{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:58:40Z","timestamp":1761663520434,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T00:00:00Z","timestamp":1474848000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 103-2221-E-324 -014 -"],"award-info":[{"award-number":["MOST 103-2221-E-324 -014 -"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11042-016-3960-7","type":"journal-article","created":{"date-parts":[[2016,9,26]],"date-time":"2016-09-26T01:01:52Z","timestamp":1474851712000},"page":"3361-3382","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Multiple predictors hiding scheme using asymmetric histograms"],"prefix":"10.1007","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7305-4622","authenticated-orcid":false,"given":"Tzu-Chuen","family":"Lu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chang-Mu","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mei-Chen","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ying-Hsuan","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,9,26]]},"reference":[{"issue":"10","key":"3960_CR1","doi-asserted-by":"crossref","first-page":"2620","DOI":"10.1016\/j.jss.2013.04.086","volume":"86","author":"X Chen","year":"2013","unstructured":"Chen X, Sun X, Sun H, Zhou Z, Zhang J (2013) Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J Syst Softw 86(10):2620\u20132626","journal-title":"J Syst Softw"},{"issue":"10","key":"3960_CR2","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1016\/j.aeue.2014.04.015","volume":"68","author":"SF De","year":"2014","unstructured":"De SF, Jing ZJ, Zhao SG, Fan J (2014) Reversible data hiding based on prediction-error histogram shifting and EMD mechanism. AEU Int J Electron Commun 68(10):933\u2013943","journal-title":"AEU Int J Electron Commun"},{"issue":"20","key":"3960_CR3","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1587\/elex.5.870","volume":"5","author":"M Fallahpour","year":"2008","unstructured":"Fallahpour M (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electron Express 5(20):870\u2013876","journal-title":"IEICE Electron Express"},{"key":"3960_CR4","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1016\/j.jss.2011.08.033","volume":"85","author":"G Feng","year":"2012","unstructured":"Feng G, Fan L (2012) Reversible data hiding of high payload using local edge sensing prediction. J Syst Softw 85:392\u2013399","journal-title":"J Syst Softw"},{"issue":"2","key":"3960_CR5","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.optcom.2011.09.005","volume":"285","author":"W Hong","year":"2012","unstructured":"Hong W (2012) Adaptive reversible data hiding method based on error energy control and histogram shifting. Opt Commun 285(2):101\u2013108","journal-title":"Opt Commun"},{"issue":"8","key":"3960_CR6","doi-asserted-by":"crossref","first-page":"6712","DOI":"10.1016\/j.eswa.2011.12.019","volume":"39","author":"CF Lee","year":"2012","unstructured":"Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712\u20136719","journal-title":"Expert Syst Appl"},{"key":"3960_CR7","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.sigpro.2014.04.001","volume":"104","author":"TC Lu","year":"2014","unstructured":"Lu TC, Tseng CY, Deng KM (2014) Reversible data hiding using local edge sensing prediction methods and adaptive thresholds. Signal Process 104:152\u2013166","journal-title":"Signal Process"},{"issue":"3","key":"3960_CR8","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"ZC Ni","year":"2006","unstructured":"Ni ZC, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"3960_CR9","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.jvcir.2015.05.005","volume":"31","author":"ZB Pan","year":"2015","unstructured":"Pan ZB, Hu S, Ma XX, Wang LF (2015) Reversible data hiding based on local histogram shifting with multilayer embedding. J Vis Commun Image Represent 31:64\u201374","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"3960_CR10","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"15","key":"3960_CR11","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2014","unstructured":"Qin C, Chang CC, Hsu TJ (2014) Reversible data hiding scheme based on exploiting modification direction with Two steganographic images. Multimedia Tools Appl 74(15):5861\u20135872. doi: 10.1007\/s11042-014-1894-5","journal-title":"Multimedia Tools Appl"},{"issue":"16","key":"3960_CR12","doi-asserted-by":"crossref","first-page":"2166","DOI":"10.1016\/j.patrec.2012.08.004","volume":"33","author":"C Qin","year":"2012","unstructured":"Qin C, Chang CC, Liao LT (2012) An adaptive prediction-error expansion oriented reversible information hiding scheme. Pattern Recogn Lett 33(16):2166\u20132172","journal-title":"Pattern Recogn Lett"},{"issue":"8","key":"3960_CR13","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"3960_CR14","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129\u20131143","journal-title":"Signal Process"},{"issue":"8","key":"3960_CR15","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1109\/83.855427","volume":"9","author":"MJ Weinberger","year":"2004","unstructured":"Weinberger MJ, Seroussi G, Sapiro G (2004) The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. IEEE Trans Image Process 9(8):1309\u20131324","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"3960_CR16","first-page":"244","volume":"14","author":"J Wen","year":"2012","unstructured":"Wen J, Lei J, Wan Y (2012) Reversible data hiding through adaptive prediction and prediction error histogram modification. Int J Fuzzy Syst 14(2):244\u2013256","journal-title":"Int J Fuzzy Syst"},{"issue":"3","key":"3960_CR17","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","volume":"3","author":"CH Yang","year":"2008","unstructured":"Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Inf Forensics Secur 3(3):488\u2013497","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3960_CR18","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118\u2013127","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3960-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3960-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3960-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:40:56Z","timestamp":1498333256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3960-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,26]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["3960"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3960-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,9,26]]}}}