{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:39:36Z","timestamp":1766579976785,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T00:00:00Z","timestamp":1477872000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11042-016-4032-8","type":"journal-article","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T02:29:49Z","timestamp":1477880989000},"page":"5441-5460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["An efficient reversible data hiding method for AMBTC compressed images"],"prefix":"10.1007","volume":"76","author":[{"given":"Wien","family":"Hong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3747-6179","authenticated-orcid":false,"given":"Yuan-Bo","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Hung-Che","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tung-Shou","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,31]]},"reference":[{"issue":"1-2","key":"4032_CR1","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inform Sci 141(1-2):123\u2013128","journal-title":"Inform Sci"},{"issue":"7","key":"4032_CR2","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.patcog.2008.11.040","volume":"42","author":"CC Chang","year":"2009","unstructured":"Chang CC, Kieu TD, Wu WC (2009) A lossless data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597\u20131630","journal-title":"Pattern Recogn"},{"issue":"4","key":"4032_CR3","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1179\/136821910X12651933390629","volume":"58","author":"J Chen","year":"2010","unstructured":"Chen J, Hong W, Chen TS, Shiu CW (2010) Steganography for BTC compressed images using no distortion technique. Imag Sci J 58(4):177\u2013185","journal-title":"Imag Sci J"},{"issue":"1","key":"4032_CR4","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/s10851-014-0511-6","volume":"51","author":"B Chen","year":"2015","unstructured":"Chen B, Shu H, Coatrieux G, Chen SX, Coatrieux JL (2015) Color image analysis by quaternion-type moments. J Math Imag Vision 51(1):124\u2013144","journal-title":"J Math Imag Vision"},{"issue":"9","key":"4032_CR5","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1109\/TCOM.1979.1094560","volume":"27","author":"EJ Delp","year":"1979","unstructured":"Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335\u20131342","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"4032_CR6","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98-B","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98-B(1):190\u2013200","journal-title":"IEICE Trans Commun"},{"issue":"7","key":"4032_CR7","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Tay KY, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Trans Neural Netw Learn Syst 26(7):1403\u20131416","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"4032_CR8","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015) Incremental learning for v-support vector regression. Neural Netw 67:140\u2013150","journal-title":"Neural Netw"},{"issue":"6","key":"4032_CR9","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo P, Wang J, Xue HG, Chang SK, Kim JU (2014) A variable threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929\u2013936","journal-title":"J Internet Technol"},{"issue":"1","key":"4032_CR10","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.ins.2012.09.013","volume":"221","author":"W Hong","year":"2013","unstructured":"Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inform Sci 221(1):473\u2013489","journal-title":"Inform Sci"},{"issue":"1","key":"4032_CR11","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inform Forensics Sec 7(1):176\u2013184","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"4032_CR12","doi-asserted-by":"crossref","first-page":"182","DOI":"10.4028\/www.scientific.net\/AMM.65.182","volume":"65","author":"W Hong","year":"2011","unstructured":"Hong W, Chen TS, Shiu CW, Wu MC (2011) Lossless data embedding in BTC codes based on prediction and histogram shifting. Appl Mech Mater 65:182\u2013185","journal-title":"Appl Mech Mater"},{"issue":"1","key":"4032_CR13","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.ins.2014.03.030","volume":"308","author":"W Hong","year":"2015","unstructured":"Hong W, Chen TS, Chen J (2015) Reversible data hiding using Delaunay triangulation and selective embedment. Inf Sci 308(1):140\u2013154","journal-title":"Inf Sci"},{"key":"4032_CR14","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1016\/j.jss.2009.05.051","volume":"82","author":"W Hong","year":"2009","unstructured":"Hong W, Chen TS, Shiu CW (2009) Reversible data hiding for high quality images using modification of prediction errors. J Syst Software 82:1833\u20131842","journal-title":"J Syst Software"},{"key":"4032_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3208-y","author":"YH Huang","year":"2016","unstructured":"Huang YH, Chang CC, Chen YH (2016) Hybrid secret hiding schemes based on absolute moment block truncation coding. Multimed Tools Appl. doi: 10.1007\/s11042-015-3208-y","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"4032_CR16","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","volume":"32","author":"M Lema","year":"1984","unstructured":"Lema M, Mitchell OR (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32(10):1148\u20131157","journal-title":"IEEE Trans Commun"},{"issue":"3","key":"4032_CR17","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inform Forensics Sec 10(3):507\u2013518","journal-title":"IEEE Trans Inform Forensics Sec"},{"issue":"11","key":"4032_CR18","doi-asserted-by":"crossref","first-page":"3823","DOI":"10.1007\/s11042-013-1801-5","volume":"74","author":"CC Lin","year":"2015","unstructured":"Lin CC, Liu XL, Tai WL, Yuan SM (2015) A novel reversible data hiding scheme based on AMBTC compression technique. Multimed Tools Appl 74(11):3823\u20133842","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"4032_CR19","first-page":"346","volume":"188","author":"DC Lou","year":"2012","unstructured":"Lou DC, Hu CH (2012) LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis. Inf Sci 188(4):346\u2013358","journal-title":"Inf Sci"},{"key":"4032_CR20","doi-asserted-by":"publisher","unstructured":"Malik A, Sikka G, Verma HK (2016) A high payload data hiding scheme based on modified AMBTC technique. Doi: 10.1007\/s11042-016-3815-2","DOI":"10.1007\/s11042-016-3815-2"},{"issue":"3","key":"4032_CR21","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"ZC Ni","year":"2006","unstructured":"Ni ZC, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"21","key":"4032_CR22","doi-asserted-by":"crossref","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","volume":"74","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed Tools Appl 74(21):9117\u20139139","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"4032_CR23","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen J, Tan H, Wang J, Wang J, Lee S (2015) A novel routing protocol providing good transmission reliability in underwater sensor networks. J Internet Technol 16(1):171\u2013178","journal-title":"J Internet Technol"},{"key":"4032_CR24","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.image.2015.09.014","volume":"39","author":"CW Shiu","year":"2015","unstructured":"Shiu CW, Chen YC, Hong W (2015) Encrypted image-based reversible data hiding with public key cryptography from difference expansion. Signal Process Image Commun 39:226\u2013233","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"4032_CR25","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","volume":"7","author":"W Sun","year":"2013","unstructured":"Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7(2):297\u2013306","journal-title":"SIViP"},{"key":"4032_CR26","unstructured":"The USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database"},{"issue":"8","key":"4032_CR27","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"1","key":"4032_CR28","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.ins.2014.10.040","volume":"295","author":"X Wen","year":"2015","unstructured":"Wen X, Shao L, Xue Y, Fang W (2015) A rapid learning algorithm for vehicle classification. Inf Sci 295(1):395\u2013406","journal-title":"Inf Sci"},{"key":"4032_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2381-8","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, Liu Q, Xiong N (2014) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl. doi: 10.1007\/s11042-014-2381-8","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"4032_CR30","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2013","unstructured":"Xia Z, Wang X, Sun X, Wang B (2013) Steganalysis of least significant bit matching using multi-order differences. Security Commun Netw 7(8):1283\u20131291","journal-title":"Security Commun Netw"},{"issue":"2","key":"4032_CR31","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"7","key":"4032_CR32","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/CC.2016.7559076","volume":"13","author":"C Yuan","year":"2016","unstructured":"Yuan C, Sun X, Rui L (2016) Fingerprint liveness detection based on multi-scale LPQ and PCA. Chin Commun 13(7):60\u201365","journal-title":"Chin Commun"},{"issue":"2","key":"4032_CR33","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1587\/transcom.E96.B.624","volume":"E96.B","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Guo SZ, Lu ZM, Luo H (2013) Reversible data hiding for BTC-compressed images based on lossless coding of mean tables. IEICE Trans Commun E96.B(2):624\u2013631","journal-title":"IEICE Trans Commun"},{"issue":"2","key":"4032_CR34","doi-asserted-by":"crossref","first-page":"961","DOI":"10.3233\/IFS-141378","volume":"28","author":"Y Zheng","year":"2015","unstructured":"Zheng Y, Jeon B, Xu D, Wu QMJ, Zhang H (2015) Image segmentation by generalized hierarchical fuzzy C-means algorithm. J Intell Fuzzy Syst 28(2):961\u2013973","journal-title":"J Intell Fuzzy Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4032-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-4032-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4032-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,27]],"date-time":"2020-09-27T01:34:35Z","timestamp":1601170475000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-4032-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,31]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["4032"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-4032-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,10,31]]}}}