{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:17:07Z","timestamp":1740107827900,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T00:00:00Z","timestamp":1704758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T00:00:00Z","timestamp":1704758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s00500-023-09494-x","type":"journal-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T17:03:03Z","timestamp":1704819783000},"page":"6823-6837","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dual reversible datahiding using deep neural rhombus histogram in clinical images"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5551-299X","authenticated-orcid":false,"given":"Minu Lalitha","family":"Madhavu","sequence":"first","affiliation":[]},{"given":"K. S. Anil","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,9]]},"reference":[{"key":"9494_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10892-2","author":"R Bhardwaj","year":"2021","unstructured":"Bhardwaj R, Singh A (2021) An efficient reversible and secure patient data hiding algorithm for E-healthcare. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-021-10892-2","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9494_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app13042458","volume":"13","author":"Q Feng","year":"2023","unstructured":"Feng Q, Leng L, Chang C-C, Horng J-H, Wu M (2023) Reversible data hiding in encrypted images with extended parametric binary tree labeling. Appl Sci 13(4):1\u201315. https:\/\/doi.org\/10.3390\/app13042458","journal-title":"Appl Sci"},{"key":"9494_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2020.07.026","author":"H Gao","year":"2020","unstructured":"Gao H, Gao T, You Z, Cheng R (2020) High capacity reversible data hiding in encrypted image based on image encoding and POB. J Frankl Inst. https:\/\/doi.org\/10.1016\/j.jfranklin.2020.07.026","journal-title":"J Frankl Inst"},{"issue":"5","key":"9494_CR4","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1016\/j.jksuci.2020.07.008","volume":"34","author":"FS Hassan","year":"2022","unstructured":"Hassan FS, Gutu A (2022) Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme. J King Saud Univ Comput Inf Sci 34(5):2017\u20132030. https:\/\/doi.org\/10.1016\/j.jksuci.2020.07.008","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"9494_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3537-7","author":"C-F Lee","year":"2018","unstructured":"Lee C-F, Weng C-Y, Kao C-Y (2018) Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-018-3537-7","journal-title":"Soft Comput"},{"key":"9494_CR6","doi-asserted-by":"publisher","first-page":"73573","DOI":"10.1109\/ACCESS.2019.2920178","volume":"7","author":"Y Li","year":"2019","unstructured":"Li Y, Yao S, Yang K, Tan Y-A, Zhang Q (2019) A high-imperceptibility and histogram-shifting data hiding scheme for JPEG images. IEEE Access 7:73573\u201373582. https:\/\/doi.org\/10.1109\/ACCESS.2019.2920178","journal-title":"IEEE Access"},{"key":"9494_CR7","doi-asserted-by":"publisher","first-page":"214732","DOI":"10.1109\/ACCESS.2020.3040048","volume":"8","author":"S Li","year":"2020","unstructured":"Li S, Hu L, Sun C, Chi L, Li T, Li H (2020a) A reversible data hiding algorithm based on prediction error with large amounts of datahiding in spatial domain. IEEE Access 8:214732\u2013214741. https:\/\/doi.org\/10.1109\/ACCESS.2020.3040048","journal-title":"IEEE Access"},{"key":"9494_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10892-2","author":"T Li","year":"2020","unstructured":"Li T, Li H, Hu L, Li H (2020b) A reversible steganography method with statistical features maintained based on the difference value. IEEE Access. https:\/\/doi.org\/10.1007\/s11042-021-10892-2","journal-title":"IEEE Access"},{"key":"9494_CR9","doi-asserted-by":"publisher","first-page":"32226","DOI":"10.1109\/ACCESS.2020.2973179","volume":"8","author":"Y Li","year":"2020","unstructured":"Li Y, Chang C-C, He M (2020c) High capacity reversible data hiding for VQ-compressed images based on difference transformation and mapping technique. IEEE Access 8:32226\u201332245. https:\/\/doi.org\/10.1109\/ACCESS.2020.2973179","journal-title":"IEEE Access"},{"key":"9494_CR10","doi-asserted-by":"publisher","first-page":"18470","DOI":"10.1109\/ACCESS.2022.3144322","volume":"10","author":"C-C Lin","year":"2022","unstructured":"Lin C-C, Chang C-C, Kao W-J, Chang J-F (2022) Efficient electronic patient information hiding scheme with tamper detection function for medical images. IEEE Access 10:18470\u201318485. https:\/\/doi.org\/10.1109\/ACCESS.2022.3144322","journal-title":"IEEE Access"},{"key":"9494_CR11","doi-asserted-by":"publisher","first-page":"153546","DOI":"10.1109\/ACCESS.2020.3018326","volume":"8","author":"R Malik","year":"2020","unstructured":"Malik R, Khamparia A, Garg S, Gupta D, Choi BJ, Hossain MS (2020) Reversible data hiding and smart multimedia computing using big data in remote sensing systems. IEEE Access 8:153546\u2013153560. https:\/\/doi.org\/10.1109\/ACCESS.2020.3018326","journal-title":"IEEE Access"},{"key":"9494_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jvcir.2022.103478","volume":"85","author":"A Mohammadi","year":"2022","unstructured":"Mohammadi A (2022) A general framework for reversible data hiding in encrypted images by reserving room before encryption. J vis Commun Image Represent 85:1\u20139. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103478","journal-title":"J vis Commun Image Represent"},{"key":"9494_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.05.007","author":"D Nu\u00f1ez-Ramirez","year":"2021","unstructured":"Nu\u00f1ez-Ramirez D, Mata-Mendoza D, Cedillo-Hernandez M (2021) Improving preprocessing in reversible data hiding based on contrast enhancement. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2021.05.007","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"10","key":"9494_CR14","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1080\/1206212X.2019.1641273","volume":"43","author":"SK Patel","year":"2019","unstructured":"Patel SK, Saravanan C, Patel VK (2019) Cloud-based reversible dynamic secure steganography model for embedding pathological report in medical images. Int J Comput Appl 43(10):1002\u20131010. https:\/\/doi.org\/10.1080\/1206212X.2019.1641273","journal-title":"Int J Comput Appl"},{"key":"9494_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.07.004","author":"AK Sahu","year":"2019","unstructured":"Sahu AK, Swain G (2019) High fidelity based reversible data hiding using modified LSB matchingand pixel difference. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2019.07.004","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"9494_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1765-3","author":"T Senthilnathan","year":"2018","unstructured":"Senthilnathan T, Prabu P, Sivakumar R, Sakthivel S (2018) An enhancing reversible data hiding for secured data using shuffleblock key encryption and histogram bit shifting in cloud environment. Clust Comput. https:\/\/doi.org\/10.1007\/s10586-018-1765-3","journal-title":"Clust Comput"},{"key":"9494_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00309-w","author":"OP Singh","year":"2021","unstructured":"Singh OP, Singh AK (2021) Data hiding in encryption\u2013compression domain. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-021-00309-w","journal-title":"Complex Intell Syst"},{"key":"9494_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.09.014","author":"PK Singh","year":"2020","unstructured":"Singh PK, Jana B, Datta K (2020) Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2020.09.014","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"9494_CR19","doi-asserted-by":"publisher","first-page":"26984","DOI":"10.1109\/ACCESS.2020.2966234","volume":"8","author":"G-D Su","year":"2019","unstructured":"Su G-D, Chang C-C, Lin C-C (2019) A high capacity reversible data hiding in encrypted AMBTC-compressed images. IEEE Access 8:26984\u201327000. https:\/\/doi.org\/10.1109\/ACCESS.2020.2966234","journal-title":"IEEE Access"},{"key":"9494_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5709513","volume":"2021","author":"G-D Su","year":"2021","unstructured":"Su G-D, Lin C-C, Chang C-C (2021) Privacy-preserving reversible data hiding for medical images employing local rotation. J Healthc Eng Hindawi 2021:1\u201316. https:\/\/doi.org\/10.1155\/2021\/5709513","journal-title":"J Healthc Eng Hindawi"},{"issue":"2","key":"9494_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e25020209","volume":"25","author":"C-Y Weng","year":"2023","unstructured":"Weng C-Y, Yang C-H (2023) Reversible data hiding in encrypted image using multiple data-hiders sharing algorithm. Entropy 25(2):1\u201316. https:\/\/doi.org\/10.3390\/e25020209","journal-title":"Entropy"},{"key":"9494_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-019-1410-x","author":"L Xinyan","year":"2019","unstructured":"Xinyan L, Huajian M, Bing Y, Li Go (2019) A reversible data hiding with quality controllable scheme for encrypted-compressed image. Wuhan Univ J Nat Sci. https:\/\/doi.org\/10.1007\/s11859-019-1410-x","journal-title":"Wuhan Univ J Nat Sci"},{"key":"9494_CR23","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/LSP.2020.2965826","volume":"27","author":"Y Yang","year":"2015","unstructured":"Yang Y, Xiao X, Cai X, Zhang W (2015) A secure and privacy-preserving technique based on contrast-enhancement reversible data hiding and plaintext encryption for medical images. IEEE Signal Process Lett 27:256\u2013260. https:\/\/doi.org\/10.1109\/LSP.2020.2965826","journal-title":"IEEE Signal Process Lett"},{"key":"9494_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2021.3062947","author":"C Yu","year":"2022","unstructured":"Yu C, Zhang X, Zhang X, Li G, Tang Z (2022) Reversible data hiding with hierarchical embedding for encrypted images. IEEE Trans Circuits Syst Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2021.3062947","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"9494_CR25","doi-asserted-by":"publisher","first-page":"81412","DOI":"10.1109\/ACCESS.2020.2990903","volume":"8","author":"N Zhou","year":"2020","unstructured":"Zhou N, Zhang M, Wang H, Ke Y, Di F (2020) Separable reversible data hiding scheme in homomorphic encrypted domain based on NTRU. IEEE Access 8:81412\u201381424. https:\/\/doi.org\/10.1109\/ACCESS.2020.2990903","journal-title":"IEEE Access"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09494-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-09494-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09494-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T20:33:57Z","timestamp":1719606837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-09494-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,9]]},"references-count":25,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["9494"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-09494-x","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2024,1,9]]},"assertion":[{"value":"21 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}