{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:12:59Z","timestamp":1772043179902,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T00:00:00Z","timestamp":1487203200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61502007"],"award-info":[{"award-number":["61502007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Research Project of Anhui province","award":["1608085MF125"],"award-info":[{"award-number":["1608085MF125"]}]},{"name":"backbone teacher training program of Anhui University"},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2015M582015"],"award-info":[{"award-number":["2015M582015"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Doctoral Scientific Research Foundation of Anhui University","award":["J01001319"],"award-info":[{"award-number":["J01001319"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572452"],"award-info":[{"award-number":["61572452"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-4444-0","type":"journal-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T04:19:50Z","timestamp":1487218790000},"page":"18043-18065","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":58,"title":["A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images"],"prefix":"10.1007","volume":"77","author":[{"given":"Yang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,16]]},"reference":[{"issue":"1","key":"4444_CR1","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jss.2010.08.055","volume":"84","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi OM, Khoo BE (2011) High capacity data hiding schemes for medical images based on difference expansion. J Syst Softw 84(1):105\u2013112","journal-title":"J Syst Softw"},{"issue":"4","key":"4444_CR2","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1109\/TITB.2005.855556","volume":"9","author":"F Bao","year":"2005","unstructured":"Bao F, Deng RH, Ooi BC et al (2005) Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas. IEEE Trans Inf Technol Biomed 9(4):554\u2013563","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"12","key":"4444_CR3","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"XL B.ou","year":"2013","unstructured":"B.ou XL, Zhao Y, Ni R, Shi Y (2013) Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding. IEEE Trans Image Process 22(12):5010\u20135012","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"4444_CR4","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"I-C Dragoi","year":"2014","unstructured":"Dragoi I-C, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking. IEEE Trans Image Process 23(4):1779\u20131790","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"4444_CR5","first-page":"838","volume":"22","author":"YM Fang","year":"2015","unstructured":"Fang YM, Ma K, Wang Z et al (2015) No-Reference Quality Assessment of Contrast-Distorted Images Based on Natural Scene Statistics. IEEE Signal Process Lett 22(7):838\u2013842","journal-title":"IEEE Signal Process Lett"},{"key":"4444_CR6","first-page":"331","volume":"2","author":"M Gao","year":"2013","unstructured":"Gao M, Wang L (2013) Comprehensive evaluation for HE based contrast enhancement. Adv Intell Syst Applicat 2:331\u2013338","journal-title":"Adv Intell Syst Applicat"},{"issue":"11","key":"4444_CR7","doi-asserted-by":"crossref","first-page":"2078","DOI":"10.1109\/LSP.2015.2459055","volume":"22","author":"G-Y Gao","year":"2015","unstructured":"Gao G-Y, Shi Y-Q (2015) Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform. IEEE Signal Process Lett 22 (11):2078\u20132082","journal-title":"IEEE Signal Process Lett"},{"key":"4444_CR8","unstructured":"Gonzalez RC, Woods RE (2004) Digital Image Processing (Second Edition), Publishing House of Electronics Industry, pp 71"},{"key":"4444_CR9","unstructured":"Hiary S, Jafar I, Hiary H (2016) An efficient multi-predictor reversible data hiding algorithm based on performance evaluation of different prediction schemes. Multimedia Tools Application, pp 1\u201327"},{"issue":"7","key":"4444_CR10","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1109\/76.735380","volume":"8","author":"PG Howard","year":"1998","unstructured":"Howard PG, Kossentini F, Martins B, Forchhammer S, Rucklidge WJ (1998) The emerging JBIG2 standard. IEEE Trans Circuits Syst Video Technol 8 (7):838\u2013848","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"4444_CR11","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Hu Y, Lee H-K, Li J (2009) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circuits Syst Video Technol 19(2):250\u2013260","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"4444_CR12","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TIFS.2015.2392556","volume":"10","author":"X Hu","year":"2015","unstructured":"Hu X, Zhang W, Li X, Yu N (2015) Minimum rate prediction and optimized histograms modification for reversible data hiding. IEEE Trans Inf Forensics Secur 10 (3):653\u2013664","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"4444_CR13","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1016\/j.jss.2012.11.024","volume":"86","author":"L-C Huang","year":"2013","unstructured":"Huang L-C, Tseng L-Y, Hwang M-S (2013) A reversible data hiding method by histogram shifting in high quality medical images. J Syst Softw 86(3):716\u2013727","journal-title":"J Syst Softw"},{"key":"4444_CR14","unstructured":"Jemmett DG, Miller GE (2012) Medical imaging archives delivered as Cloud-based service offerings, HP Business white paper, pp 1\u201311"},{"issue":"12","key":"4444_CR15","doi-asserted-by":"crossref","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082\u20132090","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"4444_CR16","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Secur 2(3):321\u2013330","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"4444_CR17","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","volume":"20","author":"X Li","year":"2011","unstructured":"Li X, Yang B, Zeng T (2011) Effecient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20 (12):3524\u20133533","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"4444_CR18","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93 (1):198\u2013205","journal-title":"Signal Process"},{"issue":"7","key":"4444_CR19","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"X Li","year":"2013","unstructured":"Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensics Secur 8(7):1091\u20131100","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4444_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.image.2015.03.005","volume":"35","author":"JB Lima","year":"2015","unstructured":"Lima JB, Madeiro F, Sales FJR (2015) Encryption of medical images based on the cosine number transform. Signal Process Image Commun 35:1\u20138","journal-title":"Signal Process Image Commun"},{"issue":"1","key":"4444_CR21","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5 (1):187\u2013193","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4444_CR22","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.jvcir.2015.01.012","volume":"28","author":"X Ma","year":"2015","unstructured":"Ma X, Pan Z, Hu S, Wang L (2015) High-fidelity reversible data hiding scheme based on multi-predictor sorting and selecting mechanism. J Vis Commun Image Represent 28:71\u201382","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"4444_CR23","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y, Ansari N, Wei S (2006) Reversible Data Hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"10","key":"4444_CR24","doi-asserted-by":"crossref","first-page":"2700","DOI":"10.1016\/j.jss.2013.05.077","volume":"86","author":"B Ou","year":"2013","unstructured":"Ou B, Li X, Zhao Y, Ni R (2013) Reversible data hiding based on PDE predictor. J Syst Softw 86(10):2700\u20132709","journal-title":"J Syst Softw"},{"issue":"8","key":"4444_CR25","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1016\/j.ins.2010.12.007","volume":"181","author":"P-Y Pai","year":"2011","unstructured":"Pai P-Y, Chang C-C, Chan Y-K, Tsai M-H (2011) An adaptable threshold detector. Inf Sci 181(8):1463\u20131483","journal-title":"Inf Sci"},{"issue":"11","key":"4444_CR26","doi-asserted-by":"crossref","first-page":"2841","DOI":"10.1016\/j.jss.2013.06.055","volume":"86","author":"Q Pei","year":"2013","unstructured":"Pei Q, Wang X, Li Y, Li H (2013) Adaptive reversible watermarking with improved embedding capacity. J Syst Softw 86(11):2841\u20132848","journal-title":"J Syst Softw"},{"key":"4444_CR27","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.sigpro.2016.05.032","volume":"129","author":"C Qin","year":"2016","unstructured":"Qin C, Hu Y-C (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48\u201355","journal-title":"Signal Process"},{"issue":"15","key":"4444_CR28","doi-asserted-by":"crossref","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang C-C, Jung H-T (2015) Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images. Multimedia Tools and Appl 74(15):5861\u20135872","journal-title":"Multimedia Tools and Appl"},{"issue":"7","key":"4444_CR29","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An inpaintingassisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"4444_CR30","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible Watermarking Algorithm using Sorting and Prediction. IEEE Trans Circuits Syst Video Technol 19(7):989\u2013999","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4444_CR31","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi Y-Q, Li X-L, Zhang X-P, Wu H-T, Ma B (2016) Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4:3210\u20133237","journal-title":"IEEE Access"},{"key":"4444_CR32","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1117\/12.465329","volume":"4675","author":"J Tian","year":"2002","unstructured":"Tian J (2002) Wavelet-based reversible watermarking for authentication. Proc SPIE 4675:679\u2013690","journal-title":"Proc SPIE"},{"issue":"8","key":"4444_CR33","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4444_CR34","volume-title":"Proceedings IEEE Int. Conference Inf. Processing, pp 1549\u20131552","author":"DM Thodi","year":"2004","unstructured":"Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking Proceedings IEEE Int. Conference Inf. Processing, pp 1549\u20131552"},{"issue":"3","key":"4444_CR35","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721\u2013730","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"4444_CR36","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR et al (2004) Image Quality Assessment: From Error Visibility to Structural Similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"4444_CR37","volume-title":"42nd Annual Allerton Conference on Communication, Control and Computing, Monticello, Illinois, USA, pp 1411\u20131418","author":"F Willems","year":"2004","unstructured":"Willems F, Maas D, Kalker T (2004) Semantic Lossless Source Coding 42nd Annual Allerton Conference on Communication, Control and Computing, Monticello, Illinois, USA, pp 1411\u20131418"},{"issue":"12","key":"4444_CR38","doi-asserted-by":"crossref","first-page":"3000","DOI":"10.1016\/j.sigpro.2012.05.034","volume":"92","author":"H-T Wu","year":"2012","unstructured":"Wu H-T, Huang J (2012) Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process 92(12):3000\u20133009","journal-title":"Signal Process"},{"issue":"1","key":"4444_CR39","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","volume":"22","author":"H-T Wu","year":"2015","unstructured":"Wu H-T, Dugelay J-L, Shi Y-Q (2015) Reversible Image Data Hiding with Contrast Enhancement. IEEE Signal Process Lett 22(1):81\u201385","journal-title":"IEEE Signal Process Lett"},{"key":"4444_CR40","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1016\/j.sigpro.2015.03.019","volume":"120","author":"Y Yang","year":"2016","unstructured":"Yang Y, Ming J (2016) Image quality assessment based on the space similarity decomposition model. Signal Process 120:797\u2013805","journal-title":"Signal Process"},{"key":"4444_CR41","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.dsp.2016.02.006","volume":"52","author":"Y Yang","year":"2016","unstructured":"Yang Y, Zhang WM, Liang D, Yu NH (2016) Reversible Data Hiding in Medical Images with Enhanced contrast in Texture Area. Digital Signal Process 52:13\u201324","journal-title":"Digital Signal Process"},{"issue":"8","key":"4444_CR42","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1002\/sec.1275","volume":"9","author":"Z-X Yin","year":"2016","unstructured":"Yin Z-X, Luo B (2016) MDE-based Image Steganography with Large Embedding Capacity. Security and Communication Networks 9(8):721\u2013728","journal-title":"Security and Communication Networks"},{"issue":"7","key":"4444_CR43","doi-asserted-by":"crossref","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"W Zhang","year":"2013","unstructured":"Zhang W, Hu X, Yu N et al (2013) Recursive Histogram Modification: Establishing Equivalency Between Reversible data Hiding and Lossless Data Compression. IEEE Trans Image Process 22(7):2775\u20132785","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4444-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4444-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4444-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T06:27:37Z","timestamp":1532413657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4444-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,16]]},"references-count":43,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["4444"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4444-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,16]]}}}