{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T01:35:54Z","timestamp":1649122554841},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T00:00:00Z","timestamp":1483574400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11042-016-4108-5","type":"journal-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T04:18:34Z","timestamp":1483589914000},"page":"26225-26248","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A novel reversible data hiding scheme using SMVQ prediction index and multi-layer embedding"],"prefix":"10.1007","volume":"76","author":[{"given":"Lingfei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhibin","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Ruoxin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,5]]},"reference":[{"issue":"4","key":"4108_CR1","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1145\/5684.5688","volume":"29","author":"J Bentley","year":"1986","unstructured":"Bentley J, Sleator D, Tarjan R, Wei V (1986) A locally adaptive data compression scheme. Commun ACM 29(4):320\u2013330","journal-title":"Commun ACM"},{"issue":"12","key":"4108_CR2","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.1016\/j.jss.2006.03.035","volume":"79","author":"C Chang","year":"2006","unstructured":"Chang C, Lu T (2006) A difference expansion oriented data hiding scheme for restoring the original host images. J Syst Softw 79(12):1754\u20131766","journal-title":"J Syst Softw"},{"key":"4108_CR3","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.ins.2014.12.028","volume":"300","author":"CC Chang","year":"2015","unstructured":"Chang CC, Nguyen TS, Lin CC (2015) A reversible compression code hiding using SOC and SMVQ indices. Inf Sci 300:85\u201399","journal-title":"Inf Sci"},{"issue":"3","key":"4108_CR4","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.jvcir.2006.11.005","volume":"18","author":"C Chang","year":"2007","unstructured":"Chang C, Wu W, Hu Y (2007) Lossless recovery of a VQ index table with embedded secret data. J Vis Commun Image R 18(3):207\u2013216","journal-title":"J Vis Commun Image R"},{"issue":"3","key":"4108_CR5","first-page":"11","volume":"26","author":"J Daemen","year":"2001","unstructured":"Daemen J, Rijmen V (2001) Rijndael: the advanced encryption standard. Dr Dobbs J 26(3):11\u201313","journal-title":"Dr Dobbs J"},{"issue":"4","key":"4108_CR6","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"IC Dragoi","year":"2014","unstructured":"Dragoi IC, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23(4):1779\u20131790","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"4108_CR7","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2015","unstructured":"Fu Z, Ren K, Shu J, Sun X, Huang F (2015) Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement. IEEE Trans Parallel Distrib Syst 27(9):2546\u20132559","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"4108_CR8","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98.B","author":"Z Fu","year":"2015","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing. IEICE Trans Commun E98.B(1):190\u2013200","journal-title":"IEICE Trans Commun"},{"issue":"2","key":"4108_CR9","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MASSP.1984.1162229","volume":"1","author":"R Gray","year":"1984","unstructured":"Gray R (1984) Vector quantization. IEEE ASSP Mag 1(2):4\u201329","journal-title":"IEEE ASSP Mag"},{"issue":"7","key":"4108_CR10","first-page":"1719","volume":"E-85A","author":"H Huang","year":"2002","unstructured":"Huang H, Wang F, Pan J (2002) AVQ-based robust multi-watermarking algorithm. IEICE Trans Fundam E-85A(7):1719\u20131726","journal-title":"IEICE Trans Fundam"},{"issue":"13","key":"4108_CR11","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1049\/el:20010567","volume":"37","author":"H Huang","year":"2001","unstructured":"Huang H, Wang F, Pang J (2001) Efficient and robust watermarking algorithm with vector quantization. Electron Lett 37(13):826\u2013828","journal-title":"Electron Lett"},{"issue":"2","key":"4108_CR12","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/83.136594","volume":"1","author":"T Kim","year":"1992","unstructured":"Kim T (1992) Side match and overlap match vector quantizers for Images. IEEE Trans Image Process 1(2):170\u2013185","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"4108_CR13","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1109\/TIFS.2010.2066971","volume":"5","author":"J Lee","year":"2010","unstructured":"Lee J, Chiou Y, Guo J (2010) Reversible data hiding based on histogram modification of SMVQ indices. IEEE Trans Inf Forensics Secur 5(4):638\u2013648","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4108_CR14","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.ins.2012.09.020","volume":"221","author":"JD Lee","year":"2013","unstructured":"Lee JD, Chiou YH, Guo JM (2013) Lossless data hiding for VQ indices based on neighboring correlation. Inf Sci 221:419\u2013438","journal-title":"Inf Sci"},{"issue":"2","key":"4108_CR15","first-page":"3","volume":"17","author":"CF Lin","year":"2006","unstructured":"Lin CF, Chang CC, Wang KW (2006) Hiding data in VQ-compressed images using pairwise nearest codewords based on minimum spanning tree. J Comput 17(2):3\u201310","journal-title":"J Comput"},{"key":"4108_CR16","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.jvcir.2015.04.009","volume":"30","author":"X Ma","year":"2015","unstructured":"Ma X, Pan Z, Hu S, Wang L (2015) New high-performance reversible data hiding method for VQ indices based on improved locally adaptive coding scheme. J Vis Commun Image R 30:191\u2013200","journal-title":"J Vis Commun Image R"},{"issue":"5","key":"4108_CR17","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285\u2013287","journal-title":"IEEE Signal Process Lett"},{"issue":"1","key":"4108_CR18","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1049\/iet-ipr.2014.0310","volume":"9","author":"Z Pan","year":"2015","unstructured":"Pan Z, Ma X, Deng X (2015) New reversible full-embeddable information hiding method for vector quantization indices based on locally adaptive complete coding list. IET Image Process 9(1):22\u201330","journal-title":"IET Image Process"},{"issue":"6","key":"4108_CR19","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1002\/sec.1046","volume":"8","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Horng G, Huang YH, Chen YC (2015) Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Secur Commun Netw 8(6):899\u2013906","journal-title":"Secur Commun Netw"},{"issue":"6","key":"4108_CR20","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1016\/j.csi.2008.12.003","volume":"31","author":"S Shie","year":"2009","unstructured":"Shie S, Lin S (2009) Data hiding based on compressed VQ indices of images. Comput Stand Interfaces 31(6):1143\u20131149","journal-title":"Comput Stand Interfaces"},{"issue":"2","key":"4108_CR21","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.jss.2012.08.029","volume":"86","author":"Z Wang","year":"2013","unstructured":"Wang Z, Lee C, Chang C (2013) Histogram-shifting-imitated reversible data hiding. J Syst Softw 86(2):315\u2013323","journal-title":"J Syst Softw"},{"issue":"2","key":"4108_CR22","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.jvcir.2013.12.004","volume":"25","author":"L Wang","year":"2014","unstructured":"Wang L, Pan Z, Ma X, Hu S (2014) A novel high-performance reversible data hiding scheme using SMVQ and improved locally adaptive coding method. J Vis Commun Image R 25(2):454\u2013465","journal-title":"J Vis Commun Image R"},{"issue":"8","key":"4108_CR23","doi-asserted-by":"crossref","first-page":"1309","DOI":"10.1109\/83.855427","volume":"9","author":"M Weinberger","year":"2000","unstructured":"Weinberger M, Seroussi G, Sapiro G (2000) The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. IEEE Trans Image Process 9(8):1309\u20131324","journal-title":"IEEE Trans Image Process"},{"key":"4108_CR24","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1353-4858(01)01018-2","volume":"10","author":"MA Wright","year":"2001","unstructured":"Wright MA (2001) The Advanced Encryption Standard. Netw Secur 10:11\u201313","journal-title":"Netw Secur"},{"issue":"2","key":"4108_CR25","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A Secure and DynamicMulti-keyword Ranked Search Scheme over Encrypted Cloud Data. IEEE Trans Parallel Distrib Syst 27(2):340\u2013352","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"11","key":"4108_CR26","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"4108_CR27","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.jvcir.2009.04.001","volume":"20","author":"C Yang","year":"2009","unstructured":"Yang C, Lin Y (2009) Reversible data hiding of a VQ index table based on referred counts. J Vis Commun Image R 20(6):399\u2013407","journal-title":"J Vis Commun Image R"},{"key":"4108_CR28","unstructured":"Yang B, Lu Z, Sun S (2005) Reversible watermarking in the VQ-compressed domain. Proceedings of the Fifth IASTED International Conference on Visualization, Imaging, and Image Processing, Benidorm, Spain, pp. 298\u2013303"},{"issue":"11","key":"4108_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LCOMM.2006.253292","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):1\u20133","journal-title":"IEEE Commun Lett"},{"issue":"7","key":"4108_CR30","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1016\/j.optlastec.2006.11.002","volume":"39","author":"X Zhou","year":"2007","unstructured":"Zhou X, Lai D, Yuan S, Li D, Hu J (2007) A method for hiding information utilizing double-random phaseencoding technique. Opt Laser Technol 39(7):1360\u20131363","journal-title":"Opt Laser Technol"},{"key":"4108_CR31","doi-asserted-by":"crossref","unstructured":"Zhou Z, Yang C, Chen B, Sun X, Liu Q, Wu Q (2016) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans Inf Syst E99-D(6):1531--1540","DOI":"10.1587\/transinf.2015EDP7341"},{"key":"4108_CR32","doi-asserted-by":"crossref","unstructured":"Zhou Z, Wang Y, Wu Q, Yang C, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48--63","DOI":"10.1109\/TIFS.2016.2601065"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-4108-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4108-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4108-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T06:01:39Z","timestamp":1512712899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-4108-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,5]]},"references-count":32,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["4108"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-4108-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,5]]}}}