{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T08:01:24Z","timestamp":1769760084473,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T00:00:00Z","timestamp":1461024000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300109"],"award-info":[{"award-number":["61300109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562007"],"award-info":[{"award-number":["61562007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Project of the Guangxi Experiment Center of Information Science","award":["20130204"],"award-info":[{"award-number":["20130204"]}]},{"name":"Guangxi Key Laboratory of Trusted Software","award":["kx201327"],"award-info":[{"award-number":["kx201327"]}]},{"name":"Scientific and Technological Research Projects of Guangxi Education Administration","award":["YB2014048"],"award-info":[{"award-number":["YB2014048"]}]},{"name":"Project of the Guangxi Key Lab of Multi-source Information Mining & Security","award":["13-A-03-01"],"award-info":[{"award-number":["13-A-03-01"]}]},{"name":"Project of the Guangxi Key Lab of Multi-source Information Mining & Security","award":["14-A-02-02"],"award-info":[{"award-number":["14-A-02-02"]}]},{"name":"Guangxi \u201cBagui Scholar\u201d Teams for Innovation and Research"},{"DOI":"10.13039\/501100004607","name":"Guangxi Natural Science Foundation","doi-asserted-by":"crossref","award":["2015GXNSFDA139040"],"award-info":[{"award-number":["2015GXNSFDA139040"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s11042-016-3521-0","type":"journal-article","created":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T02:59:29Z","timestamp":1461034769000},"page":"9195-9218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":83,"title":["High capacity data hiding based on interpolated image"],"prefix":"10.1007","volume":"76","author":[{"given":"Xianquan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zerui","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zhenjun","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Chunqiang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xiaoyun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,19]]},"reference":[{"issue":"8","key":"3521_CR1","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"3521_CR2","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"key":"3521_CR3","doi-asserted-by":"crossref","unstructured":"Chang CC, Tai WL, Chen KN (2008) Lossless data hiding based on histogram modification for image authentication. IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing (EUC\u201908), 1: 506\u2013511","DOI":"10.1109\/EUC.2008.20"},{"issue":"7","key":"3521_CR4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1587\/elex.4.205","volume":"4","author":"M Fallahpour","year":"2007","unstructured":"Fallahpour M, Sedaaghi MH (2007) High capacity lossless data hiding based on histogram modification. IEICE Electron Expr 4(7):205\u2013210","journal-title":"IEICE Electron Expr"},{"issue":"2","key":"3521_CR5","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1155\/S1110865702000537","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Du R (2002) Lossless data embedding\u2014new paradigm in digital watermarking. EURASIP J Adv Signal Process 2002(2):185\u2013196","journal-title":"EURASIP J Adv Signal Process"},{"key":"3521_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2002) Lossless data embedding for all image formats. Electronic Imaging 2002. International Society for Optics and Photonics, pp 572\u2013583","DOI":"10.1117\/12.465317"},{"issue":"2","key":"3521_CR7","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.jvcir.2010.11.004","volume":"22","author":"W Hong","year":"2011","unstructured":"Hong W, Chen TS (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22(2):131\u2013140","journal-title":"J Vis Commun Image Represent"},{"key":"3521_CR8","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.compeleceng.2015.04.014","volume":"46","author":"J Hu","year":"2015","unstructured":"Hu J, Li TR (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447\u2013455","journal-title":"Comput Electr Eng"},{"key":"3521_CR9","unstructured":"Image Databases. [Online] Available: http:\/\/www.imageprocessingplace.com\/root_files_V3\/image_databases.htm"},{"issue":"2","key":"3521_CR10","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","volume":"31","author":"KH Jung","year":"2009","unstructured":"Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Computer Stand Interfaces 31(2):465\u2013470","journal-title":"Computer Stand Interfaces"},{"issue":"6","key":"3521_CR11","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1007\/s11042-013-1832-y","volume":"74","author":"KH Jung","year":"2015","unstructured":"Jung KH, Yoo KY (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimedia Tools Appl 74(6):2143\u20132155","journal-title":"Multimedia Tools Appl"},{"issue":"8","key":"3521_CR12","doi-asserted-by":"crossref","first-page":"6712","DOI":"10.1016\/j.eswa.2011.12.019","volume":"39","author":"CF Lee","year":"2012","unstructured":"Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712\u20136719","journal-title":"Expert Syst Appl"},{"issue":"6","key":"3521_CR13","doi-asserted-by":"crossref","first-page":"2097","DOI":"10.1016\/j.patcog.2007.11.018","volume":"41","author":"CC Lee","year":"2008","unstructured":"Lee CC, Wu HC, Tsai CS, Chu YP (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recogn 41(6):2097\u20132106","journal-title":"Pattern Recogn"},{"issue":"2-3","key":"3521_CR14","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s11042-010-0496-0","volume":"52","author":"YC Liu","year":"2011","unstructured":"Liu YC, Wu HC, Yu SS (2011) Adaptive DE-based reversible steganographic technique using bilinear interpolation and simplified location map. Multimedia Tools Appl 52(2-3):263\u2013276","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"3521_CR15","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M et al (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187\u2013193","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"3521_CR16","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"3521_CR17","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):989\u2013999","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"6","key":"3521_CR18","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"WL Tai","year":"2009","unstructured":"Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19(6):906\u2013910","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"3521_CR19","unstructured":"The SSIM Index for Image Quality Assessment. [Online] Available: http:\/\/www.cns.nyu.edu\/~lcv\/ssim\/"},{"issue":"8","key":"3521_CR20","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"8","key":"3521_CR21","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1016\/j.imavis.2007.12.005","volume":"26","author":"HW Tseng","year":"2008","unstructured":"Tseng HW, Chang CC (2008) An extended difference expansion algorithm for reversible watermarking. Image Vis Comput 26(8):1148\u20131153","journal-title":"Image Vis Comput"},{"key":"3521_CR22","unstructured":"USC-SIPI Image Database. [Online] Available: http:\/\/sipi.usc.edu\/database\/"},{"issue":"4","key":"3521_CR23","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"3521_CR24","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1016\/j.dsp.2012.06.015","volume":"23","author":"XT Wang","year":"2013","unstructured":"Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Process 23(2):569\u2013577","journal-title":"Digital Signal Process"},{"key":"3521_CR25","unstructured":"Wang WJ, Zhang YH, Huang CT, Wang SJ (2013) Steganography of data embedding in multimedia images using interpolation and histogram shiftin., 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp 387\u2013390"},{"issue":"7","key":"3521_CR26","doi-asserted-by":"crossref","first-page":"1691","DOI":"10.1016\/j.sigpro.2012.01.004","volume":"92","author":"X Zhang","year":"2012","unstructured":"Zhang X, Liang T, Tang Z, Dai X (2012) Restoration of embedded image from corrupted stego image. Signal Process 92(7):1691\u20131698","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3521-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3521-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3521-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3521-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T16:56:33Z","timestamp":1567788993000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3521-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,19]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["3521"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3521-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,19]]}}}