{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:01:51Z","timestamp":1766066511994},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2015,8,11]],"date-time":"2015-08-11T00:00:00Z","timestamp":1439251200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11042-015-2825-9","type":"journal-article","created":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T04:35:22Z","timestamp":1439181322000},"page":"13679-13704","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Block-based reversible data hiding with multi-round estimation and difference alteration"],"prefix":"10.1007","volume":"75","author":[{"given":"Yueh-Hong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hsiang-Cheh","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Chuan-Chang","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,11]]},"reference":[{"issue":"8","key":"2825_CR1","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"2825_CR2","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s00521-014-1615-z","volume":"26","author":"YH Chen","year":"2015","unstructured":"Chen YH, Huang HC (2015) Coevolutionary genetic watermarking for owner identification. Neural Comput & Applic 26(2):291\u2013298","journal-title":"Neural Comput & Applic"},{"issue":"3","key":"2825_CR3","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.jss.2010.11.891","volume":"84","author":"CC Chen","year":"2011","unstructured":"Chen CC, Tsai YH (2011) Adaptive reversible image watermarking scheme. J Syst Softw 84(3):428\u2013434","journal-title":"J Syst Softw"},{"issue":"2\u20133","key":"2825_CR4","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s11042-010-0486-2","volume":"52","author":"M Fallahpour","year":"2011","unstructured":"Fallahpour M, Megias D, Ghanbari M (2011) Subjectively adapted high capacity lossless image data hiding based on prediction errors. Multimed Tools Appl 52(2\u20133):513\u2013527","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"2825_CR5","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s11042-012-1047-7","volume":"67","author":"FH Hsu","year":"2013","unstructured":"Hsu FH, Wu MH, Wang SJ (2013) Reversible data hiding using side-match predictions on steganographic images. Multimed Tools Appl 67(3):571\u2013591","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"2825_CR6","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.eswa.2012.07.010","volume":"40","author":"HC Huang","year":"2013","unstructured":"Huang HC, Chang FC (2013) Hierarchy-based reversible data hiding. Expert Syst Appl 40(1):34\u201343","journal-title":"Expert Syst Appl"},{"issue":"8B","key":"2825_CR7","first-page":"6069","volume":"16","author":"HC Huang","year":"2013","unstructured":"Huang HC, Chen YH, Chang FC, Li SH (2013) Multi-level reversible data hiding with prediction-based approach. Information 16(8B):6069\u20136078","journal-title":"Information"},{"issue":"3\u20134","key":"2825_CR8","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11235-009-9262-x","volume":"44","author":"HC Huang","year":"2010","unstructured":"Huang HC, Fang WC (2010) Techniques and applications of intelligent multimedia data hiding. Telecommun Syst 44(3\u20134):241\u2013251","journal-title":"Telecommun Syst"},{"issue":"4","key":"2825_CR9","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1016\/j.simpat.2009.09.004","volume":"18","author":"HC Huang","year":"2010","unstructured":"Huang HC, Fang WC (2010) Metadata-based image watermarking for copyright protection. Simul Model Pract Theory 18(4):436\u2013445","journal-title":"Simul Model Pract Theory"},{"issue":"10","key":"2825_CR10","doi-asserted-by":"crossref","first-page":"9717","DOI":"10.3390\/s111009717","volume":"11","author":"HC Huang","year":"2011","unstructured":"Huang HC, Fang WC (2011) Authenticity preservation with histogram-based reversible data hiding and quadtree concepts. Sensors (Basel) 11(10):9717\u20139731","journal-title":"Sensors (Basel)"},{"key":"2825_CR11","doi-asserted-by":"crossref","unstructured":"Huang HC, Lin CC, Chang FC (2013) Prediction-based reversible data hiding with content characteristics. Intelligent Information Hiding and Multimedia Signal Processing, IEEE, Beijing, China, pp 13\u201316","DOI":"10.1109\/IIH-MSP.2013.12"},{"issue":"3","key":"2825_CR12","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"HJ Kim","year":"2008","unstructured":"Kim HJ, Sachnev V, Shi YQ, Nam J, Choo HG (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3(3):456\u2013465","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"2825_CR13","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.1016\/j.jss.2010.05.078","volume":"83","author":"CF Lee","year":"2010","unstructured":"Lee CF, Chen HL, Tso HK (2010) Embedding capacity raising in reversible data hiding based on prediction of different expansion. J Syst Softw 83(10):1864\u20131872","journal-title":"J Syst Softw"},{"issue":"1","key":"2825_CR14","first-page":"1","volume":"6","author":"CF Lee","year":"2015","unstructured":"Lee CF, Chang CC, Pai PY, Liu CM (2015) An adjustable and reversible data hiding method based on multiple-base notational system without location map. J Inf Hiding Multimed Signal Process 6(1):1\u201328","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"6","key":"2825_CR15","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22(6):2181\u20132191","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"2825_CR16","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"X Li","year":"2013","unstructured":"Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensics Secur 8(7):1091\u20131100","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"2825_CR17","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11042-013-1369-0","volume":"72","author":"TC Lu","year":"2014","unstructured":"Lu TC, Chang CC, Huang YH (2014) High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimed Tools Appl 72(1):417\u2013435","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"2825_CR18","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s11760-012-0306-4","volume":"8","author":"H Luo","year":"2014","unstructured":"Luo H, Yu FX, Huang ZL, Chen H, Lu ZM (2014) Reversible data hiding based on hybrid prediction and interleaving histogram modification with single seed pixel recovery. SIViP 8(5):813\u2013818","journal-title":"SIViP"},{"issue":"3","key":"2825_CR19","first-page":"451","volume":"5","author":"J Marin","year":"2014","unstructured":"Marin J, Shih FY (2014) Reversible data hiding techniques using multiple scanning difference value histogram modification. J Inf Hiding Multimed Signal Process 5(3):451\u2013460","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"2","key":"2825_CR20","first-page":"117","volume":"5","author":"T Mihara","year":"2014","unstructured":"Mihara T (2014) A new framework of steganography using the content of cover data. J Inf Hiding Multimed Signal Process 5(2):117\u2013123","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"3","key":"2825_CR21","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"12","key":"2825_CR22","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010\u20135021","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"2825_CR23","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1016\/j.sigpro.2011.11.013","volume":"92","author":"C Qin","year":"2012","unstructured":"Qin C, Chang CC, Chen PY (2012) Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process 92(4):1137\u20131150","journal-title":"Signal Process"},{"issue":"7","key":"2825_CR24","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"9","key":"2825_CR25","doi-asserted-by":"crossref","first-page":"2687","DOI":"10.1016\/j.sigpro.2013.03.036","volume":"93","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Chen YC (2013) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687\u20132695","journal-title":"Signal Process"},{"issue":"1","key":"2825_CR26","doi-asserted-by":"crossref","first-page":"59","DOI":"10.3233\/FI-2012-749","volume":"120","author":"C Qin","year":"2012","unstructured":"Qin C, Wang ZH, Chang CC, Chen KN (2012) Reversible data hiding scheme based on image inpainting. Fundam Inform 120(1):59\u201370","journal-title":"Fundam Inform"},{"issue":"6","key":"2825_CR27","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"WL Tai","year":"2009","unstructured":"Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19(6):906\u2013910","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2825_CR28","unstructured":"The Cancer Imaging Archive (2015) URL: www.cancerimagingarchive.net"},{"issue":"8","key":"2825_CR29","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2825-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2825-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2825-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2825-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T01:07:47Z","timestamp":1599440867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2825-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,11]]},"references-count":29,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["2825"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2825-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,11]]}}}