{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:26:24Z","timestamp":1740122784215,"version":"3.37.3"},"reference-count":149,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T00:00:00Z","timestamp":1613606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T00:00:00Z","timestamp":1613606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s10772-021-09818-y","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T17:48:06Z","timestamp":1613756886000},"page":"823-852","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Difference expansion based reversible watermarking algorithms for copyright protection of images: state-of-the-art and challenges"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6748-4500","authenticated-orcid":false,"given":"H. R.","family":"Lakshmi","sequence":"first","affiliation":[]},{"given":"Surekha","family":"Borra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"9818_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M. A. M., Danyali, H., & Helfroush, M. S. (2010). Reversible watermarking based on interpolation error histogram shifting. In\u00a02010 5th International Symposium on Telecommunications\u00a0(pp. 840\u2013845). IEEE.","DOI":"10.1109\/ISTEL.2010.5734139"},{"key":"9818_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad, T., Holil, M., Wibisono, W., & Muslim, I. R. (2013). An improved Quad and RDE-based medical data hiding method. In\u00a02013 IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)\u00a0(pp. 141\u2013145). IEEE.","DOI":"10.1109\/CyberneticsCom.2013.6865798"},{"key":"9818_CR3","doi-asserted-by":"crossref","unstructured":"Al Huti, M. H. A., Ahmad, T., & Djanali, S. (2015). Increasing the capacity of the secret data using DEpixels blocks and adjusted RDE-based on grayscale images. In\u00a02015 International Conference on Information & Communication Technology and Systems (ICTS)\u00a0(pp. 225\u2013230). IEEE.","DOI":"10.1109\/ICTS.2015.7379903"},{"issue":"4","key":"9818_CR4","first-page":"512","volume":"46","author":"MHA Al-Hooti","year":"2019","unstructured":"Al-Hooti, M. H. A., Ahmad, T., & Djanali, S. (2019). Improving the capability of reduced difference expansion based digital image data hiding. IAENG International Journal of Computer Science, 46(4), 512\u2013517.","journal-title":"IAENG International Journal of Computer Science"},{"issue":"1","key":"9818_CR5","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jss.2010.08.055","volume":"84","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi, O. M., & Khoo, B. E. (2011). High capacity data hiding schemes for medical images based on difference expansion. Journal of Systems and Software, 84(1), 105\u2013112.","journal-title":"Journal of Systems and Software"},{"issue":"1","key":"9818_CR6","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.sigpro.2012.07.012","volume":"93","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi, O. M., & Khoo, B. E. (2013). Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Signal Processing, 93(1), 154\u2013162.","journal-title":"Signal Processing"},{"issue":"8","key":"9818_CR7","doi-asserted-by":"publisher","first-page":"3598","DOI":"10.1109\/TIP.2012.2191564","volume":"21","author":"L An","year":"2012","unstructured":"An, L., Gao, X., Li, X., Tao, D., Deng, C., & Li, J. (2012a). Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Transactions on image processing, 21(8), 3598\u20133611.","journal-title":"IEEE Transactions on image processing"},{"key":"9818_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2011.08.019","volume":"79","author":"L An","year":"2012","unstructured":"An, L., Gao, X., Yuan, Y., Tao, D., Deng, C., & Ji, F. (2012b). Content-adaptive reliable robust lossless data embedding. Neurocomputing, 79, 1\u201311.","journal-title":"Neurocomputing"},{"key":"9818_CR9","unstructured":"Andra, M. B., Ahmad, T., & Usagawa, T. (2017). Medical record protection with improved GRDE data hiding method on audio files.\u00a0Engineering Letters,\u00a025(2)."},{"issue":"1","key":"9818_CR10","first-page":"6","volume":"3","author":"TK Araghi","year":"2016","unstructured":"Araghi, T. K., Manaf, A. B. A., Zamani, M., & Araghi, S. K. (2016). A survey on digital image watermarking techniques in spatial and transform domains. The International Journal of Advanced Manufacturing Technology, 3(1), 6\u201310.","journal-title":"The International Journal of Advanced Manufacturing Technology"},{"key":"9818_CR11","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.sigpro.2017.02.001","volume":"137","author":"A Arham","year":"2017","unstructured":"Arham, A., Nugroho, H. A., & Adji, T. B. (2017). Multiple layer data hiding scheme based on difference expansion of quad. Signal Processing, 137, 52\u201362.","journal-title":"Signal Processing"},{"issue":"4","key":"9818_CR12","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1016\/j.jss.2011.11.005","volume":"85","author":"M Arsalan","year":"2012","unstructured":"Arsalan, M., Malik, S. A., & Khan, A. (2012). Intelligent reversible watermarking in integer wavelet domain for medical images. Journal of Systems and Software, 85(4), 883\u2013894.","journal-title":"Journal of Systems and Software"},{"key":"9818_CR13","doi-asserted-by":"crossref","unstructured":"Bobeica, A., Dragoi, I. C., Caciula, I., Coltuc, D., Albu, F., & Yang, F. (2018). Capacity control for prediction error expansion based audio reversible data hiding. In 2018 22nd International Conference on System Theory, Control and Computing (ICSTCC) (pp. 810\u2013815). IEEE.","DOI":"10.1109\/ICSTCC.2018.8540672"},{"key":"9818_CR14","unstructured":"Borra, S., Dey, N., Ashour, A. S., & Shi, F. (2017). Digital image watermarking tools: State-of-the-art. In ITITS (pp. 450\u2013459)."},{"issue":"2","key":"9818_CR15","doi-asserted-by":"publisher","first-page":"13","DOI":"10.4018\/IJDCF.2019040102","volume":"11","author":"S Borra","year":"2019","unstructured":"Borra, S., & Thanki, R. (2019). A frt-svd based blind medical watermarking technique for telemedicine applications. International Journal of Digital Crime and Forensics (IJDCF), 11(2), 13\u201333.","journal-title":"International Journal of Digital Crime and Forensics (IJDCF)"},{"issue":"4","key":"9818_CR16","first-page":"345","volume":"8","author":"S Borra","year":"2020","unstructured":"Borra, S., & Thanki, R. (2020). Crypto-watermarking scheme for tamper detection of medical images. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 8(4), 345\u2013355.","journal-title":"Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization"},{"key":"9818_CR17","volume-title":"Digital image watermarking: Theoretical and computational advances","author":"S Borra","year":"2018","unstructured":"Borra, S., Thanki, R., & Dey, N. (2018). Digital image watermarking: Theoretical and computational advances. Boca Raton: CRC Press."},{"key":"9818_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.smhl.2018.02.001","volume":"12","author":"S Borra","year":"2019","unstructured":"Borra, S., Thanki, R., Dey, N., & Borisagar, K. (2019). Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health, 12, 35\u201348.","journal-title":"Smart Health"},{"key":"9818_CR19","doi-asserted-by":"crossref","unstructured":"Caciula, I., & Coltuc, D. (2012). Capacity control of reversible watermarking by two-thresholds embedding. In\u00a02012 IEEE International Workshop on Information Forensics and Security (WIFS)\u00a0(pp. 223\u2013227). IEEE.","DOI":"10.1109\/WIFS.2012.6412653"},{"key":"9818_CR20","doi-asserted-by":"crossref","unstructured":"Caciula, I., & Coltuc, D. (2013). Capacity control of reversible watermarking by two-thresholds embedding: Further results. In\u00a0International Symposium on Signals, Circuits and Systems ISSCS2013\u00a0(pp. 1\u20134). IEEE.","DOI":"10.1109\/ISSCS.2013.6651230"},{"issue":"1","key":"9818_CR21","first-page":"134546","volume":"2010","author":"R Caldelli","year":"2010","unstructured":"Caldelli, R., Filippini, F., & Becarelli, R. (2010). Reversible watermarking techniques: An overview and a classification. EURASIP Journal on Information Security, 2010(1), 134546.","journal-title":"EURASIP Journal on Information Security"},{"key":"9818_CR22","doi-asserted-by":"crossref","unstructured":"Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2002). Reversible data hiding. In Proceedings. International Conference on Image Processing (Vol. 2, pp. II\u2013II). IEEE.","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"9818_CR23","unstructured":"Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. S. (2003). Localized lossless authentication watermark (LAW). In Security and Watermarking of Multimedia Contents V (Vol. 5020, pp. 689\u2013698). International Society for Optics and Photonics."},{"issue":"2","key":"9818_CR24","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2005). Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing, 14(2), 253\u2013266.","journal-title":"IEEE Transactions on Image Processing"},{"key":"9818_CR25","unstructured":"Chen, M., Chen, Z., Zeng, X., & Xiong, Z. (2009). Reversible image watermarking based on full context prediction. In\u00a02009 16th IEEE International Conference on Image Processing (ICIP)\u00a0(pp. 4253\u20134256). IEEE."},{"issue":"8","key":"9818_CR26","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1109\/TCSVT.2007.903553","volume":"17","author":"YM Cheung","year":"2007","unstructured":"Cheung, Y. M., & Wu, H. T. (2007). A sequential quantization strategy for data embedding and integrity verification. IEEE Transactions on Circuits and Systems for Video Technology, 17(8), 1007\u20131016.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"9818_CR27","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10278-007-9012-0","volume":"21","author":"KH Chiang","year":"2008","unstructured":"Chiang, K. H., Chang-Chien, K. C., Chang, R. F., & Yen, H. Y. (2008). Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. Journal of Digital Imaging, 21(1), 77\u201390.","journal-title":"Journal of Digital Imaging"},{"issue":"6","key":"9818_CR28","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1007\/s11042-013-1732-1","volume":"74","author":"KC Choi","year":"2015","unstructured":"Choi, K. C., Pun, C. M., & Chen, C. P. (2015). Application of a generalized difference expansion based reversible audio data hiding algorithm. Multimedia Tools and Applications, 74(6), 1961\u20131982.","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"9818_CR29","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TIFS.2012.2224108","volume":"8","author":"G Coatrieux","year":"2012","unstructured":"Coatrieux, G., Pan, W., Cuppens-Boulahia, N., Cuppens, F., & Roux, C. (2012). Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Transactions on Information Forensics and Security, 8(1), 111\u2013120.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"9818_CR30","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"Coltuc, D. (2011). Improved embedding for prediction-based reversible watermarking. IEEE Transactions on Information Forensics and Security, 6(3), 873\u2013882.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"9818_CR31","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2006.884895","volume":"14","author":"D Coltuc","year":"2007","unstructured":"Coltuc, D., & Chassery, J. M. (2007). Very fast watermarking by reversible contrast mapping. IEEE Signal Processing Letters, 14(4), 255\u2013258.","journal-title":"IEEE Signal Processing Letters"},{"key":"9818_CR32","unstructured":"Coltuc, D., & Tudoroiu, A. (2012). Multibit versus multilevel embedding in high capacity difference expansion reversible watermarking. In 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO) (pp. 1791\u20131795). IEEE."},{"issue":"3","key":"9818_CR33","doi-asserted-by":"publisher","first-page":"36","DOI":"10.4018\/jaci.2011070105","volume":"3","author":"K Curran","year":"2011","unstructured":"Curran, K., & Lautman, R. (2011). The problems of jurisdiction on the internet. International Journal of Ambient Computing and Intelligence (IJACI), 3(3), 36\u201342.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"issue":"14","key":"9818_CR34","doi-asserted-by":"publisher","first-page":"38","DOI":"10.5120\/12429-9124","volume":"71","author":"P Dabas","year":"2013","unstructured":"Dabas, P., & Khanna, K. (2013). A study on spatial and transform domain watermarking techniques. International Journal of Computer Applications, 71(14), 38\u201341.","journal-title":"International Journal of Computer Applications"},{"key":"9818_CR35","doi-asserted-by":"crossref","unstructured":"Das, S., & Sunaniya, A. K. (2020). A Comparative study of reversible video watermarking using automatic threshold adjuster and non-feedback-based DE method. In Smart Computing Paradigms: New Progresses and Challenges (pp. 77\u201385). Singapore: Springer.","DOI":"10.1007\/978-981-13-9683-0_9"},{"key":"9818_CR36","doi-asserted-by":"crossref","unstructured":"Das, S., Sunaniya, A. K., Maity, R., & Maity, N. P. (2020). Efficient FPGA implementation of corrected reversible contrast mapping algorithm for video watermarking. Microprocessors and Microsystems, 103092.","DOI":"10.1016\/j.micpro.2020.103092"},{"key":"9818_CR37","doi-asserted-by":"crossref","unstructured":"Das, S., Sunaniya, A. K., Maity, R., & Maity, N. P. (2020). Efficient FPGA implementation of corrected reversible contrast mapping algorithm for video watermarking.\u00a0Microprocessors and Microsystems, 103092.","DOI":"10.1016\/j.micpro.2020.103092"},{"key":"9818_CR38","doi-asserted-by":"crossref","unstructured":"De Vleeschouwer, C., Delaigle, J. E., & Macq, B. (2001). Circular interpretation of histogram for reversible watermarking. In 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No. 01TH8564) (pp. 345\u2013350). IEEE.","DOI":"10.1109\/MMSP.2001.962758"},{"issue":"1","key":"9818_CR39","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"C De Vleeschouwer","year":"2003","unstructured":"De Vleeschouwer, C., Delaigle, J. F., & Macq, B. (2003). Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Transactions on Multimedia, 5(1), 97\u2013105.","journal-title":"IEEE Transactions on Multimedia"},{"key":"9818_CR40","unstructured":"Dey, N., Acharjee, S., Biswas, D., Das, A., & Chaudhuri, S. S. (2013). Medical information embedding in compressed watermarked intravascular ultrasound video. arXiv preprint arXiv:1303.2211."},{"key":"9818_CR41","doi-asserted-by":"crossref","unstructured":"Dey, N., Das, P., Roy, A. B., Das, A., & Chaudhuri, S. S. (2012). DWT-DCT-SVD based intravascular ultrasound video watermarking. In 2012 World Congress on Information and Communication Technologies (pp. 224\u2013229). IEEE.","DOI":"10.1109\/WICT.2012.6409079"},{"issue":"7","key":"9818_CR42","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5815\/ijigsp.2012.07.04","volume":"4","author":"N Dey","year":"2012","unstructured":"Dey, N., Mukhopadhyay, S., Das, A., & Chaudhuri, S. S. (2012). Analysis of P-QRS-T components modified by blind watermarking technique within the electrocardiogram signal for authentication in wireless telecardiology using DWT. International Journal of Image, Graphics and Signal Processing, 4(7), 33.","journal-title":"International Journal of Image, Graphics and Signal Processing"},{"key":"9818_CR43","doi-asserted-by":"crossref","unstructured":"Dey, N., Roy, A. B., Das, A., & Chaudhuri, S. S. (2012). Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in wireless telecardiology. In International Conference on Security in Computer Networks and Distributed Systems (pp. 347\u2013357). Berlin: Springer.","DOI":"10.1007\/978-3-642-34135-9_35"},{"issue":"5","key":"9818_CR44","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1504\/IJBIC.2013.057193","volume":"5","author":"N Dey","year":"2013","unstructured":"Dey, N., Samanta, S., Yang, X. S., Das, A., & Chaudhuri, S. S. (2013). Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search. International Journal of Bio-Inspired Computation, 5(5), 315\u2013326.","journal-title":"International Journal of Bio-Inspired Computation"},{"key":"9818_CR45","unstructured":"Dragoi, C., & Coltuc, D. (2012). Improved rhombus interpolation for reversible watermarking by difference expansion. In\u00a02012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO)\u00a0(pp. 1688\u20131692). IEEE."},{"issue":"4","key":"9818_CR46","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"IC Dragoi","year":"2014","unstructured":"Dragoi, I. C., & Coltuc, D. (2014). Local-prediction-based difference expansion reversible watermarking. IEEE Transactions on Image Processing, 23(4), 1779\u20131790.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"5","key":"9818_CR47","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1109\/TIP.2016.2549458","volume":"25","author":"IC Dragoi","year":"2016","unstructured":"Dragoi, I. C., & Coltuc, D. (2016). Adaptive pairing reversible watermarking. IEEE Transactions on Image Processing, 25(5), 2420\u20132422.","journal-title":"IEEE Transactions on Image Processing"},{"key":"9818_CR48","doi-asserted-by":"crossref","unstructured":"Elbadry, S., Xiang, Y., Zong, T., & Natgunanathan, I. (2014). A new interpolation error expansion based reversible watermarking algorithm considering the human visual system. In\u00a02014 IEEE International Conference on Communications (ICC)\u00a0(pp. 896\u2013900). IEEE.","DOI":"10.1109\/ICC.2014.6883433"},{"issue":"3","key":"9818_CR49","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1007\/s13369-015-1956-7","volume":"41","author":"HS El-sayed","year":"2016","unstructured":"El-sayed, H. S., El-Zoghdy, S. F., & Faragallah, O. S. (2016). Adaptive difference expansion-based reversible data hiding scheme for digital images. Arabian Journal for Science and Engineering, 41(3), 1091\u20131107.","journal-title":"Arabian Journal for Science and Engineering"},{"key":"9818_CR50","doi-asserted-by":"crossref","unstructured":"Fadoua, S., & Hamid, T. (2020). Medical Video Watermarking Scheme for Telemedicine Applications. In 2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (pp. 1\u20136). IEEE.","DOI":"10.1109\/IRASET48871.2020.9091982"},{"key":"9818_CR51","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Chen, Q., & Pathak, V. (2004). Lossless data embedding with file size preservation. In Security, Steganography, and Watermarking of Multimedia Contents VI (Vol. 5306, pp. 354\u2013365). International Society for Optics and Photonics.","DOI":"10.1117\/12.525418"},{"issue":"2","key":"9818_CR52","doi-asserted-by":"publisher","first-page":"986842","DOI":"10.1155\/S1110865702000537","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"Fridrich, J., Goljan, M., & Du, R. (2002). Lossless data embedding\u2014new paradigm in digital watermarking. EURASIP Journal on Advances in Signal Processing, 2002(2), 986842.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"9818_CR53","unstructured":"Fridrich, J., Goljan, M., & Du, R. (2002). Lossless data embedding for all image formats. In Security and Watermarking of Multimedia Contents IV (Vol. 4675, pp. 572\u2013583). International Society for Optics and Photonics."},{"key":"9818_CR54","doi-asserted-by":"crossref","unstructured":"Fujiyoshi, M. (2012). A histogram shifting-based blind reversible data hiding method with a histogram peak estimator. In 2012 International Symposium on Communications and Information Technologies (ISCIT) (pp. 313\u2013318). IEEE.","DOI":"10.1109\/ISCIT.2012.6380913"},{"key":"9818_CR55","doi-asserted-by":"crossref","unstructured":"Gao, G., Zhou, C., & Cui, Z. (2015). Reversible watermarking using prediction-error expansion and extreme learning machine.\u00a0Mathematical Problems in Engineering.","DOI":"10.1155\/2015\/670535"},{"issue":"10","key":"9818_CR56","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1016\/j.sigpro.2009.04.015","volume":"89","author":"X Gao","year":"2009","unstructured":"Gao, X., An, L., Li, X., & Tao, D. (2009). Reversibility improved lossless data hiding. Signal Processing, 89(10), 2053\u20132065.","journal-title":"Signal Processing"},{"issue":"8","key":"9818_CR57","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1109\/TCSVT.2011.2130410","volume":"21","author":"X Gao","year":"2011","unstructured":"Gao, X., An, L., Yuan, Y., Tao, D., & Li, X. (2011). Lossless data embedding using generalized statistical quantity histogram. IEEE Transactions on Circuits and Systems for Video Technology, 21(8), 1061\u20131070.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"9818_CR58","doi-asserted-by":"crossref","unstructured":"Garcia-Hernandez, J. J. (2012). Exploring reversible digital watermarking in audio signals using additive interpolation-error expansion. In\u00a02012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing\u00a0(pp. 142\u2013145). IEEE.","DOI":"10.1109\/IIH-MSP.2012.40"},{"key":"9818_CR59","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J. J., & Du, R. (2001). Distortion-free data embedding for images. In International Workshop on Information Hiding (pp. 27\u201341). Berlin: Springer.","DOI":"10.1007\/3-540-45496-9_3"},{"issue":"18","key":"9818_CR60","doi-asserted-by":"publisher","first-page":"25889","DOI":"10.1007\/s11042-019-07767-y","volume":"78","author":"S Gujjunoori","year":"2019","unstructured":"Gujjunoori, S., & Oruganti, M. (2019). Difference expansion based reversible data embedding and edge detection. Multimedia Tools and Applications, 78(18), 25889\u201325917.","journal-title":"Multimedia Tools and Applications"},{"key":"9818_CR61","unstructured":"Gupta, S., Raju Baraskar, D., & Agrawal, S. (2019). A survey on reversible watermarking techniques for image security."},{"key":"9818_CR62","unstructured":"He, C., Asharif, M. R., Khosravy, C. E. G. M., Yamashita, K., & Chen, R. (2013). A new robust image watermarking algorithm based on DWT-SVD and Arnold scrambling.\u00a0ICIC International."},{"key":"9818_CR63","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.3923\/itj.2009.1287.1291","volume":"8","author":"W Hong","year":"2009","unstructured":"Hong, W., Chen, J., & Chen, T.-S. (2009). Blockwise reversible data hiding by contrast mapping. Information Technology Journal, 8, 1287\u20131291.","journal-title":"Information Technology Journal"},{"issue":"3","key":"9818_CR64","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1016\/j.jss.2012.11.024","volume":"86","author":"LC Huang","year":"2013","unstructured":"Huang, L. C., Tseng, L. Y., & Hwang, M. S. (2013). A reversible data hiding method by histogram shifting in high quality medical images. Journal of Systems and Software, 86(3), 716\u2013727.","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"9818_CR65","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/IJACI.2017100102","volume":"8","author":"A Jain","year":"2017","unstructured":"Jain, A., & Bhatnagar, V. (2017). Concoction of ambient intelligence and big data for better patient ministration services. International Journal of Ambient Computing and Intelligence (IJACI), 8(4), 19\u201330.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"issue":"4","key":"9818_CR66","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1093\/ietfec\/e90-a.4.771","volume":"90","author":"HL Jin","year":"2007","unstructured":"Jin, H. L., Fujiyoshi, M., & Kiya, H. (2007). Lossless data hiding in the spatial domain for high quality images. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 90(4), 771\u2013777.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"12","key":"9818_CR67","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra, L., & Heijmans, H. J. (2005). Reversible data embedding into images using wavelet techniques and sorting. IEEE Transactions on Image Processing, 14(12), 2082\u20132090.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"2","key":"9818_CR68","first-page":"42","volume":"4","author":"RD Kanphade","year":"2012","unstructured":"Kanphade, R. D., & Narawade, N. S. (2012). Reversible watermarking using double reversible contrast mapping method. IUP Journal of Telecommunications, 4(2), 42.","journal-title":"IUP Journal of Telecommunications"},{"issue":"2","key":"9818_CR69","doi-asserted-by":"publisher","first-page":"30","DOI":"10.4018\/IJACI.2020040102","volume":"11","author":"P Kaur","year":"2020","unstructured":"Kaur, P., Gupta, S., Dhingra, S., Sharma, S., & Arora, A. (2020). Towards content-dependent social media platform preference analysis. International Journal of Ambient Computing and Intelligence (IJACI), 11(2), 30\u201347.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"key":"9818_CR70","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2013.07.035","volume":"256","author":"A Khan","year":"2014","unstructured":"Khan, A., & Malik, S. A. (2014). A high capacity reversible watermarking approach for authenticating images: Exploiting down-sampling, histogram processing, and block selection. Information Sciences, 256, 162\u2013183.","journal-title":"Information Sciences"},{"key":"9818_CR71","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"Khan, A., Siddiqa, A., Munib, S., & Malik, S. A. (2014). A recent survey of reversible watermarking techniques. Information sciences, 279, 251\u2013272.","journal-title":"Information sciences"},{"issue":"5","key":"9818_CR72","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/LSP.2017.2679608","volume":"24","author":"M Khosravy","year":"2017","unstructured":"Khosravy, M., Gupta, N., Marina, N., Sethi, I. K., & Asharif, M. R. (2017). Perceptual adaptation of image based on Chevreul-Mach bands visual phenomenon. IEEE Signal Processing Letters, 24(5), 594\u2013598.","journal-title":"IEEE Signal Processing Letters"},{"issue":"11","key":"9818_CR73","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1016\/j.patcog.2009.04.004","volume":"42","author":"KS Kim","year":"2009","unstructured":"Kim, K. S., Lee, M. J., Lee, H. Y., & Lee, H. K. (2009). Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recognition, 42(11), 3083\u20133096.","journal-title":"Pattern Recognition"},{"key":"9818_CR74","doi-asserted-by":"crossref","unstructured":"Ko, L. T., Chen, J. E., Shieh, Y. S., Hsin, H. C., & Sung, T. Y. (2012). Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems.\u00a0Computational and Mathematical Methods in Medicine.","DOI":"10.1155\/2012\/839161"},{"key":"9818_CR75","doi-asserted-by":"crossref","unstructured":"Kumar, A., Cheruku, D. R., & Chanamallu, S. R. (2016). Digital watermarking approach based on edge based sorted pixel value difference (ESPVD). Indian Journal of Science and Technology, 9(S1).","DOI":"10.17485\/ijst\/2016\/v9iS1\/100706"},{"issue":"1","key":"9818_CR76","doi-asserted-by":"crossref","first-page":"13","DOI":"10.5120\/15675-4423","volume":"106","author":"NA Kumar","year":"2014","unstructured":"Kumar, N. A., Haribabu, M., & Bindu, H. (2014). Novel image watermarking algorithm with DWT-SVD. International Journal of Computer Applications, 106(1), 13\u201317.","journal-title":"International Journal of Computer Applications"},{"key":"9818_CR77","doi-asserted-by":"crossref","unstructured":"Lee, C. F., Shen, J. J., & Lai, Y. H. (2018). Data hiding using multi-pixel difference expansion. In 2018 3rd International Conference on Computer and Communication Systems (ICCCS) (pp. 56\u201360). IEEE.","DOI":"10.1109\/CCOMS.2018.8463244"},{"key":"9818_CR78","doi-asserted-by":"crossref","unstructured":"Lee, C. F., Shen, J. J., Wu, Y. J., & Agrawal, S. (2019). Reversible data hiding scheme based on difference expansion using shiftable block strategy for enhancing image fidelity. In\u00a02019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/ICAwST.2019.8923138"},{"issue":"4","key":"9818_CR79","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1109\/TIFS.2010.2066971","volume":"5","author":"JD Lee","year":"2010","unstructured":"Lee, J. D., Chiou, Y. H., & Guo, J. M. (2010). Reversible data hiding based on histogram modification of SMVQ indices. IEEE Transactions on Information Forensics and Security, 5(4), 638\u2013648.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"9818_CR80","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"Lee, S., Yoo, C. D., & Kalker, T. (2007). Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transactions on Information Forensics and Security, 2(3), 321\u2013330.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"9818_CR81","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"Li, X., Li, J., Li, B., & Yang, B. (2013). High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Processing, 93(1), 198\u2013205.","journal-title":"Signal Processing"},{"issue":"12","key":"9818_CR82","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"CC Lin","year":"2008","unstructured":"Lin, C. C., Tai, W. L., & Chang, C. C. (2008). Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition, 41(12), 3582\u20133591.","journal-title":"Pattern Recognition"},{"key":"9818_CR83","doi-asserted-by":"crossref","unstructured":"Lu, T. C., & Huang, Y. H. (2008). The distortion control method of reversible contrast mapping hiding scheme. In\u00a02008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing\u00a0(pp. 1133\u20131136). IEEE.","DOI":"10.1109\/IIH-MSP.2008.7"},{"issue":"1","key":"9818_CR84","first-page":"187","volume":"5","author":"L Luo","year":"2009","unstructured":"Luo, L., Chen, Z., Chen, M., Zeng, X., & Xiong, Z. (2009). Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security, 5(1), 187\u2013193.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9818_CR85","doi-asserted-by":"crossref","unstructured":"Luo, Y., Peng, F., Li, X., & Yang, B. (2011). Reversible image water marking based on prediction-error expansion and compensation. In\u00a02011 IEEE International Conference on Multimedia and Expo\u00a0(pp. 1\u20136). IEEE.","DOI":"10.1109\/ICME.2011.6012161"},{"key":"9818_CR86","doi-asserted-by":"crossref","unstructured":"Maiti, D., Maity, S. P., & Maity, H. (2012). Modification in contrast mapping: Reversible watermarking with performance improvement. In\u00a02012 International Conference on Signal Processing and Communications (SPCOM)\u00a0(pp. 1\u20135). IEEE.","DOI":"10.1109\/SPCOM.2012.6290227"},{"key":"9818_CR87","unstructured":"Maity, H. K., Maity, S. P., & Delpha, C. (2013). A modified RCM for reversible watermarking with FPGA implementation. In\u00a0European Workshop on Visual Information Processing (EUVIP)\u00a0(pp. 100\u2013105). IEEE."},{"issue":"1","key":"9818_CR88","first-page":"45","volume":"26","author":"P Maniriho","year":"2018","unstructured":"Maniriho, P., & Ahmad, T. (2018). Enhancing the capability of data hiding method based on reduced difference expansion. Engineering Letters, 26(1), 45\u201355.","journal-title":"Engineering Letters"},{"issue":"3","key":"9818_CR89","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.jksuci.2018.01.011","volume":"31","author":"P Maniriho","year":"2019","unstructured":"Maniriho, P., & Ahmad, T. (2019). Information hiding scheme for digital images using difference expansion and modulus function. Journal of King Saud University-Computer and Information Sciences, 31(3), 335\u2013347.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"8","key":"9818_CR90","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1080\/00207160.2010.509429","volume":"88","author":"NA Memon","year":"2011","unstructured":"Memon, N. A., Khan, A., Gilani, S. A. M., & Ahmad, M. (2011). Reversible watermarking method based on adaptive thresholding and companding technique. International Journal of Computer Mathematics, 88(8), 1573\u20131594.","journal-title":"International Journal of Computer Mathematics"},{"issue":"2","key":"9818_CR91","doi-asserted-by":"publisher","first-page":"43","DOI":"10.4018\/IJACI.2018040104","volume":"9","author":"A Mesjasz-Lech","year":"2018","unstructured":"Mesjasz-Lech, A. (2018). Evolution of e-sales as a form of e-entrepreneurship in Poland: An analysis of opportunities and threats. International Journal of Ambient Computing and Intelligence (IJACI), 9(2), 43\u201354.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"issue":"4","key":"9818_CR92","doi-asserted-by":"publisher","first-page":"13","DOI":"10.4018\/IJNCR.2019100102","volume":"8","author":"S Mukherjee","year":"2019","unstructured":"Mukherjee, S., & Jana, B. (2019). A novel method for high capacity reversible data hiding scheme using difference expansion. International Journal of Natural Computing Research (IJNCR), 8(4), 13\u201327.","journal-title":"International Journal of Natural Computing Research (IJNCR)"},{"key":"9818_CR93","doi-asserted-by":"crossref","unstructured":"Naheed, T., & Usman, I. (2012). Intelligent reversible digital watermarking technique using interpolation errors. In\u00a02012 11th International Conference on Information Science, Signal Processing and their Applications (ISSPA)\u00a0(pp. 1062\u20131067). IEEE.","DOI":"10.1109\/ISSPA.2012.6310447"},{"key":"9818_CR94","doi-asserted-by":"crossref","unstructured":"Naheed, T., Usman, I., & Dar, A. (2011). Lossless data hiding using optimized interpolation error expansion. In\u00a02011 Frontiers of Information Technology\u00a0(pp. 281\u2013286). IEEE.","DOI":"10.1109\/FIT.2011.59"},{"key":"9818_CR95","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.compeleceng.2015.11.033","volume":"53","author":"V Natarajan","year":"2016","unstructured":"Natarajan, V. (2016). Hybrid local prediction error-based difference expansion reversible watermarking for medical images. Computers & Electrical Engineering, 53, 333\u2013345.","journal-title":"Computers & Electrical Engineering"},{"issue":"3","key":"9818_CR96","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology, 16(3), 354\u2013362.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"4","key":"9818_CR97","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TCSVT.2008.918761","volume":"18","author":"Z Ni","year":"2008","unstructured":"Ni, Z., Shi, Y. Q., Ansari, N., Su, W., Sun, Q., & Lin, X. (2008). Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Transactions on Circuits and Systems for Video Technology, 18(4), 497\u2013509.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"4","key":"9818_CR98","first-page":"2468","volume":"8","author":"M Ntahobari","year":"2018","unstructured":"Ntahobari, M., & Ahmad, T. (2018). Protecting data by improving quality of stego image based on enhanced reduced difference expansion. International Journal of Electrical and Computer Engineering, 8(4), 2468.","journal-title":"International Journal of Electrical and Computer Engineering"},{"issue":"1","key":"9818_CR99","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJACI.2016010101","volume":"7","author":"F Odella","year":"2016","unstructured":"Odella, F. (2016). Technology studies and the sociological debate on monitoring of social interactions. International Journal of Ambient Computing and Intelligence (IJACI), 7(1), 1\u201326.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"key":"9818_CR100","doi-asserted-by":"crossref","unstructured":"Ou, B., Zhao, Y., Ni, R., & Cao, G. (2010). A high payload histogram-based reversible wartermarking using linear prediction. In\u00a02010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing\u00a0(pp. 446\u2013449). IEEE.","DOI":"10.1109\/IIHMSP.2010.114"},{"key":"9818_CR101","doi-asserted-by":"crossref","unstructured":"Parasuraman, K., & Deeparani, G. (2014). Reversible image watermarking using interpolation technique. In\u00a02014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)\u00a0(pp. 200\u2013205). IEEE.","DOI":"10.1109\/ICECCE.2014.7086658"},{"key":"9818_CR102","doi-asserted-by":"crossref","unstructured":"Perwej, Y., Parwej, F., & Perwej, A. (2012). An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection. arXiv preprint arXiv:1205.2800.","DOI":"10.5121\/ijma.2012.4202"},{"issue":"3","key":"9818_CR103","doi-asserted-by":"publisher","first-page":"46","DOI":"10.4018\/jaci.2012070104","volume":"4","author":"D Quinn","year":"2012","unstructured":"Quinn, D., Chen, L., & Mulvenna, M. (2012). Social network analysis: A survey. International Journal of Ambient Computing and Intelligence (IJACI), 4(3), 46\u201358.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"key":"9818_CR104","unstructured":"Roy, S. S., Basu, A., Chattopadhyay, A., & Das, T. S. (2020). Implementation of image copyright protection tool using hardware-software co-simulation.\u00a0Multimedia Tools and Applications, 1\u201315."},{"key":"9818_CR105","doi-asserted-by":"crossref","unstructured":"Saberian, M. J., Akhaee, M. A., & Marvasti, F. (2008). An invertible quantization based watermarking approach. In 2008 IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 1677\u20131680). IEEE.","DOI":"10.1109\/ICASSP.2008.4517950"},{"issue":"7","key":"9818_CR106","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H. J., Nam, J., Suresh, S., & Shi, Y. Q. (2009). Reversible watermarking algorithm using sorting and prediction. IEEE Transactions on Circuits and Systems for Video Technology, 19(7), 989\u2013999.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"9818_CR107","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2010\/316820","volume":"2010","author":"V Sachnev","year":"2011","unstructured":"Sachnev, V., Kim, H. J., Suresh, S., & Shi, Y. Q. (2011). Reversible watermarking algorithm with distortion compensation. EURASIP Journal on Advances in Signal Processing, 2010, 1\u201312.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"issue":"20","key":"9818_CR108","doi-asserted-by":"publisher","first-page":"26821","DOI":"10.1007\/s11042-018-5890-z","volume":"77","author":"R Samee","year":"2018","unstructured":"Samee, R., Riaz, M. M., & Ghafoor, A. (2018). Adaptive interpolation and segmentation based reversible image watermarking. Multimedia Tools and Applications, 77(20), 26821\u201326843.","journal-title":"Multimedia Tools and Applications"},{"key":"9818_CR109","doi-asserted-by":"crossref","unstructured":"Sedaaghi, M. H., Daj, R., & Khosravi, M. (2001). Mediated morphological filters. In\u00a0Proceedings 2001 international conference on image processing (Cat. No. 01CH37205)\u00a0(Vol. 3, pp. 692\u2013695). IEEE.","DOI":"10.1109\/ICIP.2001.958213"},{"key":"9818_CR110","doi-asserted-by":"crossref","unstructured":"Sekhar, V. M., & Kumar, C. S. (2019). Laplacian: Reversible data hiding technique. In\u00a02019 Fifth International Conference on Image Information Processing (ICIIP)\u00a0(pp. 546\u2013551). IEEE.","DOI":"10.1109\/ICIIP47207.2019.8985808"},{"key":"9818_CR111","doi-asserted-by":"crossref","unstructured":"Shin, S. Y., Yoo, H. M., Ko, Y. H., Kang, H. S., & Suh, J. W. (2012). Reversible watermarking without underflow and overflow problems. In 2012 IEEE 55th International Midwest Symposium on Circuits and Systems (MWSCAS) (pp. 980\u2013983). IEEE.","DOI":"10.1109\/MWSCAS.2012.6292186"},{"issue":"6","key":"9818_CR112","first-page":"265852","volume":"1","author":"N Singh","year":"2013","unstructured":"Singh, N., Jain, M., & Sharma, S. (2013). A survey of digital watermarking techniques. International Journal of Modern Communication Technologies and Research, 1(6), 265852.","journal-title":"International Journal of Modern Communication Technologies and Research"},{"key":"9818_CR113","doi-asserted-by":"crossref","unstructured":"Singh, O. P., Singh, A. K., Srivastava, G., & Kumar, N. (2020). Image watermarking using soft computing techniques: A comprehensive survey.\u00a0Multimedia Tools and Applications, 1\u201332.","DOI":"10.1007\/s11042-020-09606-x"},{"issue":"1","key":"9818_CR114","first-page":"22","volume":"1","author":"R Srinivasan","year":"2017","unstructured":"Srinivasan, R. (2017). Survey of digital video watermarking techniques and its applications. Engineering Science, 1(1), 22.","journal-title":"Engineering Science"},{"key":"9818_CR115","doi-asserted-by":"crossref","unstructured":"Sunesh, Kishore, R. R., & Saini, A. (2020). Optimized image watermarking with artificial neural networks and histogram shape.\u00a0Journal of Information and Optimization Sciences, 1\u201318.","DOI":"10.1080\/02522667.2020.1802131"},{"issue":"2","key":"9818_CR116","doi-asserted-by":"publisher","first-page":"101","DOI":"10.26555\/ijain.v5i2.351","volume":"5","author":"Z Syahlan","year":"2019","unstructured":"Syahlan, Z., & Ahmad, T. (2019). Reversible data hiding method by extending reduced difference expansion. International Journal of Advances in Intelligent Informatics, 5(2), 101\u2013112.","journal-title":"International Journal of Advances in Intelligent Informatics"},{"issue":"6","key":"9818_CR117","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"WL Tai","year":"2009","unstructured":"Tai, W. L., Yeh, C. M., & Chang, C. C. (2009). Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video Technology, 19(6), 906\u2013910.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"9818_CR118","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.1007\/s11042-019-08219-3","volume":"79","author":"Y Tan","year":"2020","unstructured":"Tan, Y., & Qin, J. (2020). A reversible water marking algorithm for multimedia images using two-dimensional non-causal prediction and ESPVD. Multimedia Tools and Applications, 79(3), 1625\u20131640.","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"9818_CR119","doi-asserted-by":"publisher","first-page":"13905","DOI":"10.1007\/s11042-018-6746-2","volume":"78","author":"R Thanki","year":"2019","unstructured":"Thanki, R., & Borra, S. (2019). Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimedia Tools and Applications, 78(10), 13905\u201313924.","journal-title":"Multimedia Tools and Applications"},{"key":"9818_CR120","doi-asserted-by":"crossref","unstructured":"Thanki, R. M., Borra, S., & Borisagar, K. R. (2018). A hybrid watermarking technique for copyright protection of medical signals in teleradiology. In\u00a0Handbook of research on information security in biomedical signal processing\u00a0(pp. 320\u2013349). IGI Global.","DOI":"10.4018\/978-1-5225-5152-2.ch017"},{"issue":"4","key":"9818_CR121","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1016\/j.jestch.2017.06.001","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki, R., Borra, S., Dwivedi, V., & Borisagar, K. (2017). An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Engineering Science and Technology, an International Journal, 20(4), 1366\u20131379.","journal-title":"Engineering Science and Technology, an International Journal"},{"issue":"9","key":"9818_CR122","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10916-017-0795-3","volume":"41","author":"R Thanki","year":"2017","unstructured":"Thanki, R., Borra, S., Dwivedi, V., & Borisagar, K. (2017). A RONI based visible watermarking approach for medical image authentication. Journal of Medical Systems, 41(9), 143.","journal-title":"Journal of Medical Systems"},{"issue":"8","key":"9818_CR123","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1080\/13682199.2017.1367129","volume":"65","author":"R Thanki","year":"2017","unstructured":"Thanki, R., Borra, S., Dwivedi, V., & Borisagar, K. (2017). A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory. The Imaging Science Journal, 65(8), 457\u2013467.","journal-title":"The Imaging Science Journal"},{"key":"9818_CR124","doi-asserted-by":"crossref","unstructured":"Thanki, R., Borra, S., & Trivedi, D. (2019). Security of biometric and biomedical images using sparse domain based watermarking technique. In Handbook of Multimedia Information Security: Techniques and Applications (pp. 209\u2013232). Cham: Springer.","DOI":"10.1007\/978-3-030-15887-3_9"},{"key":"9818_CR125","doi-asserted-by":"crossref","unstructured":"Thodi, D. M., & Rodr\u00edguez, J. J. (2004). Reversible watermarking by prediction-error expansion. In\u00a06th IEEE Southwest Symposium on Image Analysis and Interpretation, 2004.\u00a0(pp. 21\u201325). IEEE.","DOI":"10.1109\/IAI.2004.1300937"},{"key":"9818_CR126","doi-asserted-by":"crossref","unstructured":"Thodi, D. M., & Rodriguez, J. J. (2004). Prediction-error based reversible watermarking. In\u00a02004 International Conference on Image Processing, 2004. ICIP'04.\u00a0(Vol. 3, pp. 1549\u20131552). IEEE.","DOI":"10.1109\/ICIP.2004.1421361"},{"issue":"3","key":"9818_CR127","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D. M., & Rodr\u00edguez, J. J. (2007). Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing, 16(3), 721\u2013730.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"8","key":"9818_CR128","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 890\u2013896.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"6","key":"9818_CR129","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai, P., Hu, Y. C., & Yeh, H. L. (2009). Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing, 89(6), 1129\u20131143.","journal-title":"Signal Processing"},{"issue":"3","key":"9818_CR130","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1016\/j.dsp.2012.12.014","volume":"23","author":"YY Tsai","year":"2013","unstructured":"Tsai, Y. Y., Tsai, D. S., & Liu, C. L. (2013). Reversible data hiding scheme based on neighboring pixel differences. Digital Signal Processing, 23(3), 919\u2013927.","journal-title":"Digital Signal Processing"},{"key":"9818_CR131","doi-asserted-by":"crossref","unstructured":"Tudoroiu, A., Caciula, I., & Coltuc, D. (2011). Block map implementation of difference expansion reversible watermarking. In\u00a0ISSCS 2011-International Symposium on Signals, Circuits and Systems\u00a0(pp. 1\u20134). IEEE.","DOI":"10.1109\/ISSCS.2011.5978725"},{"issue":"2","key":"9818_CR132","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/e22020198","volume":"22","author":"V Vukoti\u0107","year":"2020","unstructured":"Vukoti\u0107, V., Chappelier, V., & Furon, T. (2020). Are classification deep neural networks good for blind image watermarking? Entropy, 22(2), 198.","journal-title":"Entropy"},{"issue":"9","key":"9818_CR133","doi-asserted-by":"publisher","first-page":"5965","DOI":"10.1007\/s11042-019-08255-z","volume":"79","author":"W Wang","year":"2020","unstructured":"Wang, W. (2020). A reversible data hiding algorithm based on bidirectional difference expansion. Multimedia Tools and Applications, 79(9), 5965\u20135988.","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"9818_CR134","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.dsp.2012.06.015","volume":"23","author":"XT Wang","year":"2013","unstructured":"Wang, X. T., Chang, C. C., Nguyen, T. S., & Li, M. C. (2013). Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Processing, 23(2), 569\u2013577.","journal-title":"Digital Signal Processing"},{"issue":"4","key":"9818_CR135","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/TIFS.2007.908233","volume":"2","author":"X Wang","year":"2007","unstructured":"Wang, X., Wu, J., & Niu, P. (2007). A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Transactions on Information Forensics and security, 2(4), 655\u2013663.","journal-title":"IEEE Transactions on Information Forensics and security"},{"issue":"2","key":"9818_CR136","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.jss.2012.08.029","volume":"86","author":"ZH Wang","year":"2013","unstructured":"Wang, Z. H., Lee, C. F., & Chang, C. Y. (2013). Histogram-shifting-imitated reversible data hiding. Journal of Systems and Software, 86(2), 315\u2013323.","journal-title":"Journal of Systems and Software"},{"issue":"11","key":"9818_CR137","doi-asserted-by":"publisher","first-page":"13173","DOI":"10.1007\/s11042-016-3693-7","volume":"76","author":"S Weng","year":"2017","unstructured":"Weng, S., Pan, J. S., & Zhou, L. (2017). Reversible data hiding based on the local smoothness estimator and optional embedding strategy in four prediction modes. Multimedia Tools and Applications, 76(11), 13173\u201313195.","journal-title":"Multimedia Tools and Applications"},{"key":"9818_CR138","doi-asserted-by":"crossref","unstructured":"Wu, H. T., Huang, J., Zhang, Y., & You, J. (2012). Reversible image watermarking by rhombus prediction and histogram modification. In 2012 International Conference on Audio, Language and Image Processing (pp. 165\u2013169). IEEE.","DOI":"10.1109\/ICALIP.2012.6376605"},{"key":"9818_CR139","doi-asserted-by":"crossref","unstructured":"Wu, H. T., Huang, J., Zhang, Y., & You, J. (2012). Reversible image watermarking by rhombus prediction and histogram modification. In\u00a02012 International Conference on Audio, Language and Image Processing\u00a0(pp. 165\u2013169). IEEE.","DOI":"10.1109\/ICALIP.2012.6376605"},{"issue":"1","key":"9818_CR140","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s13636-017-0101-9","volume":"2017","author":"S Xiang","year":"2017","unstructured":"Xiang, S., & Li, Z. (2017). Reversible audio data hiding algorithm using noncausal prediction of alterable orders. EURASIP Journal on Audio, Speech, and Music Processing, 2017(1), 4.","journal-title":"EURASIP Journal on Audio, Speech, and Music Processing"},{"key":"9818_CR141","doi-asserted-by":"crossref","unstructured":"Xiang, S., Yang, L., & Wang, Y. (2017). Robust and reversible audio watermarking by modifying statistical features in time domain.\u00a0Advances in Multimedia.","DOI":"10.1155\/2017\/8492672"},{"key":"9818_CR142","doi-asserted-by":"crossref","unstructured":"Xiong, X. (2016). A Reversible Data Hiding Scheme Using Image Interpolation. In\u00a0International Conference on Communication and Electronic Information Engineering (CEIE 2016). Atlantis Press.","DOI":"10.2991\/ceie-16.2017.17"},{"key":"9818_CR143","doi-asserted-by":"crossref","unstructured":"Xuan, G., Yang, C., Zhen, Y., Shi, Y. Q., & Ni, Z. (2004). Reversible data hiding using integer wavelet transform and companding technique. In International Workshop on Digital Watermarking (pp. 115\u2013124). Berlin: Springer.","DOI":"10.1007\/978-3-540-31805-7_10"},{"key":"9818_CR144","doi-asserted-by":"crossref","unstructured":"Xuan, G., Yang, C., Zhen, Y., Shi, Y. Q., & Ni, Z. (2004). Reversible data hiding based on wavelet spread spectrum. In IEEE 6th Workshop on Multimedia Signal Processing, 2004. (pp. 211\u2013214). IEEE.","DOI":"10.1109\/MMSP.2004.1436530"},{"key":"9818_CR145","doi-asserted-by":"crossref","unstructured":"Yan, D., & Wang, R. (2008). Reversible data hiding for audio based on prediction error expansion. In\u00a02008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing\u00a0(pp. 249\u2013252). IEEE.","DOI":"10.1109\/IIH-MSP.2008.27"},{"key":"9818_CR146","doi-asserted-by":"crossref","unstructured":"Yang, B., Schmucker, M., Funk, W., Busch, C., & Sun, S. (2004). Integer DCT-based reversible watermarking for images using companding technique. In Security, steganography, and watermarking of multimedia contents VI (Vol. 5306, pp. 405\u2013415). International Society for Optics and Photonics.","DOI":"10.1117\/12.527216"},{"issue":"1","key":"9818_CR147","doi-asserted-by":"publisher","first-page":"87","DOI":"10.4018\/IJACI.2020010105","volume":"11","author":"X Yang","year":"2020","unstructured":"Yang, X., & Jiang, X. (2020). A hybrid active contour model based on new edge-stop functions for image segmentation. International Journal of Ambient Computing and Intelligence (IJACI), 11(1), 87\u201398.","journal-title":"International Journal of Ambient Computing and Intelligence (IJACI)"},{"issue":"1","key":"9818_CR148","doi-asserted-by":"publisher","first-page":"155014771668657","DOI":"10.1177\/1550147716686577","volume":"13","author":"Z Zhang","year":"2017","unstructured":"Zhang, Z., Wu, L., Yan, Y., Xiao, S., & Sun, H. (2017). An improved reversible image watermarking algorithm based on difference expansion. International Journal of Distributed Sensor Networks, 13(1), 1550147716686577.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"9818_CR149","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Zhang, M., & Wang, L. (2020). Reversible image watermarking algorithm based on quadratic difference expansion.\u00a0Mathematical Problems in Engineering.","DOI":"10.1155\/2020\/1806024"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-021-09818-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10772-021-09818-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-021-09818-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,29]],"date-time":"2023-01-29T11:09:06Z","timestamp":1674990546000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10772-021-09818-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,18]]},"references-count":149,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["9818"],"URL":"https:\/\/doi.org\/10.1007\/s10772-021-09818-y","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"type":"print","value":"1381-2416"},{"type":"electronic","value":"1572-8110"}],"subject":[],"published":{"date-parts":[[2021,2,18]]},"assertion":[{"value":"12 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declares that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and animal rights"}}]}}