{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:13Z","timestamp":1762005013681,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T00:00:00Z","timestamp":1524441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s00521-018-3489-y","type":"journal-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T11:54:00Z","timestamp":1524484440000},"page":"2017-2028","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2029-5067","authenticated-orcid":false,"given":"Mohammad Reza","family":"Khosravi","sequence":"first","affiliation":[]},{"given":"Mehran","family":"Yazdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,23]]},"reference":[{"key":"3489_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eij.2012.11.002","volume":"14","author":"M Abd-Eldayem","year":"2013","unstructured":"Abd-Eldayem M (2013) A proposed security technique based on watermarking and encryption for Digital Imaging and Communications in Medicine. Egypt Inform J 14:1\u201313","journal-title":"Egypt Inform J"},{"key":"3489_CR2","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"C-C Lin","year":"2008","unstructured":"Lin C-C, Tai W-L, Chang C-C (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41:3582\u20133591","journal-title":"Pattern Recogn"},{"issue":"1","key":"3489_CR3","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187\u2013193","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3489_CR4","doi-asserted-by":"crossref","unstructured":"Arabzadeh M, Helfroush MS, Danyali H, Rahimi MR (2011) DE-based reversible medical image authentication using hamming code. In: International e-conference on computer and knowledge engineering (ICCKE), pp 183\u2013188","DOI":"10.1109\/ICCKE.2011.6413348"},{"key":"3489_CR5","unstructured":"Arabzadeh M, Danyali H, Helfroush MS (2010) Reversible watermarking based on interpolation error histogram shifting. In: International symposium on telecommunications (IST\u20192010), pp 840\u2013845"},{"issue":"4","key":"3489_CR6","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"I Dragoi","year":"2014","unstructured":"Dragoi I, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23(4):1779\u20131790","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"3489_CR7","first-page":"244","volume":"14","author":"J Wen","year":"2012","unstructured":"Wen J, Lei J, Wan Y (2012) Reversible data hiding through adaptive prediction and prediction error histogram modification. Int J Fuzzy Syst 14(2):244\u2013256","journal-title":"Int J Fuzzy Syst"},{"issue":"4","key":"3489_CR8","first-page":"718","volume":"18","author":"S Zhang","year":"2016","unstructured":"Zhang S, Gao T, Yang L (2016) A reversible data hiding scheme based on histogram modification in integer DWT domain for BTC compressed images. Int J Netw Secur 18(4):718\u2013727","journal-title":"Int J Netw Secur"},{"issue":"8","key":"3489_CR9","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"3489_CR10","volume-title":"Digital image processing","author":"RC Gonzalez","year":"2008","unstructured":"Gonzalez RC, Woods RE (2008) Digital image processing, 3rd edn. Prentice Hall, NJ","edition":"3"},{"issue":"12","key":"3489_CR11","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1109\/TIP.2005.857260","volume":"14","author":"L Zhang","year":"2005","unstructured":"Zhang L, Wu X (2005) Color demosaicking via directional linear minimum mean square-error estimation. IEEE Trans Image Process 14(12):2167\u20132178","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"3489_CR12","doi-asserted-by":"publisher","first-page":"2226","DOI":"10.1109\/TIP.2006.877407","volume":"15","author":"L Zhang","year":"2006","unstructured":"Zhang L, Wu X (2006) An edge-guided image interpolation algorithm via directional filtering and data fusion. IEEE Trans Image Process 15(8):2226\u20132238","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"3489_CR13","doi-asserted-by":"publisher","first-page":"023016","DOI":"10.1117\/1.3600632","volume":"20","author":"L Zhang","year":"2011","unstructured":"Zhang L, Wu X, Buades A, Li X (2011) Color demosaicking by local directional interpolation and nonlocal adaptive thresholding. J Electron Imaging 20(2):023016","journal-title":"J Electron Imaging"},{"key":"3489_CR14","doi-asserted-by":"crossref","first-page":"117","DOI":"10.5201\/ipol.2011.g_zwld","volume":"1","author":"P Getreuer","year":"2011","unstructured":"Getreuer P (2011) Zhang-Wu directional LMMSE image demosaicking. Image Process Line (IPOL) 1:117\u2013126","journal-title":"Image Process Line (IPOL)"},{"issue":"2","key":"3489_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TCE.2016.7514715","volume":"62","author":"S Lee","year":"2016","unstructured":"Lee S, Kang M, Uhm K, Ko S (2016) An edge-guided image interpolation method using taylor series approximation. IEEE Trans Consum Electron 62(2):159\u2013165","journal-title":"IEEE Trans Consum Electron"},{"key":"3489_CR16","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.aeue.2014.10.022","volume":"69","author":"A Baghaie","year":"2015","unstructured":"Baghaie A, Yu Z (2015) Structure tensor based image interpolation method. Int J Electron Commun (AE\u00dc) 69:515\u2013522","journal-title":"Int J Electron Commun (AE\u00dc)"},{"key":"3489_CR17","unstructured":"Khosravi MR, Rostami H (2016) A new statistical technique for interpolation of landsat images. In: ICAUCAE 2016, SID Conference Publications, Tehran, Iran"},{"key":"3489_CR18","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1016\/j.image.2012.07.001","volume":"28","author":"S Colonnese","year":"2013","unstructured":"Colonnese S, Rinauro S, Scarano G (2013) Bayesian image interpolation using Markov random fields driven by visually relevant image features. Sig Process Image Commun 28:967\u2013983","journal-title":"Sig Process Image Commun"},{"key":"3489_CR19","doi-asserted-by":"publisher","first-page":"13025","DOI":"10.1007\/s11042-016-3707-5","volume":"76","author":"A Malik","year":"2016","unstructured":"Malik A, Sikka G, Verma H (2016) An image interpolation based reversible data hiding scheme using pixel value adjusting feature. Multimedia Tools Appl 76:13025\u201313046","journal-title":"Multimedia Tools Appl"},{"key":"3489_CR20","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1007\/s11227-013-1016-6","volume":"66","author":"Y-T Chang","year":"2013","unstructured":"Chang Y-T, Huang C-T, Lee C-F, Wang S-J (2013) Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J Supercomput 66:1093\u20131110","journal-title":"J Supercomput"},{"key":"3489_CR21","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s11042-013-1369-0","volume":"72","author":"T-C Lu","year":"2014","unstructured":"Lu T-C, Chang C-C, Huang Y-H (2014) High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimedia Tools Appl 72:417\u2013435","journal-title":"Multimedia Tools Appl"},{"key":"3489_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1179\/136821910X12863758415720","volume":"59","author":"H Golpira","year":"2011","unstructured":"Golpira H, Danyali H (2011) Reversible medical image watermarking based on wavelet histogram shifting. Imaging Sci J 59:49\u201359","journal-title":"Imaging Sci J"},{"key":"3489_CR23","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.eswa.2013.11.019","volume":"41","author":"B Lei","year":"2014","unstructured":"Lei B, Tan E, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178\u20133188","journal-title":"Expert Syst Appl"},{"key":"3489_CR24","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.bspc.2016.05.005","volume":"29","author":"A Rocek","year":"2016","unstructured":"Rocek A (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomed Signal Process Control 29:44\u201352","journal-title":"Biomed Signal Process Control"},{"issue":"3","key":"3489_CR25","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"3489_CR26","series-title":"Lecture notes in computer science","doi-asserted-by":"publisher","DOI":"10.1007\/11922841_28","volume-title":"A reversible watermarking based on histogram shifting","author":"J Hwang","year":"2006","unstructured":"Hwang J, Kim JW, Choi JU (2006) A reversible watermarking based on histogram shifting. Lecture notes in computer science. Springer, Berlin"},{"issue":"2","key":"3489_CR27","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Hu Y, Lee H, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250\u2013260","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"8","key":"3489_CR28","first-page":"1964","volume":"6","author":"M Arabzadeh","year":"2012","unstructured":"Arabzadeh M, Rahimi MR (2012) Reversible data hiding scheme based on maximum histogram gap of image blocks. KSII Trans Internet Inf Syst 6(8):1964\u20131981","journal-title":"KSII Trans Internet Inf Syst"},{"key":"3489_CR29","doi-asserted-by":"crossref","unstructured":"Arabzadeh M, Helfroush MS, Danyali H, Kasiri K (2011) Reversible watermarking based on generalized histogram shifting. In: 18th IEEE international conference on image processing (ICIP), pp 2741\u20132744","DOI":"10.1109\/ICIP.2011.6116237"},{"issue":"3","key":"3489_CR30","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528\u2013540","journal-title":"J Digit Imaging"},{"key":"3489_CR31","first-page":"22","volume":"9","author":"MI Khalil","year":"2017","unstructured":"Khalil MI (2017) Medical image steganography: study of medical image quality degradation when embedding data in the frequency domain. Int J Comput Netw Inf Secur 9:22","journal-title":"Int J Comput Netw Inf Secur"},{"key":"3489_CR32","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3538979","author":"V Kelkar","year":"2017","unstructured":"Kelkar V, Tuckley K, Nemade H (2017) Novel variants of a histogram shift-based reversible watermarking technique for medical images to improve hiding capacity. J Healthcare Eng. https:\/\/doi.org\/10.1155\/2017\/3538979","journal-title":"J Healthcare Eng"},{"issue":"2","key":"3489_CR33","doi-asserted-by":"publisher","first-page":"1650006","DOI":"10.1142\/S0219467816500066","volume":"16","author":"P Manimehalai","year":"2016","unstructured":"Manimehalai P, Rani PAJ (2016) A new robust reversible blind watermarking in wavelet-domain for color images. Int J Image Graph\u00a016(2):1650006","journal-title":"Int J Image Graph"},{"issue":"2","key":"3489_CR34","first-page":"114","volume":"9","author":"MR Khosravi","year":"2017","unstructured":"Khosravi MR, Sharif-Yazd M, Moghimi MK, Keshavarz A, Rostami H, Mansouri S (2017) MRF-based multispectral image fusion using an adaptive approach based on edge-guided interpolation. J Geogr Inf Syst 9(2):114\u2013125","journal-title":"J Geogr Inf Syst"},{"key":"3489_CR35","unstructured":"http:\/\/www.dicomlibrary.com"},{"key":"3489_CR36","unstructured":"http:\/\/www.aycan.de\/sample-dicom-images.html"},{"key":"3489_CR37","unstructured":"http:\/\/dicom.nema.org"},{"issue":"4","key":"3489_CR38","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.12928\/telkomnika.v15i4.6597","volume":"15","author":"M Alhihi","year":"2017","unstructured":"Alhihi M (2017) Determining the optimum number of paths for realization of multi-path routing in MPLS-TE networks. TELKOMNIKA 15(4):1701\u20131709","journal-title":"TELKOMNIKA"},{"issue":"2","key":"3489_CR39","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/s11227-017-2148-x","volume":"74","author":"MR Khosravi","year":"2018","unstructured":"Khosravi MR, Basri H, Rostami H (2018) Efficient routing for dense UWSNs with high-speed mobile nodes using spherical divisions. J Supercomput 74(2):696\u2013716","journal-title":"J Supercomput"},{"issue":"3","key":"3489_CR40","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s00521-016-2490-6","volume":"29","author":"W Wen","year":"2018","unstructured":"Wen W, Zhang Y, Fang Y, Fang Z (2018) Image salient regions encryption for generating visually meaningful ciphertext image. Neural Comput Appl 29(3):653\u2013663","journal-title":"Neural Comput Appl"},{"issue":"4","key":"3489_CR41","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s00521-016-2511-5","volume":"29","author":"M Khan","year":"2018","unstructured":"Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput Appl 29(4):993\u2013999","journal-title":"Neural Comput Appl"},{"issue":"2","key":"3489_CR42","doi-asserted-by":"publisher","first-page":"53","DOI":"10.4018\/IJAEIS.2018040104","volume":"9","author":"MR Khosravi","year":"2018","unstructured":"Khosravi MR, Rostami H, Samadi S (2018) Enhancing the binary watermark-based data hiding scheme using an interpolation-based approach for optical remote sensing images. Int J Agric Environ Inf Syst 9(2):53\u201371","journal-title":"Int J Agric Environ Inf Syst"},{"key":"3489_CR43","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-017-2953-4","author":"R Kala","year":"2017","unstructured":"Kala R, Deepa P (2017) Adaptive hexagonal fuzzy hybrid filter for Rician noise removal in MRI images. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-017-2953-4","journal-title":"Neural Comput Appl"},{"key":"3489_CR44","doi-asserted-by":"publisher","first-page":"6","DOI":"10.2174\/2215081104666150827214319","volume":"4","author":"R Dianat","year":"2015","unstructured":"Dianat R, Ghanbari M (2015) Comparison between various standard definition to high definition image conversion methods. Recent Adv Commun Netw Technol 4:6\u201315","journal-title":"Recent Adv Commun Netw Technol"},{"issue":"2","key":"3489_CR45","first-page":"11296","volume":"11","author":"M Bazargani","year":"2012","unstructured":"Bazargani M, Ebrahimi H, Dianat R (2012) Digital image watermarking in wavelet, contourlet and curvelet domains. J Basic Appl Sci Res 11(2):11296\u201311308","journal-title":"J Basic Appl Sci Res"},{"issue":"7","key":"3489_CR46","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.3923\/itj.2011.1421.1426","volume":"10","author":"CH Li","year":"2011","unstructured":"Li CH, Lu ZM, Su YX (2011) Reversible data hiding for BTC-compressed images based on bit-plane flipping and histogram shifting of mean tables. Inf Technol J 10(7):1421\u20131426","journal-title":"Inf Technol J"},{"issue":"2","key":"3489_CR47","first-page":"301","volume":"8","author":"CC Lo","year":"2014","unstructured":"Lo CC, Hu YC, Chen WL, Wu CM (2014) Reversible data hiding scheme for BTC-compressed images based on histogram shifting. Int J Secur Appl 8(2):301\u2013314","journal-title":"Int J Secur Appl"},{"issue":"12","key":"3489_CR48","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010\u20135021","journal-title":"IEEE Trans Image Process"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-018-3489-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3489-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-018-3489-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T18:17:33Z","timestamp":1661019453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-018-3489-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,23]]},"references-count":48,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["3489"],"URL":"https:\/\/doi.org\/10.1007\/s00521-018-3489-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2018,4,23]]},"assertion":[{"value":"10 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}