{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:52:19Z","timestamp":1769917939401,"version":"3.49.0"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T00:00:00Z","timestamp":1516579200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10586-017-1614-9","type":"journal-article","created":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T16:54:31Z","timestamp":1516640071000},"page":"12313-12323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Reversible and robust image watermarking based on histogram shifting"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8823-6728","authenticated-orcid":false,"given":"R.","family":"Rajkumar","sequence":"first","affiliation":[]},{"given":"A.","family":"Vasuki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,22]]},"reference":[{"issue":"3","key":"1614_CR1","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"1614_CR2","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1587\/elex.4.205","volume":"4","author":"M Fallahpour","year":"2007","unstructured":"Fallahpour, M., Sedaaghi, M.H.: High capacity lossless data hiding based on histogram modification. IEICE Electronics Express 4(7), 205\u2013210 (2007)","journal-title":"IEICE Electronics Express"},{"key":"1614_CR3","doi-asserted-by":"crossref","unstructured":"Lee, S.K., Suh, Y.H., Ho, Y.S.: Reversible image authentication based on watermarking. Proc. IEEE International Conference on Multimedia Expo. 1321-1324 (2006)","DOI":"10.1109\/ICME.2006.262782"},{"key":"1614_CR4","doi-asserted-by":"crossref","unstructured":"Van Leest, A., Van der Veen, M., Bruekers, F.: Reversible image watermarking. Proc. IEEE International Conference on Information Process. 2(1). II-731-II-734 (2003)","DOI":"10.1117\/12.476858"},{"issue":"6","key":"1614_CR5","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"WL Tai","year":"2009","unstructured":"Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19(6), 906\u2013910 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1614_CR6","doi-asserted-by":"crossref","unstructured":"Xuan, G., Shi, Y.Q., Chai, P., Cui, X., Ni, Z., Tong, X.: Optimum histogram pair based image lossless data embedding. Proceedings of International Workshop on Digital Watermarking. 264-278 (2007)","DOI":"10.1007\/978-3-540-92238-4_21"},{"issue":"8","key":"1614_CR7","first-page":"1062","volume":"21","author":"X Gao","year":"2011","unstructured":"Gao, X., An, L., Yuan, Y., Tao, D., Li, X.: Lossless data embedding using generalized statistical quantity histogram. IEEE Trans. Circuits Syst. Video Technol. 21(8), 1062\u20131070 (2011)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"1614_CR8","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109\u20131118 (2013)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"1614_CR9","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.1016\/j.sigpro.2012.05.034","volume":"92","author":"IC Dragoi","year":"2012","unstructured":"Dragoi, I.C., Coltuc, D., Wu, H.-T., Huang, J.: Reversible image watermarking on prediction errors by efficient histogram modification. Signal Processing Letters 92(12), 3000\u20133009 (2012)","journal-title":"Signal Processing Letters"},{"key":"1614_CR10","unstructured":"Chen, X., Sun, X., H. Zhou, Z., Zhang, J.: Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. Journal of System. Software. 86(10), 2620-2626 (2013)"},{"issue":"2","key":"1614_CR11","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TMM.2012.2229262","volume":"15","author":"X Zhang","year":"2013","unstructured":"Zhang, X.: Reversible data hiding with optimal value transfer. IEEE Trans. Multimedia 15(2), 316\u2013325 (2013)","journal-title":"IEEE Trans. Multimedia"},{"issue":"5","key":"1614_CR12","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","volume":"25","author":"Tianrui Zong","year":"2015","unstructured":"Zong, Tianrui, Xiang, Yong, Natgunanathan, Iynkaran, Guo, Song, Zhou, Wanlei, Beliakov, Gleb: Robust Histogram Shape-Based Method for Image Watermarking. IEEE Trans. Circuits Syst. Video Technol. 25(5), 717\u2013729 (2015)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"5","key":"1614_CR13","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/9.855552","volume":"45","author":"Kazufumi Ito","year":"2000","unstructured":"Ito, Kazufumi, Xiong, Kaiqi: Gaussian Filters for Nonlinear Filtering Problems. IEEE Trans. Autom. Control 45(5), 910\u2013927 (2000)","journal-title":"IEEE Trans. Autom. Control"},{"key":"1614_CR14","unstructured":"Nisha., Sunil Kumar.: Image Quality Assessment Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 3(7), 636\u2013640 (2010)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1614-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1614-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1614-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T23:34:11Z","timestamp":1751240051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1614-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,22]]},"references-count":14,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1614"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1614-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,22]]},"assertion":[{"value":"25 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}