{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:05:59Z","timestamp":1766066759375,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064265"},{"type":"electronic","value":"9789811064272"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6427-2_41","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T06:32:16Z","timestamp":1506148336000},"page":"511-524","source":"Crossref","is-referenced-by-count":6,"title":["Reversible Watermarking Scheme Using PVD-DE"],"prefix":"10.1007","author":[{"given":"Pabitra","family":"Pal","sequence":"first","affiliation":[]},{"given":"Partha","family":"Chowdhuri","sequence":"additional","affiliation":[]},{"given":"Biswapati","family":"Jana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M.A.M., Danyali, H., Helfroush, M.S.: Reversible watermarking based on interpolation error histogram shifting. In: 2010 5th International Symposium on Telecommunications (IST), pp. 840\u2013845 (2010)","DOI":"10.1109\/ISTEL.2010.5734139"},{"issue":"8","key":"41_CR2","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147\u20131156 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"41_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jss.2010.08.055","volume":"84","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi, O.M., Khoo, B.E.: High capacity data hiding schemes for medical images based on difference expansion. J. Syst. Softw. 84(1), 105\u2013112 (2011)","journal-title":"J. Syst. Softw."},{"key":"41_CR4","unstructured":"Chang, C.C., Chou, Y.C., Kieu, T.D.: Information hiding in dual images with reversibility. In: Third International Conference on Multimedia and Ubiquitous Engineering, 2009, MUE 2009, pp. 145\u2013152. IEEE (2009)"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Kieu, T.D., Chou, Y.C.: Reversible data hiding scheme using two steganographic images. In: 2007 IEEE Region 10 Conference, TENCON 2007, pp. 1\u20134. IEEE (2007)","DOI":"10.1109\/TENCON.2007.4483783"},{"key":"41_CR6","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Photonics West 2001-Electronic Imaging, pp. 197\u2013208. International Society for Optics and Photonics (2001)"},{"key":"41_CR7","unstructured":"Honsinger, C.W., Jones, P.W., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data, U.S. Patent No. 6,278,791 (2001)"},{"issue":"6","key":"41_CR8","doi-asserted-by":"publisher","first-page":"2097","DOI":"10.1016\/j.patcog.2007.11.018","volume":"41","author":"CC Lee","year":"2008","unstructured":"Lee, C.C., Wu, H.C., Tsai, C.S., Chu, Y.P.: Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn. 41(6), 2097\u20132106 (2008)","journal-title":"Pattern Recogn."},{"issue":"10","key":"41_CR9","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1016\/j.jss.2010.05.078","volume":"83","author":"CF Lee","year":"2010","unstructured":"Lee, C.F., Chen, H.L., Tso, H.K.: Embedding capacity raising in reversible data hiding based on prediction of difference expansion. J. Syst. Softw. 83(10), 1864\u20131872 (2010)","journal-title":"J. Syst. Softw."},{"issue":"4","key":"41_CR10","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","volume":"52","author":"CF Lee","year":"2013","unstructured":"Lee, C.F., Huang, Y.L.: Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 52(4), 2237\u20132247 (2013)","journal-title":"Telecommun. Syst."},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Lee, C.F., Wang, K.H., Chang, C.C., Huang, Y.L.: A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pp. 228\u2013237. ACM (2009)","DOI":"10.1145\/1516241.1516281"},{"key":"41_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.sigpro.2014.08.022","volume":"108","author":"TC Lu","year":"2015","unstructured":"Lu, T.C., Tseng, C.Y., Wu, J.H.: Dual imaging-based reversible hiding technique using LSB matching. Sig. Process. 108, 77\u201389 (2015)","journal-title":"Sig. Process."},{"key":"41_CR13","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.sigpro.2015.03.017","volume":"115","author":"TC Lu","year":"2015","unstructured":"Lu, T.C., Wu, J.H., Huang, C.C.: Dual-image-based reversible data hiding method using center folding strategy. Sig. Process. 115, 195\u2013213 (2015)","journal-title":"Sig. Process."},{"key":"41_CR14","unstructured":"Macq, B.: Lossless multiresolution transform for image authenticating watermarking. In: Proceedings of the EUSIPCO, pp. 533\u2013536 (2000)"},{"issue":"3","key":"41_CR15","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"15","key":"41_CR16","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin, C., Chang, C.C., Hsu, T.J.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed. Tools Appl. 74(15), 5861\u20135872 (2015)","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"41_CR17","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Techn. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Techn."},{"key":"41_CR18","unstructured":"University of Southern California: The USC-SIPI Image Database (2015). http:\/\/sipi.usc.edu\/database\/database.php"},{"issue":"9","key":"41_CR19","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Patt. Recogn. Lett. 24(9), 1613\u20131626 (2003)","journal-title":"Patt. Recogn. Lett."},{"issue":"7","key":"41_CR20","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.aeue.2011.11.004","volume":"66","author":"XT Zeng","year":"2012","unstructured":"Zeng, X.T., Li, Z.: Reversible data hiding scheme using reference pixel and multi-layer embedding. AEU-Int. J. Electron. Commun. 66(7), 532\u2013539 (2012)","journal-title":"AEU-Int. J. Electron. Commun."}],"container-title":["Communications in Computer and Information Science","Computational Intelligence, Communications, and Business Analytics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6427-2_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T18:08:04Z","timestamp":1570126084000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6427-2_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064265","9789811064272"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6427-2_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}