{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:59:37Z","timestamp":1761663577612},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T00:00:00Z","timestamp":1484697600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11042-016-4000-3","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T04:58:28Z","timestamp":1484715508000},"page":"26153-26176","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A novel reversible data hiding scheme by introducing current state codebook and prediction strategy for joint neighboring coding"],"prefix":"10.1007","volume":"76","author":[{"given":"Lingfei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhibin","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Ruoxin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,18]]},"reference":[{"issue":"4","key":"4000_CR1","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1145\/5684.5688","volume":"29","author":"JL Bentley","year":"1986","unstructured":"Bentley JL, Sleator DD, Tarjan RE, Wei VK (1986) A locally adaptive data compression scheme. Commun ACM 29(4):320\u2013330","journal-title":"Commun ACM"},{"issue":"12","key":"4000_CR2","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.1016\/j.jss.2006.03.035","volume":"79","author":"CC Chang","year":"2006","unstructured":"Chang CC, Lu TC (2006) A difference expansion oriented data hiding scheme for restoring the original host images. J Syst Softw 79(12):1754\u20131766","journal-title":"J Syst Softw"},{"issue":"7","key":"4000_CR3","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.patcog.2008.11.040","volume":"42","author":"CC Chang","year":"2009","unstructured":"Chang CC, Kieu TD, Wu WC (2009) A lossless data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597\u20131603","journal-title":"Pattern Recogn"},{"issue":"7","key":"4000_CR4","doi-asserted-by":"crossref","first-page":"1704","DOI":"10.1016\/j.jvcir.2014.06.003","volume":"25","author":"CC Chang","year":"2014","unstructured":"Chang CC, Nguyen TS, Lin CC (2014) Reversible data embedding for indices based on histogram analysis. J Vis Commun Image Represent 25(7):1704\u20131716","journal-title":"J Vis Commun Image Represent"},{"issue":"10","key":"4000_CR5","doi-asserted-by":"crossref","first-page":"2620","DOI":"10.1016\/j.jss.2013.04.086","volume":"86","author":"X Chen","year":"2013","unstructured":"Chen X, Sun X, Sun H, Zhou Z, Zhang J (2013) Reversible watermarking method based on asymmetric-histogram shifting of prediction errors. J Syst Softw 86(10):2620\u20132626","journal-title":"J Syst Softw"},{"issue":"2","key":"4000_CR6","first-page":"185","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Du R (2002) Lossless data embedding-new paradigm in digital watermarking. Spec Issue Emerg Appl Multimed Data Hiding 2002(2):185\u2013196","journal-title":"Spec Issue Emerg Appl Multimed Data Hiding"},{"key":"4000_CR7","doi-asserted-by":"crossref","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications E98.B(1):190\u2013200","DOI":"10.1587\/transcom.E98.B.190"},{"issue":"2","key":"4000_CR8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MASSP.1984.1162229","volume":"1","author":"RM Gray","year":"1984","unstructured":"Gray RM (1984) Vector quantization. IEEE ASSP Mag 1(2):4\u201329","journal-title":"IEEE ASSP Mag"},{"issue":"13","key":"4000_CR9","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1049\/el:20010567","volume":"37","author":"HC Huang","year":"2001","unstructured":"Huang HC, Wang FH, Pang JS (2001) Efficient and robust watermarking algorithm with vector quantization. Electron Lett 37(13):826\u2013828","journal-title":"Electron Lett"},{"issue":"7","key":"4000_CR10","first-page":"1719","volume":"E-85A","author":"HC Huang","year":"2002","unstructured":"Huang HC, Wang FH, Pan JS (2002) A VQ-based robust multi-watermarking algorithm. IEICE Trans Fundam E-85A(7):1719\u20131726","journal-title":"IEICE Trans Fundam"},{"issue":"2","key":"4000_CR11","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1016\/j.eswa.2014.09.001","volume":"42","author":"TD Kieu","year":"2015","unstructured":"Kieu TD, Ramroach S (2015) A reversible steganographic scheme for VQ indices based on joint neighboring coding. Expert Syst Appl 42(2):713\u2013722","journal-title":"Expert Syst Appl"},{"issue":"2","key":"4000_CR12","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/83.136594","volume":"1","author":"T Kim","year":"1992","unstructured":"Kim T (1992) Side match and overlap match vector quantizers for Images. IEEE Trans Image Process 1(2):170\u2013185","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"4000_CR13","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1109\/TIFS.2010.2066971","volume":"5","author":"JD Lee","year":"2010","unstructured":"Lee JD, Chiou YH, Guo JM (2010) Reversible data hiding based on histogram modification of SMVQ indices. IEEE Trans Inf Forensics Secur 5(4):638\u2013648","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"4000_CR14","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285\u2013287","journal-title":"IEEE Signal Process Lett"},{"issue":"3","key":"4000_CR15","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin C (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969\u2013978","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"4000_CR16","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Huang YH, Liao LT (2013a) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"9","key":"4000_CR17","doi-asserted-by":"crossref","first-page":"2687","DOI":"10.1016\/j.sigpro.2013.03.036","volume":"93","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Chen YC (2013b) Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process 93(9):2687\u20132695","journal-title":"Signal Process"},{"issue":"6","key":"4000_CR18","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1002\/sec.1046","volume":"8","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Horng G, Huang YH, Chen YC (2015a) Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Secur Commun Netw 8(6):899\u2013906","journal-title":"Secur Commun Netw"},{"issue":"15","key":"4000_CR19","doi-asserted-by":"crossref","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Hsu TJ (2015b) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861\u20135872","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"4000_CR20","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1049\/iet-ipr.2012.0521","volume":"7","author":"SY Wang","year":"2013","unstructured":"Wang SY (2013) Reversible data hiding based on two-dimensional prediction errors. IET Image Process 7(9):805\u2013816","journal-title":"IET Image Process"},{"issue":"9","key":"4000_CR21","doi-asserted-by":"crossref","first-page":"3332","DOI":"10.1016\/j.ins.2009.05.021","volume":"179","author":"J Wang","year":"2009","unstructured":"Wang J, Lu Z (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf Sci 179(9):3332\u20133348","journal-title":"Inf Sci"},{"key":"4000_CR22","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.ins.2013.05.007","volume":"246","author":"WJ Wang","year":"2013","unstructured":"Wang WJ, Huang CT, Liu CM, Su PC, Wang SJ (2013) Data embedding for vector quantization image processing on the basis of adjoining state codebook mapping. Inf Sci 246:69\u201382","journal-title":"Inf Sci"},{"issue":"2","key":"4000_CR23","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.jvcir.2013.12.004","volume":"25","author":"L Wang","year":"2014","unstructured":"Wang L, Pan Z, Ma X, Hu S (2014) A novel high-performance reversible data hiding scheme using SMVQ and improved locally adaptive coding method. J Vis Commun Image Represent 25(2):454\u2013465","journal-title":"J Vis Commun Image Represent"},{"issue":"8","key":"4000_CR24","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1109\/83.855427","volume":"9","author":"MJ Weinberger","year":"2000","unstructured":"Weinberger MJ, Seroussi G, Sapiro G (2000) The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. IEEE Trans Image Process 9(8):1309\u20131324","journal-title":"IEEE Trans Image Process"},{"key":"4000_CR25","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1353-4858(01)01018-2","volume":"10","author":"MA Wright","year":"2001","unstructured":"Wright MA (2001) The advanced encryption standard. Netw Secur 10:11\u201313","journal-title":"Netw Secur"},{"key":"4000_CR26","doi-asserted-by":"crossref","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340\u2013352","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"4000_CR27","unstructured":"Yang B, Lu ZM, Sun SH (2005) Reversible watermarking in the VQ-compressed domain. Proc Fifth IASTED Int Conf Visualization, Imag, Image Process, Benidorm, Spain: 298\u2013303"},{"issue":"11","key":"4000_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LCOMM.2006.253292","volume":"10","author":"XP Zhang","year":"2006","unstructured":"Zhang XP, Wang SZ (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):1\u20133","journal-title":"IEEE Commun Lett"},{"issue":"7","key":"4000_CR29","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1016\/j.optlastec.2006.11.002","volume":"39","author":"X Zhou","year":"2007","unstructured":"Zhou X, Lai D, Yuan S, Li DH, Hu JP (2007) A method for hiding information utilizing double-random phase-encoding technique. Opt Laser Technol 39(7):1360\u20131363","journal-title":"Opt Laser Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-4000-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4000-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4000-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T11:00:14Z","timestamp":1512730814000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-4000-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,18]]},"references-count":29,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["4000"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-4000-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,18]]}}}