{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:05:46Z","timestamp":1771704346261,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T00:00:00Z","timestamp":1658707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Open Fund of Engineering Research Center for ICH Digitalization and Multi-source Information Fusion of Fujian Province","award":["No. FJ-ICH201901"],"award-info":[{"award-number":["No. FJ-ICH201901"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s00371-022-02613-z","type":"journal-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T13:03:21Z","timestamp":1658754201000},"page":"4623-4638","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Toward high-capacity crypto-domain reversible data hiding with huffman-based lossless image coding"],"prefix":"10.1007","volume":"39","author":[{"given":"Guo-Dong","family":"Su","sequence":"first","affiliation":[]},{"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,25]]},"reference":[{"issue":"8","key":"2613_CR1","doi-asserted-by":"publisher","first-page":"1500","DOI":"10.1109\/TMM.2008.2007341","volume":"10","author":"Y Hu","year":"2008","unstructured":"Hu, Y., Lee, H.-K., Chen, K., Li, J.: Difference expansion based reversible data hiding using two embedding directions. IEEE Trans. Multimed. 10(8), 1500\u20131512 (2008)","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"2613_CR2","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"HJ Kim","year":"2008","unstructured":"Kim, H.J., Sachnev, V., Shi, Y.-Q., Nam, J., Choo, H.G.: A novel difference expansion transform for reversible data embedding. IEEE Trans. Inf. Forensics Secur. 3(3), 456\u2013465 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"2613_CR3","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"2613_CR4","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","volume":"20","author":"X Li","year":"2011","unstructured":"Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20(12), 3524\u20133533 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"2613_CR5","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Zhao, Y., Ni, R., Shi, Y.-Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Process."},{"key":"2613_CR6","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.sigpro.2013.12.005","volume":"98","author":"X Gui","year":"2014","unstructured":"Gui, X., Li, X., Yang, B.: A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process. 98, 370\u2013380 (2014)","journal-title":"Signal Process."},{"issue":"3","key":"2613_CR7","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1016\/j.jss.2012.11.024","volume":"86","author":"L-C Huang","year":"2013","unstructured":"Huang, L.-C., Tseng, L.-Y., Hwang, M.-S.: A reversible data hiding method by histogram shifting in high quality medical images. J. Syst. Softw. 86(3), 716\u2013727 (2013)","journal-title":"J. Syst. Softw."},{"issue":"6","key":"2613_CR8","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li, X., Li, B., Yang, B., Zeng, T.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181\u20132191 (2013)","journal-title":"IEEE Trans. Image Process."},{"key":"2613_CR9","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.sigpro.2019.05.020","volume":"163","author":"Y Jia","year":"2019","unstructured":"Jia, Y., Yin, Z., Zhang, X., Luo, Y.: Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process 163, 238\u2013246 (2019)","journal-title":"Signal Process"},{"key":"2613_CR10","doi-asserted-by":"publisher","first-page":"198425","DOI":"10.1109\/ACCESS.2020.3034936","volume":"8","author":"C-C Chang","year":"2020","unstructured":"Chang, C.-C.: Adversarial learning for invertible steganography. IEEE Access 8, 198425\u2013198435 (2020)","journal-title":"IEEE Access"},{"key":"2613_CR11","doi-asserted-by":"publisher","first-page":"54117","DOI":"10.1109\/ACCESS.2019.2908924","volume":"7","author":"C-C Chang","year":"2019","unstructured":"Chang, C.-C., Li, C.-T., Chen, K.: Privacy-preserving reversible information hiding based on arithmetic of quadratic residues. IEEE Access 7, 54117\u201354132 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"2613_CR12","doi-asserted-by":"publisher","first-page":"3367","DOI":"10.3934\/mbe.2019168","volume":"16","author":"C-C Chang","year":"2019","unstructured":"Chang, C.-C., Li, C.-T.: Algebraic secret sharing using privacy homomorphisms for iot-based healthcare systems. Math. Biosci. Eng. 16(5), 3367\u20133381 (2019)","journal-title":"Math. Biosci. Eng."},{"key":"2613_CR13","doi-asserted-by":"publisher","first-page":"70720","DOI":"10.1109\/ACCESS.2018.2880904","volume":"6","author":"C-C Chang","year":"2018","unstructured":"Chang, C.-C., Li, C.-T., Shi, Y.-Q.: Privacy-aware reversible watermarking in cloud computing environments. IEEE Access 6, 70720\u201370733 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"2613_CR14","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang, X.: Reversible data hiding in encrypted image. IEEE Signal Process. Lett. 18(4), 255\u2013258 (2011)","journal-title":"IEEE Signal Process. Lett."},{"issue":"4","key":"2613_CR15","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T.S., Wu, H.Y.: An improved reversible data hiding in encrypted images using side match. IEEE Signal Process. Lett. 19(4), 199\u2013202 (2012)","journal-title":"IEEE Signal Process. Lett."},{"issue":"2","key":"2613_CR16","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2613_CR17","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2019.03.008","volume":"487","author":"C Qin","year":"2019","unstructured":"Qin, C., Qian, X., Hong, W., Zhang, X.: An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf. Sci. 487, 176\u2013192 (2019)","journal-title":"Inf. Sci."},{"issue":"1","key":"2613_CR18","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TMM.2018.2844679","volume":"21","author":"S Yi","year":"2019","unstructured":"Yi, S., Zhou, Y.: Separable and reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimedia 21(1), 51\u201364 (2019)","journal-title":"IEEE Trans. Multimedia"},{"key":"2613_CR19","doi-asserted-by":"publisher","first-page":"28902","DOI":"10.1109\/ACCESS.2020.2972622","volume":"8","author":"P Wang","year":"2020","unstructured":"Wang, P., Cai, B., Xu, S., Chen, B.: Reversible data hiding scheme based on adjusting pixel modulation and block-wise compression for encrypted images. IEEE Access 8, 28902\u201328914 (2020)","journal-title":"IEEE Access"},{"key":"2613_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2999187","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Cai, Z., He, W.: High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Trans. Multimedia. (2020). https:\/\/doi.org\/10.1109\/TMM.2020.2999187","journal-title":"IEEE Trans. Multimedia."},{"issue":"8","key":"2613_CR21","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","volume":"22","author":"Y Wu","year":"2020","unstructured":"Wu, Y., Xiang, Y., Guo, Y., Tang, J., Yin, Z.: An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans. Multimedia 22(8), 1929\u20131938 (2020)","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"2613_CR22","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2014","unstructured":"Ma, K., Zhang, W., Zhao, X., Yu, N.: Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8(3), 553\u2013562 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2613_CR23","doi-asserted-by":"publisher","first-page":"115632","DOI":"10.1016\/j.image.2019.115632","volume":"80","author":"D Huang","year":"2020","unstructured":"Huang, D., Wang, J.: High-capacity reversible ata hiding in encrypted image based on specific encryption process. Signal Process. Image Commun 80, 115632 (2020)","journal-title":"Signal Process. Image Commun"},{"issue":"7","key":"2613_CR24","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux, P., Puech, W.: An efficient msb prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans. Inf. Forensics Secur. 13(7), 1670\u20131681 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2613_CR25","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TMM.2020.2985537","volume":"23","author":"P Puteaux","year":"2020","unstructured":"Puteaux, P., Puech, W.: A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Trans. Multimedia 23, 636\u2013650 (2020)","journal-title":"IEEE Trans. Multimedia"},{"key":"2613_CR26","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.image.2019.01.003","volume":"74","author":"P-F Shiu","year":"2019","unstructured":"Shiu, P.-F., Tai, W.-L., Jan, J.-K., Chang, C.-C., Lin, C.-C.: An interpolative ambtc-based high-payload rdh scheme for encrypted images. Signal Process. Image Commun. 74, 64\u201377 (2019)","journal-title":"Signal Process. Image Commun."},{"issue":"4","key":"2613_CR27","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"Z Yin","year":"2020","unstructured":"Yin, Z., Xiang, Y., Zhang, X.: Reversible data hiding in encrypted images based on multi-msb prediction and huffman coding. IEEE Trans. Multimedia 22(4), 874\u2013884 (2020)","journal-title":"IEEE Trans. Multimedia"},{"issue":"8","key":"2613_CR28","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TCSVT.2020.2990952","volume":"30","author":"A Mohammadi","year":"2020","unstructured":"Mohammadi, A., Nakhkash, M., Akhaee, M.A.: A high-capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Trans. Circuits Syst. Video Technol. 30(8), 2366\u20132376 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2613_CR29","doi-asserted-by":"publisher","first-page":"2445","DOI":"10.1109\/TIFS.2021.3055630","volume":"16","author":"Y Wu","year":"2021","unstructured":"Wu, Y., Ma, W., Peng, Y., Zhang, R., Yin, Z.: Reversible data hiding in encrypted images based on bit plane compression of prediction error. IEEE Transa. Inform. Forensics Secur. 16, 2445\u20132446 (2021)","journal-title":"IEEE Transa. Inform. Forensics Secur."},{"key":"2613_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3019490","author":"Z Yin","year":"2020","unstructured":"Yin, Z., Peng, Y., Xiang, Y.: Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans. Dependable Secure Comput. (2020). https:\/\/doi.org\/10.1109\/TDSC.2020.3019490","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"33\u201334","key":"2613_CR31","doi-asserted-by":"publisher","first-page":"24795","DOI":"10.1007\/s11042-020-09132-w","volume":"79","author":"C-C Chang","year":"2020","unstructured":"Chang, C.-C., Lin, C.-C., Su, G.-D.: An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC. Multimedia Tools Appl 79(33\u201334), 24795\u201324824 (2020)","journal-title":"Multimedia Tools Appl"},{"key":"2613_CR32","unstructured":"\"Digital Compression and Coding of Continuous-Tone Still Images,\" International Standard DIS 10918, 1992"},{"issue":"5","key":"2613_CR33","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted jpeg bitstream. IEEE Trans. Multimedia 16(5), 1486\u20131491 (2014)","journal-title":"IEEE Trans. Multimedia"},{"issue":"6","key":"2613_CR34","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TDSC.2016.2634161","volume":"15","author":"Z Qian","year":"2018","unstructured":"Qian, Z., Zhou, H., Zhang, X., Zhang, W.: Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans. Dependable Secure Comput. 15(6), 1055\u20131067 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2613_CR35","unstructured":"\"BossBase Dataset,\" (2020). [Online]. Available: http:\/\/agents.fel.cvut.cz\/stegodata\/. Accessed: Jan. 1, 2020"},{"key":"2613_CR36","unstructured":"\"BOWS-2 Dataset,\" (2020) [Online]. Available: http:\/\/bows2.ec-lille.fr\/ Accessed: Jul. 1, 2020"},{"key":"2613_CR37","first-page":"472","volume":"5307","author":"MS Gerald Schaefer","year":"2004","unstructured":"Gerald Schaefer, M.S.: UCID: an uncompressed colour image database. Storage Retr. Methods Appl. Multimedia. 5307, 472\u2013480 (2004)","journal-title":"Storage Retr. Methods Appl. Multimedia."},{"key":"2613_CR38","first-page":"1","volume":"2021","author":"C-C Chang","year":"2021","unstructured":"Chang, C.-C.: Cryptospace invertible steganography with conditional generative adversarial networks. Secur. Commun. Netw 2021, 1\u201314 (2021)","journal-title":"Secur. Commun. Netw"},{"issue":"17","key":"2613_CR39","doi-asserted-by":"publisher","first-page":"4633","DOI":"10.1049\/iet-ipr.2019.1694","volume":"14","author":"G-D Su","year":"2021","unstructured":"Su, G.-D., Chang, C.-C., Lin, C.-C., Yao, Z.: Secure High Capacity Tetris-Based Scheme for Data Hiding. IET Image Proc. 14(17), 4633\u20134635 (2021)","journal-title":"IET Image Proc."},{"key":"2613_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.3011838","author":"Z-L Liu","year":"2020","unstructured":"Liu, Z.-L., Pun, C.-M.: Reversible data hiding in encrypted images using chunk encryption and redundancy matrix representation. IEEE Trans. Dependable Secure Comput. (2020). https:\/\/doi.org\/10.1109\/tdsc.2020.3011838","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"2613_CR41","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.ins.2017.12.044","volume":"433\u2013434","author":"Z-L Liu","year":"2018","unstructured":"Liu, Z.-L., Pun, C.-M.: Reversible data-hiding in encrypted images by redundant space transfer. Inf. Sci. 433\u2013434, 188\u2013203 (2018)","journal-title":"Inf. Sci."},{"key":"2613_CR42","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.jvcir.2018.12.023","volume":"58","author":"K Chen","year":"2019","unstructured":"Chen, K., Chang, C.-C.: High-Capacity Reversible Data Hiding in Encrypted Images Based on Extended Run-Length Coding and Block-Based MSB Plane Rearrangement. J. Vis. Commun. Image Represent. 58, 334\u2013344 (2019)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"12","key":"2613_CR43","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1016\/S0167-8655(00)00065-9","volume":"21","author":"H-J Grosse","year":"2000","unstructured":"Grosse, H.-J., Varley, M.-R., Terrell, T.-J., Y.-K., Chan,: Improved coding of transform coefficients in jpeg-like image compression schemes. Pattern Recognit. Lett. 21(12), 1061\u20131069 (2000)","journal-title":"Pattern Recognit. Lett."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02613-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-022-02613-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-022-02613-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T09:08:45Z","timestamp":1695978525000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-022-02613-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["2613"],"URL":"https:\/\/doi.org\/10.1007\/s00371-022-02613-z","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,25]]},"assertion":[{"value":"30 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}