{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T20:38:42Z","timestamp":1648845522139},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2011,7,5]],"date-time":"2011-07-05T00:00:00Z","timestamp":1309824000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s11042-011-0838-6","type":"journal-article","created":{"date-parts":[[2011,7,4]],"date-time":"2011-07-04T17:34:21Z","timestamp":1309800861000},"page":"299-319","source":"Crossref","is-referenced-by-count":9,"title":["High-capacity reversible data hiding based on multi-histogram modification"],"prefix":"10.1007","volume":"61","author":[{"given":"Cheng-Tzu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hsiang-Fu","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,5]]},"reference":[{"issue":"8","key":"838_CR1","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"838_CR2","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"4","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 4(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"issue":"10","key":"838_CR3","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1109\/TCSVT.2006.882380","volume":"16","author":"C-C Chang","year":"2006","unstructured":"Chang C-C, Tai W-L, Lin C-C (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10):1301\u20131308","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"838_CR4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1587\/elex.4.205","volume":"4","author":"M Fallahpour","year":"2007","unstructured":"Fallahpour M, Sedaaghi MH (2007) High capacity lossless data hiding based on histogram modification. IEICE Electron Expr 4(7):205\u2013210","journal-title":"IEICE Electron Expr"},{"key":"838_CR5","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Distortion-free data embedding. in Proceedings of the 4th Information Hiding Workshop, Lecture Notes in Computer Science, vol. 2137, pp. 27\u201341, New York","DOI":"10.1007\/3-540-45496-9_3"},{"key":"838_CR6","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1155\/S1110865702000537","volume":"2","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Du R (2002) Lossless data embedding\u2013\u2013new paradigm in digital watermarking. EURASIP J Appl Sig P 2:185\u2013196","journal-title":"EURASIP J Appl Sig P"},{"key":"838_CR7","unstructured":"Horowitz E, Sahni S, Mehta DP (2007) Fundamentals of data structures in C++, 2ed, Silicon Press"},{"key":"838_CR8","unstructured":"http:\/\/bzip.org\/"},{"issue":"8","key":"838_CR9","doi-asserted-by":"crossref","first-page":"1500","DOI":"10.1109\/TMM.2008.2007341","volume":"10","author":"Y Hu","year":"2008","unstructured":"Hu Y, Lee H-K, Chen K, Li J (2008) Difference expansion based reversible data hiding using two embedding directions. IEEE Trans Multimedia 10(8):1500\u20131512","journal-title":"IEEE Trans Multimedia"},{"issue":"2","key":"838_CR10","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Hu Y, Lee H-K, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250\u2013260","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"838_CR11","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Security 2(3):321\u2013330","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"838_CR12","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.1016\/j.patcog.2007.09.005","volume":"41","author":"C-C Lin","year":"2008","unstructured":"Lin C-C, Hsueh N-L (2008) A lossless data hiding scheme based on three-pixel block differences. Pattern Recogn 41:1415\u20131425","journal-title":"Pattern Recogn"},{"key":"838_CR13","doi-asserted-by":"crossref","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"C-C Lin","year":"2008","unstructured":"Lin C-C, Tai W-L, Chang C-C (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41:3582\u20133591","journal-title":"Pattern Recogn"},{"issue":"3","key":"838_CR14","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"838_CR15","doi-asserted-by":"crossref","unstructured":"Niels P, Honeyman P (2003) Hide and Seek: An Introduction to Steganography. IEEE Security and Privacy 1(3):32\u201344","DOI":"10.1109\/MSECP.2003.1203220"},{"issue":"6","key":"838_CR16","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"W-L Tai","year":"2009","unstructured":"Tai W-L, Yeh C-M, Chang C-C (2009) Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Trans Circuits Syst Video Technol 19(6):906\u2013910","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"838_CR17","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721\u2013730","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"838_CR18","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible watermarking using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"838_CR19","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1049\/iet-ipr.2007.0220","volume":"3","author":"P Tsai","year":"2009","unstructured":"Tsai P (2009) Histogram-based reversible data hiding for vector quantisation-compressed images. IET Image Process 3(2):100\u2013114","journal-title":"IET Image Process"},{"key":"838_CR20","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai P, Hu Y-C, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 89:1129\u20131143","journal-title":"Signal Processing"},{"key":"838_CR21","unstructured":"USC-SIPI image database\/miscellaneous, http:\/\/sipi.usc.edu\/database\/database.cgi?volume=misc"},{"issue":"11","key":"838_CR22","doi-asserted-by":"crossref","first-page":"2073","DOI":"10.1016\/j.jss.2010.06.007","volume":"83","author":"Z-H Wang","year":"2010","unstructured":"Wang Z-H, Chang C-C, Chen K-N, Li M-C (2010) An encoding method for both image compression and data lossless information hiding. J Syst Software 83(11):2073\u20132082","journal-title":"J Syst Software"},{"issue":"3","key":"838_CR23","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1109\/TIFS.2007.902677","volume":"2","author":"XT Wang","year":"2007","unstructured":"Wang XT, Shao CY, Xu XG, Niu XM (2007) Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Trans Inf Forensics Security 2(3):311\u2013320","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"838_CR24","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/LSP.2008.2001984","volume":"15","author":"S Weng","year":"2008","unstructured":"Weng S, Zhao Y, Pan J-S, Ni R (2008) Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Process Lett 15:721\u2013724","journal-title":"IEEE Signal Process Lett"},{"issue":"6","key":"838_CR25","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TIP.2003.810588","volume":"12","author":"M Wu","year":"2003","unstructured":"Wu M, Lin B (2003) Data hiding in image and video: part I \u2013 fundamental issues and solutions. IEEE Trans Image Process 12(6):685\u2013695","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"838_CR26","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1109\/TIP.2003.810589","volume":"12","author":"M Wu","year":"2003","unstructured":"Wu M, Yu H, Liu B (2003) Data hiding in image and video: part II \u2013 designs and applications. IEEE Trans Image Process 12(6):696\u2013705","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0838-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-011-0838-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0838-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T18:29:11Z","timestamp":1560364151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-011-0838-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,5]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["838"],"URL":"https:\/\/doi.org\/10.1007\/s11042-011-0838-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,5]]}}}