{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:17:58Z","timestamp":1740107878547,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61370063","U1636213"],"award-info":[{"award-number":["61370063","U1636213"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61379048","61672508"],"award-info":[{"award-number":["61379048","61672508"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s00500-017-2651-2","type":"journal-article","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T10:46:55Z","timestamp":1496314015000},"page":"4445-4455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An optimized data hiding scheme for Deflate codes"],"prefix":"10.1007","volume":"22","author":[{"given":"Yuan","family":"Xue","sequence":"first","affiliation":[]},{"given":"Yu-an","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Liang","sequence":"additional","affiliation":[]},{"given":"ChangYou","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,1]]},"reference":[{"issue":"(3.4)","key":"2651_CR1","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35((3.4)):313\u2013336","journal-title":"IBM Syst J"},{"issue":"10","key":"2651_CR2","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1109\/TCSVT.2006.882380","volume":"16","author":"C-C Chang","year":"2006","unstructured":"Chang C-C, Tai W-L, Lin C-C (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10):1301\u20131308","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2651_CR3","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.dsp.2015.11.007","volume":"51","author":"C-C Chang","year":"2016","unstructured":"Chang C-C, Nguyen T-S, Lin M-C, Lin C-C (2016) A novel data-hiding and compression scheme based on block classification of SMVQ indices. Digit Signal Proc 51:142\u2013155","journal-title":"Digit Signal Proc"},{"doi-asserted-by":"crossref","unstructured":"Chen C-C, Chang C-C (2010) High-capacity reversible data-hiding for lzw codes. In: Computer modeling and simulation, 2010. ICCMS\u201910. Second international conference on, vol\u00a01. IEEE, pp 3\u20138","key":"2651_CR4","DOI":"10.1109\/ICCMS.2010.346"},{"issue":"12","key":"2651_CR5","doi-asserted-by":"crossref","first-page":"4808","DOI":"10.1109\/TIP.2012.2210236","volume":"21","author":"J-M Guo","year":"2012","unstructured":"Guo J-M, Liu Y-F (2012) High capacity data hiding for error-diffused block truncation coding. IEEE Trans Image Process 21(12):4808\u20134818","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"2651_CR6","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1016\/j.dsp.2012.04.004","volume":"22","author":"J-M Guo","year":"2012","unstructured":"Guo J-M, Tsai J-J (2012) Reversible data hiding in low complexity and high quality compression scheme. Digit Signal Proc 22(5):776\u2013785","journal-title":"Digit Signal Proc"},{"issue":"4","key":"2651_CR7","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1049\/cje.2015.10.005","volume":"24","author":"LI Jian","year":"2015","unstructured":"Jian LI, Pan Z, Zheng J, Sun F, Xinxin YE, Yuan K (2015) The security analysis of quantum sagr04 protocol in collective-rotation noise channel. Chin J Electron 24(4):689\u2013693","journal-title":"Chin J Electron"},{"issue":"7","key":"2651_CR8","first-page":"19","volume":"9","author":"A Kumar","year":"2010","unstructured":"Kumar A, Pooja K (2010) Steganography-a data hiding technique. Int J Comput Appl 9(7):19\u201323","journal-title":"Int J Comput Appl"},{"key":"2651_CR9","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.ins.2012.01.002","volume":"191","author":"Y-P Lee","year":"2012","unstructured":"Lee Y-P, Lee J-C, Chen W-K, Chang K-C, Jiunn S, Chang C-P (2012) High-payload image hiding with quality recovery using tri-way pixel-value differencing. Inf Sci 191:214\u2013225","journal-title":"Inf Sci"},{"issue":"1","key":"2651_CR10","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/TIFS.2006.890310","volume":"2","author":"T-Y Liu","year":"2007","unstructured":"Liu T-Y, Tsai W-H (2007) A new steganographic method for data hiding in microsoft word documents by a change tracking technique. IEEE Trans Inf Forensics Secur 2(1):24\u201330","journal-title":"IEEE Trans Inf Forensics Secur"},{"doi-asserted-by":"crossref","unstructured":"Lonardi S, Szpankowski W (2003) Joint source-channel lz\u201977 coding. In: Data compression conference, 2003. Proceedings. DCC 2003. IEEE, pp 273\u2013282","key":"2651_CR11","DOI":"10.1109\/DCC.2003.1194018"},{"issue":"5","key":"2651_CR12","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1109\/TIT.2007.894689","volume":"53","author":"S Lonardi","year":"2007","unstructured":"Lonardi S, Szpankowski W, Ward MD (2007) Error resilient lz\u201977 data compression: algorithms, analysis, and experiments. IEEE Trans Inf Theory 53(5):1799\u20131813","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"2651_CR13","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.dsp.2011.09.003","volume":"22","author":"SN Mali","year":"2012","unstructured":"Mali SN, Patil PM, Jalnekar RM (2012) Robust and secured image-adaptive data hiding. Digit Signal Proc 22(2):314\u2013323","journal-title":"Digit Signal Proc"},{"doi-asserted-by":"crossref","unstructured":"Moon SK, Kawitkar RS (2007) Data security using data hiding. In: Conference on computational intelligence and multimedia applications, 2007. International conference on, vol 4. IEEE, pp 247\u2013251","key":"2651_CR14","DOI":"10.1109\/ICCIMA.2007.163"},{"issue":"12","key":"2651_CR15","doi-asserted-by":"crossref","first-page":"2083","DOI":"10.1109\/JPROC.2005.859599","volume":"93","author":"P Moulin","year":"2005","unstructured":"Moulin P, Koetter R (2005) Data-hiding codes. Proc IEEE 93(12):2083\u20132126","journal-title":"Proc IEEE"},{"issue":"3","key":"2651_CR16","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/s10489-006-0035-x","volume":"27","author":"HL Najafi","year":"2007","unstructured":"Najafi HL (2007) A neural network approach to audio data hiding based on perceptual masking model of the human auditory system. Appl Intell 27(3):269\u2013275","journal-title":"Appl Intell"},{"issue":"7","key":"2651_CR17","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1049\/iet-ipr.2014.0689","volume":"9","author":"A Nikolaidis","year":"2015","unstructured":"Nikolaidis A (2015) Reversible data hiding in jpeg images utilising zero quantised coefficients. IET Image Proc 9(7):560\u2013568","journal-title":"IET Image Proc"},{"issue":"8","key":"2651_CR18","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1080\/00207217.2014.954635","volume":"102","author":"SA Parah","year":"2015","unstructured":"Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2015) A secure and robust information hiding technique for covert communication. Int J Electron 102(8):1253\u20131266","journal-title":"Int J Electron"},{"unstructured":"Ruijin ZHU, Tan Y, Zhang Q, Fei WU, Zheng J, Yuan XUE (2016) Determining image base of firmware files for arm devices. IEICE Trans Inf Syst E99.D(2):351\u2013359","key":"2651_CR19"},{"doi-asserted-by":"crossref","unstructured":"Shim Hiuk Jae, Ahn Jinhaeng, Jeon Byeungwoo (2004) Dh-lzw: lossless data hiding in lzw compression. In: Image processing, 2004. ICIP\u201904. 2004 International conference on, vol\u00a04. IEEE, pp 2195\u20132198","key":"2651_CR20","DOI":"10.1109\/ICIP.2004.1421532"},{"issue":"1","key":"2651_CR21","doi-asserted-by":"crossref","first-page":"127","DOI":"10.15388\/Informatica.2004.050","volume":"15","author":"H-W Tseng","year":"2004","unstructured":"Tseng H-W, Chang C-C (2004) High capacity data hiding in JPEG-compressed images. Informatica 15(1):127\u2013142","journal-title":"Informatica"},{"issue":"2","key":"2651_CR22","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"M Utku Celik","year":"2005","unstructured":"Utku Celik M, Sharma G, Murat Tekalp A, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"2651_CR23","doi-asserted-by":"crossref","first-page":"2771","DOI":"10.1016\/j.jss.2013.06.024","volume":"86","author":"Z-H Wang","year":"2013","unstructured":"Wang Z-H, Yang H-R, Cheng T-F, Chang C-C (2013) A high-performance reversible data-hiding scheme for lzw codes. J Syst Softw 86(11):2771\u20132778","journal-title":"J Syst Softw"},{"issue":"17","key":"2651_CR24","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MC.1984.1659158","volume":"17","author":"TA Welch","year":"1984","unstructured":"Welch TA (1984) A technique for high-performance data compression. Computer 17(17):8\u201319","journal-title":"Computer"},{"unstructured":"Wu Y, Lonardi S, Szpankowski W (2006) Error-resilient lzw data compression. In: Data compression conference (DCC\u201906). IEEE, pp 193\u2013202","key":"2651_CR25"},{"unstructured":"Xuan G, Shi YQ, Ni ZC, Chen J, Yang C, Zhen Y, Zheng J (2004) High capacity lossless data hiding based on integer wavelet transform. In: Circuits and systems, 2004. ISCAS\u201904. Proceedings of the 2004 international symposium on, vol\u00a02. IEEE, pp II\u201329","key":"2651_CR26"},{"doi-asserted-by":"crossref","unstructured":"Xuan G, Shi YQ, Yang C, Zheng Y, Zou D, Chai P (2005) Lossless data hiding using integer wavelet transform and threshold embedding technique. In: 2005 IEEE international conference on multimedia and expo. IEEE, pp 1520\u20131523","key":"2651_CR27","DOI":"10.1109\/ICME.2005.1521722"},{"unstructured":"Yadav D, Singhal V, Bandil DK (2012) Reversible data hiding techniques. Int J Electron Comput Sci Eng 1(2):380\u2013383","key":"2651_CR28"},{"issue":"5","key":"2651_CR29","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1049\/cje.2016.06.021","volume":"25","author":"F Yan","year":"2016","unstructured":"Yan F, Tan Y, Zhang Q, Fei W, Cheng Z, Zheng J (2016) An effective raid data layout for object-based de-duplication backup system. Chin J Electron 25(5):832\u2013840","journal-title":"Chin J Electron"},{"doi-asserted-by":"publisher","unstructured":"Zhang X, Tan Y, Xue Y, Zhang Q, Li Y, Zhang C, Zheng J (2017) Cryptographic key protection against frost for mobile devices. Clust Comput 1\u201310. doi: 10.1007\/s10586-016-0721-3","key":"2651_CR30","DOI":"10.1007\/s10586-016-0721-3"},{"issue":"7","key":"2651_CR31","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"W Zhang","year":"2013","unstructured":"Zhang W, Xiaocheng H, Li X, Nenghai Y (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22(7):2775\u20132785","journal-title":"IEEE Trans Image Process"},{"key":"2651_CR32","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.diin.2016.01.002","volume":"16","author":"R Zhu","year":"2016","unstructured":"Zhu R, Tan Y, Zhang Q, Li Y, Zheng J (2016) Determining image base of firmware for arm devices by matching literal pools. Digit Investig 16:19\u201328","journal-title":"Digit Investig"},{"issue":"3","key":"2651_CR33","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.ijcip.2016.12.002","volume":"16","author":"R Zhu","year":"2017","unstructured":"Zhu R, Zhang B, Mao J, Zhang Q, Tan YA (2017) A methodology for determining the image base of arm-based industrial control system firmware. Int J Crit Infrastruct Prot 16(3):26\u201335","journal-title":"Int J Crit Infrastruct Prot"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2651-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2651-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2651-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T05:14:42Z","timestamp":1602220482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2651-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,1]]},"references-count":33,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["2651"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2651-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,6,1]]}}}