{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,28]],"date-time":"2024-04-28T16:29:50Z","timestamp":1714321790969},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T00:00:00Z","timestamp":1400198400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s11042-014-2016-0","type":"journal-article","created":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T07:29:53Z","timestamp":1400138993000},"page":"707-728","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["A novel data hiding for color images based on pixel value difference and modulus function"],"prefix":"10.1007","volume":"74","author":[{"given":"Shuyuan","family":"Shen","sequence":"first","affiliation":[]},{"given":"Lihong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qinglong","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,16]]},"reference":[{"issue":"3","key":"2016_CR1","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recog 37(3):469\u2013474","journal-title":"Pattern Recog"},{"key":"2016_CR2","unstructured":"Chang CC , Tseng HW (2004) A steganographic method for digital images using side match. Pattern Recognit Lett 251431\u20131437"},{"key":"2016_CR3","unstructured":"Chang KC, Huang PS, Tu TM, Chang CP (2007) Adaptive image stegannographic scheme based on tri-way pixel-value differencing. ISIC IEEE internation conference, pp 1165\u20131170"},{"key":"2016_CR4","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1016\/j.patcog.2007.12.009","volume":"41","author":"CC Chang","year":"2008","unstructured":"Chang CC, Lin CY, Fan YH (2008) Lossless data hiding for color images based on block truncation coding. Pattern Recognit 41:2347\u20132357","journal-title":"Pattern Recognit"},{"key":"2016_CR5","doi-asserted-by":"crossref","unstructured":"Chang CC, Chen YH, Lin CC (2009) A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput 321\u2013331","DOI":"10.1007\/s00500-008-0332-x"},{"key":"2016_CR6","first-page":"1646","volume":"2","author":"MU Celik","year":"2002","unstructured":"Celik MU, Sharman G, Tekalp AM, Saber E (2002) Reversible data hiding. IEEE Int Conf Image Process 2:1646\u20131648","journal-title":"IEEE Int Conf Image Process"},{"key":"2016_CR7","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. Proc ACM Work Multimed Secur 27\u201330","DOI":"10.1145\/1232454.1232466"},{"key":"2016_CR8","doi-asserted-by":"crossref","unstructured":"Goljan M, Fredrich J, Du R (2001) Distortion-free data embedding. Proceedings of 4th Infor, mation Hiding Work 27\u201341","DOI":"10.1007\/3-540-45496-9_3"},{"key":"2016_CR9","doi-asserted-by":"crossref","unstructured":"Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Comput Satandarda Interfaces 31(2):465\u2013470(2)","DOI":"10.1016\/j.csi.2008.06.001"},{"key":"2016_CR10","doi-asserted-by":"crossref","unstructured":"Jung KH, Ha KJ, Yoo KY (2008) Image data hiding method based on multi-pixel differencing and LSB substitution methods. Int Conf Converg Hybrid Inf Technol 355\u2013358","DOI":"10.1109\/ICHIT.2008.279"},{"issue":"3","key":"2016_CR11","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1049\/ip-vis:20000341","volume":"147","author":"YK Lee","year":"2000","unstructured":"Lee YK, Chen LH (2000) High capacity image steganography model. Proc Inst Elect Eng Vis Image Sig Process 147(3):288\u2013294","journal-title":"Proc Inst Elect Eng Vis Image Sig Process"},{"issue":"11","key":"2016_CR12","doi-asserted-by":"crossref","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"TY Lee","year":"2008","unstructured":"Lee TY, Shinfeng DL (2008) Dual watermark for image tamper detection and recovery. Pattern Recog 41(11):3497\u20133506","journal-title":"Pattern Recog"},{"key":"2016_CR13","unstructured":"Li SL, Leung LC, Chan CK (2006) Performance evaluation of a steganographic method for digital imaes using side match, icicic, IS16-004"},{"key":"2016_CR14","doi-asserted-by":"crossref","unstructured":"Liaw JJ, Wang WS, Chiu MY (2010) A data hiding method using secret data division and pixel value differencing. Proceedings ICGE\u201910 Proc 2010 Fourth INt Conf Genet Evol Comput 650\u2013653","DOI":"10.1109\/ICGEC.2010.166"},{"key":"2016_CR15","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1142\/S0218001402001903","volume":"16","author":"MH Lin","year":"2002","unstructured":"Lin MH, Hu YC, Chang CC (2002) Both color and gray scale secret images hiding in a color image. Int J Pattern Recog Artif Intell 16:697\u2013713","journal-title":"Int J Pattern Recog Artif Intell"},{"issue":"5","key":"2016_CR16","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TMM.2008.922795","volume":"10","author":"WH Lin","year":"2008","unstructured":"Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746\u2013757","journal-title":"IEEE Trans Multimed"},{"issue":"6","key":"2016_CR17","doi-asserted-by":"crossref","first-page":"9869","DOI":"10.1016\/j.eswa.2009.02.036","volume":"36","author":"Wg Lin","year":"2009","unstructured":"Lin Wg, Wang YR, Horng SJ (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36(6):9869\u20139878","journal-title":"Expert Syst Appl"},{"key":"2016_CR18","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.1109\/ICOSP.2002.1180096","volume":"2","author":"T Liu","year":"2002","unstructured":"Liu T, Qiu ZD (2002) A DWT-based color image steganography scheme. Proc Int Conf Signal Proc 2:1568\u20131571","journal-title":"Proc Int Conf Signal Proc"},{"issue":"2","key":"2016_CR19","first-page":"135","volume":"3","author":"K Loukhaoukha","year":"2012","unstructured":"Loukhaoukha K (2012) On the security of digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. J Inf Hiding Multimed Sig Process 3(2):135\u2013141","journal-title":"J Inf Hiding Multimed Sig Process"},{"issue":"4","key":"2016_CR20","first-page":"83","volume":"2","author":"JK Mandal","year":"2012","unstructured":"Mandal JK, Das D (2012) Colour image steganography based on pixel value differencing in spatial domain. Int J Inf Sci Tech 2(4):83\u201390","journal-title":"Int J Inf Sci Tech"},{"key":"2016_CR21","first-page":"460","volume-title":"Color image embedding using multidimensional lattice structures","author":"D Mukherjee","year":"1998","unstructured":"Mukherjee D, Manjunath BS (1998) Color image embedding using multidimensional lattice structures. Proceedings of IEEE International Conference on Image Processing, Chicago, Illinois, USA, pp 460\u2013464"},{"key":"2016_CR22","first-page":"598","volume":"1","author":"R Ni","year":"2002","unstructured":"Ni R, Ruan Q (2002) Embedding information into color images using wavelet. Proc IEEE Int Conf Comput Commun Control Power Eng 1:598\u2013601","journal-title":"Proc IEEE Int Conf Comput Commun Control Power Eng"},{"key":"2016_CR23","doi-asserted-by":"crossref","unstructured":"Petitcolas1 FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062\u20131078","DOI":"10.1109\/5.771065"},{"issue":"3","key":"2016_CR24","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MMUL.2011.41","volume":"19","author":"DD Rosiyadi","year":"2012","unstructured":"Rosiyadi DD, Horng SJ, Fan PZ, Wang X, Khan MK, Pan Yi (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimedia 19(3):62\u201373","journal-title":"IEEE Multimedia"},{"issue":"3","key":"2016_CR25","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","volume":"37","author":"CS Shieh","year":"2004","unstructured":"Shieh CS, Huang HC, Wang FH, Pan JS (2004) Genetic watermarking based on transform-domain techniques. Pattern Recog 37(3):555\u2013565","journal-title":"Pattern Recog"},{"issue":"6","key":"2016_CR26","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"WL Tai","year":"2009","unstructured":"Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circ Syst Video Technol 19(6):906\u2013910","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"8","key":"2016_CR27","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data hiding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"2016_CR28","doi-asserted-by":"crossref","unstructured":"Wang Z, Bovik AC (2002) A universal image quality index. IEEE Sig Process Lett 9(3):81\u201384","DOI":"10.1109\/97.995823"},{"issue":"2","key":"2016_CR29","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"RZ Wang","year":"2001","unstructured":"Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recog 34(2):671\u2013683","journal-title":"Pattern Recog"},{"issue":"25","key":"2016_CR30","doi-asserted-by":"crossref","first-page":"2069","DOI":"10.1049\/el:20001429","volume":"36","author":"RZ Wang","year":"2006","unstructured":"Wang RZ, Lin CF, Lin JC (2006) Hiding data in images by optimal moderately significant-bit replacement. IEE Electron Lett 36(25):2069\u20132070","journal-title":"IEE Electron Lett"},{"issue":"9\u201310","key":"2016_CR31","first-page":"1613","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recognit Lett 24(9\u201310):1613\u20131626","journal-title":"Pattern Recognit Lett"},{"issue":"5","key":"2016_CR32","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1049\/ip-vis:20059022","volume":"152","author":"HC Wu","year":"2005","unstructured":"Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixelvalue differencing and LSB replacement methods. IEE Proc Vision Image Sig Process 152(5):611\u2013615","journal-title":"IEE Proc Vision Image Sig Process"},{"key":"2016_CR33","unstructured":"Xuan G, Yang C, Zhen Y, Shi YQ, Ni Z (2004) Reversible data hiding based on wavelet spread spectrum. IEEE 6th Work Multimed Sig Process 211\u2013214"},{"key":"2016_CR34","doi-asserted-by":"crossref","unstructured":"Yalman Y, Akar F, Erturk I (2010) An image interpolation based reversible data hiding method using r-weighted coding. 13th IEEE Int Conf Comput Sci Eng 346\u2013350","DOI":"10.1109\/CSE.2010.52"},{"key":"2016_CR35","unstructured":"Yang CH, Weng CY (2006) A steganographic method for digital images by multi-pixel differencing. Proceedings of international computer symposium, Taipei, Taiwan, R.O.C., pp 831\u2013836"},{"key":"2016_CR36","unstructured":"Zhang X P, Wang S Z (2004) Vulnerability of pixel-value differencing steganography to histogram analyais and modification for enhanced security. Pattern Recogn Lett 331\u2013339"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2016-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2016-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2016-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T13:32:13Z","timestamp":1565443933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2016-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,16]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["2016"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2016-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,16]]}}}