{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:15:21Z","timestamp":1770884121945,"version":"3.50.1"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319641843","type":"print"},{"value":"9783319641850","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64185-0_26","type":"book-chapter","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T08:08:07Z","timestamp":1500970087000},"page":"347-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Blind Reversible Data Hiding Method for High Dynamic Range Images Taking Advantage of Sparse Histogram"],"prefix":"10.1007","author":[{"given":"Masaaki","family":"Fujiyoshi","sequence":"first","affiliation":[]},{"given":"Hitoshi","family":"Kiya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,26]]},"reference":[{"key":"26_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21754-3","volume-title":"Multimedia Data Hiding","author":"M Wu","year":"2003","unstructured":"Wu, M., Liu, B.: Multimedia Data Hiding. Springer, New York (2003)"},{"key":"26_CR2","volume-title":"Digital Watermarking and Steganography","author":"IJ Cox","year":"2008","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2008)","edition":"2"},{"key":"26_CR3","volume-title":"Steganography in Digital Media","author":"J Fridrich","year":"2010","unstructured":"Fridrich, J.: Steganography in Digital Media. Cambridge University Press, Cambridge (2010)"},{"issue":"5","key":"26_CR4","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"GC Langelaar","year":"2000","unstructured":"Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image and video data. IEEE Signal Process. Mag. 17(5), 20\u201346 (2000)","journal-title":"IEEE Signal Process. Mag."},{"issue":"6","key":"26_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2003.1253554","volume":"20","author":"M Barni","year":"2003","unstructured":"Barni, M.: What is the future for watermarking? (part II). IEEE Signal Process. Mag. 20(6), 53\u201359 (2003)","journal-title":"IEEE Signal Process. Mag."},{"key":"26_CR6","unstructured":"Tachibana, T., Fujiyoshi, M., Kiya, H.: A removable watermarking scheme retaining the desired image quality. In: Proceedings of IEEE International Symposium on Intelligent Signal Processing and Communication Systems, pp. 538\u2013542, December 2003"},{"issue":"5","key":"26_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MSP.2003.1236772","volume":"20","author":"M Barni","year":"2003","unstructured":"Barni, M.: What is the future for watermarking? (part I). IEEE Signal Process. Mag. 20(5), 55\u201359 (2003)","journal-title":"IEEE Signal Process. Mag."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Kuo, C.-C.J., Kalker, T., Zhou, W. (eds.): Digital rights management. IEEE Signal Process. Mag. 21(2) 11\u2013117 (2004)","DOI":"10.1109\/MSP.2004.1276100"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Sae-Tang, W., Liu, S., Fujiyoshi, M., Kiya, H.: A copyright-and privacy-protected image trading system using fingerprinting in discrete wavelet domain with JPEG 2000. IEICE Trans. Fundam. E97-A(11), 2107\u20132113 (2014)","DOI":"10.1587\/transfun.E97.A.2107"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Caldelli, R., Filippini, F., Becarelli, R.: Reversible watermarking techniques: an overview and a classification. EURASIP J. Inf. Secur., Article ID 134546 (2010)","DOI":"10.1155\/2010\/134546"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Shi, Y.Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"issue":"3","key":"26_CR12","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circ. Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/978-3-662-43886-2_35","volume-title":"Digital-Forensics and Watermarking","author":"M Fujiyoshi","year":"2014","unstructured":"Fujiyoshi, M.: Generalized histogram shifting-based blind reversible data hiding with balanced and guarded double side modification. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 488\u2013502. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-43886-2_35"},{"key":"26_CR14","unstructured":"Reinhard, E., Heidrich, W., Debevec, P., Pattanaik, S., Ward, G., Myszkowski, K.: High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting, 2nd edn. Morgan Kaufmann, June 2010"},{"key":"26_CR15","unstructured":"Dufaux, F., Le Callet, P., Mantiu, R., Mrak, M. (eds.): High Dynamic Range Video: From Acquisition to Display and Applications. Academic Press, April 2016"},{"issue":"2","key":"26_CR16","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/TIFS.2011.2109383","volume":"6","author":"F Guerrini","year":"2011","unstructured":"Guerrini, F., Okuda, M., Adami, N., Leonardi, R.: High dynamic range image watermarking robust against tone-mapping operators. IEEE Trans. Inf. Forensics Secur. 6(2), 283\u2013295 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Wu, J.L.: Robust watermarking framework for high dynamic range images against tone-mapping attacks. In: Gupta, M.D. (ed.) Watermarking, vol. 2, 229\u2013242. InTech, May 2012","DOI":"10.5772\/37991"},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Autrusseau, F., Goudia, D.: Non linear hybrid watermarking for high dynamic range images. In: Proceedings of IEEE International Conference on Image Processing, September 2013","DOI":"10.1109\/ICIP.2013.6738932"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Maiorana, E., Campisi, P.: High-capacity watermarking of high dynamic range images. EURASIP J. Image Video Process., January 2016","DOI":"10.1186\/s13640-015-0100-7"},{"issue":"1","key":"26_CR20","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TMM.2016.2605499","volume":"19","author":"YT Lin","year":"2017","unstructured":"Lin, Y.T., Wang, C.M., Chen, W.S., Lin, F.P., Lin, W.: A novel data hiding algorithm for high dynamic range images. IEEE Trans. Multimedia 19(1), 163\u2013196 (2017)","journal-title":"IEEE Trans. Multimedia"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Murofushi, T., Iwahashi, M., Kiya, H.: An integer tone mapping operation for HDR images expressed in floating point data. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2479\u20132483, May 2013","DOI":"10.1109\/ICASSP.2013.6638101"},{"issue":"5","key":"26_CR22","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.displa.2011.02.004","volume":"32","author":"CM Yu","year":"2011","unstructured":"Yu, C.M., Wu, K.C., Wang, C.M.: A distortion-free data hiding scheme for high dynamic range images. Displays 32(5), 225\u2013236 (2011)","journal-title":"Displays"},{"issue":"1","key":"26_CR23","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s11042-014-2279-5","volume":"75","author":"CC Chang","year":"2016","unstructured":"Chang, C.C., Nguyen, T.S., Lin, C.C.: A new distortion-free data embedding scheme for high-dynamic range images. Multimedia Tools Appl. 75(1), 145\u2013163 (2016)","journal-title":"Multimedia Tools Appl."},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/11922841_28","volume-title":"Digital Watermarking","author":"JH Hwang","year":"2006","unstructured":"Hwang, J.H., Kim, J.W., Choi, J.U.: A reversible watermarking based on histogram shifting. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 348\u2013361. Springer, Heidelberg (2006). doi:10.1007\/11922841_28"},{"key":"26_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1007\/978-3-540-74205-0_119","volume-title":"Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence","author":"W-C Kuo","year":"2007","unstructured":"Kuo, W.-C., Jiang, D.-J., Huang, Y.-C.: Reversible data hiding based on histogram. In: Huang, D.-S., Heutte, L., Loog, M. (eds.) ICIC 2007. LNCS, vol. 4682, pp. 1152\u20131161. Springer, Heidelberg (2007). doi:10.1007\/978-3-540-74205-0_119"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Ward, G.: Real pixels. In: Arvo, J. (ed.) Graphics Gems II. Graphics Gems, pp. 80\u201383. Academic Press (1991)","DOI":"10.1016\/B978-0-08-050754-5.50025-6"},{"key":"26_CR27","unstructured":"Kainz, F., Bogart, R., Hess, D.: The OpenEXR image file format. In: Proceedings of ACM SIGGRAPH, July 2003"},{"key":"26_CR28","doi-asserted-by":"crossref","unstructured":"Iwahashi, M., Kobayashi, H., Kiya, H.: Lossy compression of sparse histogram images. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1361\u20131364, March 2012","DOI":"10.1109\/ICASSP.2012.6288143"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Odaka, T., Sae-Tang, W., Fujiyoshi, M., Kobayashi, H., Iwahashi, M., Kiya, H.: An efficient lossless compression method using histogram packing for HDR images in OpenEXR format. IEICE Trans. Fundam. E97-A(11), 2181\u20132183 (2014)","DOI":"10.1587\/transfun.E97.A.2181"},{"issue":"3","key":"26_CR30","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1145\/566654.566575","volume":"21","author":"E Reinhard","year":"2002","unstructured":"Reinhard, E., Stark, M., Shirley, P., Ferwerda, J.: Photographic tone reproduction for digital images. ACM Trans. Graph. 21(3), 267\u2013276 (2002)","journal-title":"ACM Trans. Graph."},{"key":"26_CR31","doi-asserted-by":"crossref","unstructured":"Fujiyoshi, M.: A histogram shifting-based blind reversible data hiding method with a histogram peak estimator. In: Proceedings of IEEE International Symposium on Communications and Information Technologies, pp. 318\u2013323, October 2012","DOI":"10.1109\/ISCIT.2012.6380913"},{"key":"26_CR32","doi-asserted-by":"crossref","unstructured":"Mantiuk, R., Kim, K.J., Rempel, A.G., Heidrich, W.: HDR-VDP-2: a calibrated visual metric for visibility and quality predictions in all luminance conditions. ACM Trans. Graph. 30(4), July 2011","DOI":"10.1145\/2010324.1964935"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Fujiyoshi, M.: A near-lossless data hiding method with an improved quantizer. In: Proceedings of IEEE International Symposium on Circuits and Systems, pp. 2289\u20132292, June 2014","DOI":"10.1109\/ISCAS.2014.6865628"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Fujiyoshi, M., Kiya, H.: A visually-lossless data hiding method based on histogram modification. In: Proceedings of IEEE International Symposium on Circuits and Systems, pp. 1692\u20131695, May 2012","DOI":"10.1109\/ISCAS.2012.6271585"},{"issue":"4","key":"26_CR35","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"26_CR36","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"key":"26_CR37","unstructured":"IEEE Standard for Floating-Point Arithmetic, 754\u20132008 (2008)"},{"key":"26_CR38","doi-asserted-by":"crossref","unstructured":"Ayd\u0131n, T.O., Mantiuk, R., Seidel, H.P.: Extending quality metrics to full dynamic range images. In: Proceedings of SPIE Human Vision and Electronic Imaging XIII, San Jose, USA, vol. 6806, 10 January 2008","DOI":"10.1117\/12.765095"},{"key":"26_CR39","unstructured":"Wang, Z., Simoncelli, E.P., Bovik, A.C.: Multi-scale structural similarity for image quality assessment. In: Proceedings of IEEE Asilomar Conference on Signals, Systems and Computers, November 2003"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64185-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:10:11Z","timestamp":1709831411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-64185-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319641843","9783319641850"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64185-0_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"26 July 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Magdeburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2017.cs.ovgu.de\/cms\/front_content.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}