{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:36:27Z","timestamp":1774942587817,"version":"3.50.1"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319638553","type":"print"},{"value":"9783319638560","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-63856-0_27","type":"book-chapter","created":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T03:54:58Z","timestamp":1500263698000},"page":"214-221","source":"Crossref","is-referenced-by-count":9,"title":["DCT-Based Compressed Image with Reversibility Using Modified Quantization"],"prefix":"10.1007","author":[{"given":"Chi-Yao","family":"Weng","sequence":"first","affiliation":[]},{"given":"Cheng-Ta","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hung-Wei","family":"Kao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"key":"27_CR1","first-page":"94","volume":"30","author":"H Dadogstar","year":"2016","unstructured":"Dadogstar, H., Afsari, F.: Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB. J. Inf. Secur. Appl. 30, 94\u2013104 (2016)","journal-title":"J. Inf. Secur. Appl."},{"key":"27_CR2","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.sigpro.2017.02.001","volume":"137","author":"A Arham","year":"2017","unstructured":"Arham, A., Nugroho, H.A., Adji, T.B.: Multiple layer data hiding scheme based on difference expansion of quad. Sig. Process. 137, 52\u201362 (2017)","journal-title":"Sig. Process."},{"key":"27_CR3","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","volume":"48","author":"SY Shen","year":"2015","unstructured":"Shen, S.Y., Huang, L.H.: A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput. Secur. 48, 131\u2013141 (2015)","journal-title":"Comput. Secur."},{"key":"27_CR4","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.sigpro.2016.11.003","volume":"133","author":"JC Chang","year":"2017","unstructured":"Chang, J.C., Lu, Y.Z., Wu, H.L.: A separable reversible data hiding scheme for encrypted JPEG bitstreams. Sig. Process. 133, 135\u2013143 (2017)","journal-title":"Sig. Process."},{"key":"27_CR5","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.sigpro.2014.09.021","volume":"108","author":"TY Tu","year":"2015","unstructured":"Tu, T.Y., Wang, C.H.: Reversible data hiding with high payload based on referred frequency for VQ compressed codes index. Sig. Process. 108, 278\u2013287 (2015)","journal-title":"Sig. Process."},{"key":"27_CR6","doi-asserted-by":"crossref","first-page":"855","DOI":"10.1016\/j.csi.2013.12.013","volume":"36","author":"YK Lin","year":"2014","unstructured":"Lin, Y.K.: A data hiding scheme based upon DCT coefficient modification. Comput. Stand. Interfaces 36, 855\u2013862 (2014)","journal-title":"Comput. Stand. Interfaces"},{"key":"27_CR7","doi-asserted-by":"crossref","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang, C.C., Lin, C.C., Tseng, C.S., Tai, W.L.: Reversible hiding in DCT-based compressed images. Inf. Sci. 177, 2768\u20132786 (2007)","journal-title":"Inf. Sci."},{"key":"27_CR8","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"ZC Ni","year":"2006","unstructured":"Ni, Z.C., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16, 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"27_CR9","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1049\/iet-ipr.2009.0316","volume":"4","author":"CH Yang","year":"2010","unstructured":"Yang, C.H., Tsai, M.H.: Improving histogram-based reversible data hiding by interleaving predictions. IET Image Proc. 4, 223\u2013234 (2010)","journal-title":"IET Image Proc."},{"key":"27_CR10","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.jvcir.2017.03.010","volume":"46","author":"WG He","year":"2017","unstructured":"He, W.G., Cai, J., Zhou, K., Xiong, G.Q.: Efficient PVO-based reversible data hiding using multistage blocking and prediction accuracy matrix. J. Vis. Commun. Image Represent. 46, 58\u201369 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"27_CR11","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.neucom.2016.11.017","volume":"226","author":"B Ou","year":"2017","unstructured":"Ou, B., Li, X.L., Wang, J.W., Peng, F.: High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion. Neurocomputing 226, 23\u201334 (2017)","journal-title":"Neurocomputing"},{"key":"27_CR12","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.sigpro.2015.12.012","volume":"123","author":"DW Xu","year":"2016","unstructured":"Xu, D.W., Wang, R.D.: Separable and error-free reversible data hiding in encrypted image. Sig. Process. 123, 9\u201321 (2016)","journal-title":"Sig. Process."}],"container-title":["Smart Innovation, Systems and Technologies","Advances in Intelligent Information Hiding and Multimedia Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63856-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,17]],"date-time":"2017-07-17T04:02:46Z","timestamp":1500264166000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63856-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"ISBN":["9783319638553","9783319638560"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63856-0_27","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"value":"2190-3018","type":"print"},{"value":"2190-3026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,18]]}}}