1), 52\u201359 (2016)","journal-title":"Int. J. Netw. Secur."},{"key":"34_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1007\/978-3-540-74260-9_64","volume-title":"Image Analysis and Recognition","author":"G Xuan","year":"2007","unstructured":"Xuan, G., Shi, Y.Q., Ni, Z., Chai, P., Cui, X., Tong, X.: Reversible data hiding for JPEG images based on histogram pairs. In: Kamel, M., Campilho, A. (eds.) ICIAR 2007. LNCS, vol. 4633, pp. 715\u2013727. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-74260-9_64"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-53465-7_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T13:44:34Z","timestamp":1719063874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-53465-7_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319534640","9783319534657"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-53465-7_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 February 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iwdw.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}