{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:17:32Z","timestamp":1766067452415,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811674426"},{"type":"electronic","value":"9789811674433"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-7443-3_1","type":"book-chapter","created":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T17:54:45Z","timestamp":1636480485000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Adaptive Video Steganography Algorithm for Clustering and Dispersing DCT Coefficient Difference Histogram"],"prefix":"10.1007","author":[{"given":"Kun","family":"Han","sequence":"first","affiliation":[]},{"given":"Ke","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"XiaoYuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,10]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Senthilkumar, C., Gayathri Devi, K., Dhivya, M., Rajkumar, R.: A novel method on enhanced video security using steganography. Int. J. Recent Technol. Eng. (IJRTE) 9(1) (2020)","DOI":"10.35940\/ijrte.F9890.059120"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Shi, H., Sun, T., Jiang, X., Dong, Y., Xu, K.: A HEVC video steganalysis against DCT\/DST-based steganography. Int. J. Digit. Crime Forensics (IJDCF) 13(3) (2021)","DOI":"10.4018\/IJDCF.20210501.oa2"},{"key":"1_CR3","unstructured":"\u6bdb\u5b66\u6d9b.\u57fa\u4e8e H.264\/AVC \u89c6\u9891\u7684\u4fe1\u606f\u9690\u85cf\u6280\u672f\u7814\u7a76. \u5170\u5dde:\u897f\u5317\u5e08\u8303\u5927\u5b66 (2020). Mao, X.T.: Research Infomation Hiding Technology Based on H.264\/AVC Video. Northwest Normal University, Lanzhou (2020)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Baziyad, M., Rabie, T., Kamel, I.: Toward stronger energy compaction for high capacity DCT-based steganography: a region-growing approach. Multimed. Tools Appl. (2020, prepublish)","DOI":"10.1007\/978-3-030-45691-7_24"},{"key":"1_CR5","unstructured":"\u9ec4\u7ee7\u6b66,\u65bd\u4e91\u5e86 DCT \u57df\u56fe\u50cf\u6c34\u5370:\u5d4c\u5165\u5bf9\u7b56\u548c\u7b97\u6cd5. \u7535\u5b50\u5b66\u62a5 28(004), 57\u201360 (2000). Huang, J.W., Shi, Y.Q.: Image watermarking in DCT: anembedding strategy and algorithm. Chin. J. Electronica 28(004), 57\u201360 (2000)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Lin, T.J., Chuang, K.L., Chang, P.C., et al.: An improved DCT-based perturbation scheme for high capacity data hiding in H.264\/AVC intra frames. J. Syst. Softw. 86(3), 604\u2013614 (2013)","DOI":"10.1016\/j.jss.2012.10.922"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Kang, J., Kim, H., Kang, S.: Genuine reversible data hiding technique for H.264 bitstream using multi-dimensional histogram shifting technology on QDCT coefficients. Appl. Sci. 10(18) (2020)","DOI":"10.3390\/app10186410"},{"key":"1_CR8","unstructured":"Qi, W., Li, X., Zhang, T., et al.: Optimal reversible data hiding scheme based on multiple histograms modification. IEEE Trans. Circuits Syst. Video Technol. PP(99), 1 (2019)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"\u5510\u6d2a\u743c,\u94ae\u53ef,\u5f20\u82f1\u7537,\u6768\u6653\u5143.\u81ea\u9002\u5e94\u4e8c\u7ef4\u76f4\u65b9\u56fe\u5e73\u79fb\u7684\u89c6\u9891\u53ef\u9006\u9690\u5199\u7b97\u6cd5. \u4fe1\u606f\u7f51\u7edc\u5b89\u5168 (09), 106\u2013110 (2019). Tang, H.Q., Niu, K., Zhang, Y.N.: Reversible data hiding in videos based on adaptive two-dimensional histogram modification. Netinfo Secur. (09), 106\u2013110 (2019)","DOI":"10.12677\/CSA.2019.91013"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Rathi, S., Talmale, G.: Review on discrete cosine transform based watermarking for compressed digital video. In: IEEE 2015 International Conference on Industrial Instrumentation and Control (ICIC), Pune, India, 28\u201330 May 2015, pp. 327\u2013331. IEEE, New York (2015)","DOI":"10.1109\/IIC.2015.7150762"},{"key":"1_CR11","unstructured":"\u5468\u9708,\u674e\u829d\u68e0,\u94b1\u7acb\u4e91.\u57fa\u4e8e\u4f59\u6570\u5206\u7c7b\u7684\u89c6\u9891\u9690\u5199\u7b97\u6cd5. \u534e\u4e2d\u79d1\u6280\u5927\u5b66\u5b66\u62a5(\u81ea\u7136\u79d1\u5b66\u7248) 44(z1) (2016). Zhou, P., Li, Z.T., Qian, L.Y.: Steganographic algorithm based on remainder classification. J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.) 44(z1) (2016)"},{"key":"1_CR12","unstructured":"\u5357\u79c0.\u57fa\u4e8e\u00b11DCT\u7cfb\u6570\u7684H.264\u89c6\u9891\u9690\u5199\u7b97\u6cd5\u7814\u7a76. \u6b66\u6c49:\u534e\u4e2d\u79d1\u6280\u5927\u5b66 (2015). Nan, X.: The Research on Steganography Algorithm Based on \u00b11DCT Coeffcients for H.264 Video. Huazhong University of Science and Technology, Wuhan (2015)"},{"key":"1_CR13","unstructured":"Yi, Z., Yang, C., Luo, X., et al.: Steganalysis of content-adaptive JPEG steganography based on the weight allocation of filtered coefficients. In: IEEE International Conference on Communication Software & Networks. IEEE (2017)"}],"container-title":["Communications in Computer and Information Science","Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-7443-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T17:54:59Z","timestamp":1636480499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-7443-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811674426","9789811674433"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-7443-3_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCTCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Conference of Theoretical Computer Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yinchuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nctcs2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.ccf.org.cn\/TCS2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CCF Consys","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}