{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:49:22Z","timestamp":1776077362187,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T00:00:00Z","timestamp":1706659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T00:00:00Z","timestamp":1706659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Natural Science Foundation of Shanxi Province","award":["202203021221145"],"award-info":[{"award-number":["202203021221145"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072325"],"award-info":[{"award-number":["62072325"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"TYUST SRIF","award":["20212039"],"award-info":[{"award-number":["20212039"]}]},{"name":"Fundamental Research Program of Shanxi Province","award":["202103021224272"],"award-info":[{"award-number":["202103021224272"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s00530-023-01253-0","type":"journal-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T04:46:33Z","timestamp":1706676393000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A multi-layer mesh synchronized reversible data hiding algorithm on the 3D model"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3324-467X","authenticated-orcid":false,"given":"Guoyou","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1094-5653","authenticated-orcid":false,"given":"Zheyu","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Chaoli","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2085-1853","authenticated-orcid":false,"given":"Xiaoxue","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,31]]},"reference":[{"issue":"12","key":"1253_CR1","doi-asserted-by":"publisher","first-page":"5006","DOI":"10.1109\/TVCG.2021.3075136","volume":"28","author":"H Zhou","year":"2022","unstructured":"Zhou, H., Zhang, W., Chen, K., Li, W., Yu, N.: Three-dimensional mesh steganography and steganalysis: a review. IEEE Trans. Visual Comput. Graphics 28(12), 5006\u20135025 (2022). https:\/\/doi.org\/10.1109\/TVCG.2021.3075136","journal-title":"IEEE Trans. Visual Comput. Graphics"},{"key":"1253_CR2","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.patrec.2022.12.008","volume":"165","author":"H Wu","year":"2023","unstructured":"Wu, H., Li, C., Liu, G., Zhang, X.: Hiding data hiding. Pattern Recogn. Lett. 165, 122\u2013127 (2023). https:\/\/doi.org\/10.1016\/j.patrec.2022.12.008","journal-title":"Pattern Recogn. Lett."},{"issue":"3","key":"1253_CR3","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1016\/j.sigpro.2011.09.028","volume":"92","author":"M Liu","year":"2012","unstructured":"Liu, M., Seah, H.S., Zhu, C., Lin, W., Tian, F.: Reducing location map in prediction-based difference expansion for reversible image data embedding. Signal Process. 92(3), 819\u2013828 (2012). https:\/\/doi.org\/10.1016\/j.sigpro.2011.09.028","journal-title":"Signal Process."},{"key":"1253_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103487","volume":"75","author":"J Liang","year":"2023","unstructured":"Liang, J., Peng, H., Li, L., Tong, F., Bao, S., Wang, L.: A secure and effective image encryption scheme by combining parallel compressed sensing with secret sharing scheme. J. Inf. Secur. Appl. 75, 103487 (2023). https:\/\/doi.org\/10.1016\/j.jisa.2023.103487","journal-title":"J. Inf. Secur. Appl."},{"key":"1253_CR5","doi-asserted-by":"publisher","first-page":"183300","DOI":"10.1109\/ACCESS.2019.2960455","volume":"7","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Kong, L., Qian, Z., Feng, G., Zhang, X., Zheng, J.: Breaking permutation-based mesh steganography and security improvement. IEEE Access 7, 183300\u2013183310 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2960455","journal-title":"IEEE Access"},{"issue":"2","key":"1253_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221\u2013234 (2016). https:\/\/doi.org\/10.1109\/TIFS.2015.2486744","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"1253_CR7","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TVCG.2008.94","volume":"15","author":"MW Chao","year":"2008","unstructured":"Chao, M.W., Lin, C.H., Yu, C.W., Lee, T.Y.: A high capacity 3D steganography algorithm. IEEE Trans. Vis. Comput. Graph. 15(2), 274\u2013284 (2008)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"issue":"6","key":"1253_CR8","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/TMM.2018.2882088","volume":"21","author":"H Zhou","year":"2018","unstructured":"Zhou, H., Chen, K., Zhang, W., Yao, Y., Yu, N.: Distortion design for secure adaptive 3-D mesh steganography. IEEE Trans. Multimedia 21(6), 1384\u20131398 (2018)","journal-title":"IEEE Trans. Multimedia"},{"issue":"3","key":"1253_CR9","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"N Zhicheng","year":"2006","unstructured":"Zhicheng, N., Yun-Qing, S., Ansari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006). https:\/\/doi.org\/10.1109\/TCSVT.2006.869964","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1253_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2022.116690","volume":"105","author":"VM Manikandan","year":"2022","unstructured":"Manikandan, V.M., Zhang, Y.-D.: An adaptive pixel mapping based approach for reversible data hiding in encrypted images. Signal Process. 105, 116690 (2022). https:\/\/doi.org\/10.1016\/j.image.2022.116690","journal-title":"Signal Process."},{"issue":"9","key":"1253_CR11","doi-asserted-by":"publisher","first-page":"5965","DOI":"10.1007\/s11042-019-08255-z","volume":"79","author":"W Wang","year":"2020","unstructured":"Wang, W.: A reversible data hiding algorithm based on bidirectional difference expansion. Multimedia Tools Appl. 79(9), 5965\u20135988 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08255-z","journal-title":"Multimedia Tools Appl."},{"issue":"9","key":"1253_CR12","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914\u20131927 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2566261","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1253_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.sigpro.2019.03.016","volume":"161","author":"ZL Liu","year":"2019","unstructured":"Liu, Z.L., Pun, C.M.: Reversible image reconstruction for reversible data hiding in encrypted images. Signal Process. 161, 50\u201362 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.03.016","journal-title":"Signal Process."},{"issue":"9","key":"1253_CR14","doi-asserted-by":"publisher","first-page":"2437","DOI":"10.1016\/j.patcog.2006.12.026","volume":"40","author":"P Papadakis","year":"2007","unstructured":"Papadakis, P., Pratikakis, I., Perantonis, S., Theoharis, T.: Efficient 3D shape matching and retrieval using a concrete radialized spherical projection representation. Pattern Recogn. 40(9), 2437\u20132452 (2007). https:\/\/doi.org\/10.1016\/j.patcog.2006.12.026","journal-title":"Pattern Recogn."},{"key":"1253_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.isprsjprs.2020.02.018","volume":"163","author":"J Sanchez","year":"2020","unstructured":"Sanchez, J., Denis, F., Coeurjolly, D., Dupont, F., Trassoudaine, L., Checchin, P.: Robust normal vector estimation in 3D point clouds through iterative principal component analysis. ISPRS J. Photogramm. Remote Sens. 163, 18\u201335 (2020). https:\/\/doi.org\/10.1016\/j.isprsjprs.2020.02.018","journal-title":"ISPRS J. Photogramm. Remote Sens."},{"issue":"22","key":"1253_CR16","doi-asserted-by":"publisher","first-page":"10493","DOI":"10.1021\/acs.iecr.9b06244","volume":"59","author":"J Liu","year":"2020","unstructured":"Liu, J., Wang, D., Chen, J.: Monitoring framework based on generalized tensor PCA for three-dimensional batch process data. Ind. Eng. Chem. Res. 59(22), 10493\u201310508 (2020). https:\/\/doi.org\/10.1021\/acs.iecr.9b06244","journal-title":"Ind. Eng. Chem. Res."},{"key":"1253_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107288","volume":"167","author":"Y Qiu","year":"2020","unstructured":"Qiu, Y., Qian, Z., Zeng, H., Lin, X., Zhang, X.: Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process. 167, 107288 (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2019.107288","journal-title":"Signal Process."},{"key":"1253_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Wen, T., Song, X.: Multilevel reversible data hiding based on difference histogram for 3D point cloud models. In; 2019 6th International Conference on Information Science and Control Engineering (ICISCE) (2019)","DOI":"10.1109\/ICISCE48695.2019.00082"},{"issue":"21","key":"1253_CR19","doi-asserted-by":"publisher","first-page":"29713","DOI":"10.1007\/s11042-018-6219-7","volume":"78","author":"Q Zhang","year":"2019","unstructured":"Zhang, Q., Song, X., Wen, T., Fu, C.: Reversible data hiding for 3D mesh models with hybrid prediction and multilayer strategy. Multimedia Tools Appl. 78(21), 29713\u201329729 (2019). https:\/\/doi.org\/10.1007\/s11042-018-6219-7","journal-title":"Multimedia Tools Appl."},{"key":"1253_CR20","doi-asserted-by":"crossref","unstructured":"Luo, H., Lu, Z. M., Pan, J. S.: A reversible data hiding scheme for 3d point cloud model. In: 2006 IEEE International Symposium on Signal Processing and Information Technology (2007)","DOI":"10.1109\/ISSPIT.2006.270919"},{"key":"1253_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103265","volume":"73","author":"R Bhardwaj","year":"2022","unstructured":"Bhardwaj, R.: Efficient separable reversible data hiding algorithm for compressed 3D mesh models. Biomed. Signal Process. Control 73, 103265 (2022). https:\/\/doi.org\/10.1016\/j.bspc.2021.103265","journal-title":"Biomed. Signal Process. Control"},{"key":"1253_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108686","volume":"201","author":"W-L Lyu","year":"2022","unstructured":"Lyu, W.-L., Cheng, L., Yin, Z.: High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Signal Process. 201, 108686 (2022). https:\/\/doi.org\/10.1016\/j.sigpro.2022.108686","journal-title":"Signal Process."},{"issue":"3","key":"1253_CR23","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1007\/s12559-021-09919-5","volume":"14","author":"N Xu","year":"2022","unstructured":"Xu, N., Tang, J., Luo, B., Yin, Z.: Separable reversible data hiding based on integer mapping and msb prediction for encrypted 3D mesh models. Cogn. Comput. 14(3), 1172\u20131181 (2022). https:\/\/doi.org\/10.1007\/s12559-021-09919-5","journal-title":"Cogn. Comput."},{"key":"1253_CR24","doi-asserted-by":"publisher","first-page":"2286","DOI":"10.1109\/TMM.2020.3009492","volume":"23","author":"YY Tsai","year":"2021","unstructured":"Tsai, Y.Y.: Separable reversible data hiding for encrypted three-dimensional models based on spatial subdivision and space encoding. IEEE Trans. Multimedia 23, 2286\u20132296 (2021). https:\/\/doi.org\/10.1109\/TMM.2020.3009492","journal-title":"IEEE Trans. Multimedia"},{"key":"1253_CR25","doi-asserted-by":"crossref","unstructured":"Luo, H., Pan, J. S., Lu, Z. M., Huang, H. C.; Reversible data hiding for 3D point cloud model. In: International Conference on Intelligent Information Hiding and Multimedia (2006)","DOI":"10.1109\/IIH-MSP.2006.265047"},{"issue":"12","key":"1253_CR26","doi-asserted-by":"publisher","first-page":"8145","DOI":"10.1007\/s13369-018-3354-4","volume":"43","author":"M Shah","year":"2018","unstructured":"Shah, M., Zhang, W., Hu, H., Zhou, H., Mahmood, T.: Homomorphic encryption-based reversible data hiding for 3D mesh models. Arab. J. Sci. Eng. 43(12), 8145\u20138157 (2018). https:\/\/doi.org\/10.1007\/s13369-018-3354-4","journal-title":"Arab. J. Sci. Eng."},{"issue":"12","key":"1253_CR27","doi-asserted-by":"publisher","first-page":"4947","DOI":"10.1007\/s12652-019-01179-4","volume":"10","author":"A Girdhar","year":"2019","unstructured":"Girdhar, A., Kumar, V.: A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map. J. Ambient. Intell. Humaniz. Comput. 10(12), 4947\u20134961 (2019). https:\/\/doi.org\/10.1007\/s12652-019-01179-4","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"1253_CR28","doi-asserted-by":"publisher","first-page":"5263","DOI":"10.1007\/s11042-017-4430-6","volume":"77","author":"R Jiang","year":"2018","unstructured":"Jiang, R., Zhang, W., Hou, D., Wang, H., Yu, N.: Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification. Multimedia Tools Appl. 77, 5263\u20135280 (2018)","journal-title":"Multimedia Tools Appl."},{"key":"1253_CR29","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.measurement.2018.12.016","volume":"135","author":"Q Zhang","year":"2019","unstructured":"Zhang, Q., Song, X., Wen, T., Fu, C.: Reversibility improved data hiding in 3D mesh models using prediction-error expansion and sorting. Measurement 135, 738\u2013746 (2019). https:\/\/doi.org\/10.1016\/j.measurement.2018.12.016","journal-title":"Measurement"},{"issue":"2","key":"1253_CR30","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s13319-015-0051-x","volume":"6","author":"Y-H Huang","year":"2015","unstructured":"Huang, Y.-H., Tsai, Y.-Y.: A reversible data hiding scheme for 3D polygonal models based on histogram shifting with high embedding capacity. 3 D Res 6(2), 20 (2015). https:\/\/doi.org\/10.1007\/s13319-015-0051-x","journal-title":"3 D Res"},{"issue":"1","key":"1253_CR31","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TVCG.2012.106","volume":"19","author":"Y Yang","year":"2013","unstructured":"Yang, Y., Peyerimhoff, N., Ivrissimtzis, I.: Linear correlations between spatial and normal noise in triangle meshes. IEEE Trans. Visual Comput. Graph. 19(1), 45\u201355 (2013). https:\/\/doi.org\/10.1109\/TVCG.2012.106","journal-title":"IEEE Trans. Visual Comput. Graph."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01253-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-023-01253-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01253-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T06:25:01Z","timestamp":1707891901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-023-01253-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,31]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1253"],"URL":"https:\/\/doi.org\/10.1007\/s00530-023-01253-0","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,31]]},"assertion":[{"value":"31 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"52"}}