{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:36:27Z","timestamp":1774942587750,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T00:00:00Z","timestamp":1498694400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11042-017-4899-z","type":"journal-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T06:39:02Z","timestamp":1498718342000},"page":"4677-4695","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An efficient authentication method for AMBTC compressed images using adaptive pixel pair matching"],"prefix":"10.1007","volume":"77","author":[{"given":"Wien","family":"Hong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7661-3944","authenticated-orcid":false,"given":"Meijin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tung Shou","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chien-Che","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,29]]},"reference":[{"issue":"9","key":"4899_CR1","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"CC Chang","year":"2011","unstructured":"Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure Fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462\u20131470","journal-title":"J Syst Softw"},{"issue":"1","key":"4899_CR2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1179\/136821905X26917","volume":"53","author":"J Chen","year":"2005","unstructured":"Chen J, Chen TS, Cheng CY (2005) New image tampering detection and recovery system of JPEG2000 region of interest area. The Imaging Science Journal 53(1):12\u201319","journal-title":"The Imaging Science Journal"},{"issue":"2","key":"4899_CR3","first-page":"91","volume":"18","author":"X Chen","year":"2017","unstructured":"Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. Journal of Internet Technology 18(2):91\u201398","journal-title":"Journal of Internet Technology"},{"issue":"9","key":"4899_CR4","doi-asserted-by":"crossref","first-page":"1335","DOI":"10.1109\/TCOM.1979.1094560","volume":"27","author":"E Delp","year":"1979","unstructured":"Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335\u20131342","journal-title":"IEEE Trans Commun"},{"issue":"12","key":"4899_CR5","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy Search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security 11(12):2706\u20132716","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4899_CR6","doi-asserted-by":"publisher","unstructured":"Fu Z, Huang F, Sun X, Vasilakos AV, Yang CN Enabling semantic Search based on conceptual graphs over encrypted outsourced data. IEEE Trans Serv Comput. doi: 10.1109\/TSC.2016.2622697","DOI":"10.1109\/TSC.2016.2622697"},{"key":"4899_CR7","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015) Incremental learning for \u03bd-support vector regression. Neural Netw 67:140\u2013150","journal-title":"Neural Netw"},{"issue":"7","key":"4899_CR8","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Tay KY, Romano W, Li S (2015) Incremental support vector learning for ordinal regression. IEEE Transactions on Neural Networks and Learning Systems 26(7):1403\u20131416","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"4899_CR9","unstructured":"B. Gu, X. Sun, and V.S. Sheng, Structural Minimax Probability Machine, IEEE Transactions on Neural Networks and Learning System, pp. 1\u201311, 2016."},{"key":"4899_CR10","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.ins.2012.09.013","volume":"221","author":"W Hong","year":"2013","unstructured":"Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221:473\u2013489","journal-title":"Inf Sci"},{"issue":"1","key":"4899_CR11","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Transactions on Information Forensics and Security 7(1):176\u2013184","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4899_CR12","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.ins.2014.03.030","volume":"308","author":"W Hong","year":"2015","unstructured":"Hong W, Chen TS, Chen J (2015) Reversible data hiding using Delaunay triangulation and selective embedment. Inf Sci 308:140\u2013154","journal-title":"Inf Sci"},{"issue":"1","key":"4899_CR13","doi-asserted-by":"crossref","first-page":"013012","DOI":"10.1117\/1.JEI.22.1.013012","volume":"22","author":"YC Hu","year":"2013","unstructured":"Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. Journal of Electronic Imaging 22(1):013012\u2013013012","journal-title":"Journal of Electronic Imaging"},{"key":"4899_CR14","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.knosys.2016.10.016","volume":"115","author":"Y Kong","year":"2016","unstructured":"Kong Y, Zhang M, Ye D (2016) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl-Based Syst 115:123\u2013132","journal-title":"Knowl-Based Syst"},{"issue":"3","key":"4899_CR15","first-page":"277","volume":"6","author":"CF Lee","year":"2011","unstructured":"Lee CF, Chen KN, Chang CC, Tsai MC (2011) A hierarchical Fragile watermarking with VQ index recovery. J Multimed 6(3):277\u2013284","journal-title":"J Multimed"},{"issue":"10","key":"4899_CR16","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","volume":"32","author":"M Lema","year":"1984","unstructured":"Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color image. IEEE Trans Commun 32(10):1148\u20131157","journal-title":"IEEE Trans Commun"},{"issue":"3","key":"4899_CR17","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li J, Li X, Yang B, Sun X (Mar. 2015) Segmentation-based image copy-move forgery detection scheme. IEEE Transactions on Information Forensics and Security 10(3):507\u2013518","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"4899_CR18","unstructured":"Lin CC, Huang Y, Tai WL (2014) A high-quality image authentication scheme for AMBTC-compressed images. KSII Transactions on Internet and Information Systems 8(12):4588\u20134603"},{"key":"4899_CR19","doi-asserted-by":"crossref","unstructured":"Lin CC, Huang Y, Tai WL (2015) A novel hybrid image authentication scheme for AMBTC-compressed images. In: Shi YQ, Kim H, P\u00e9rez-Gonz\u00e1lez F, Yang CN (eds) Digital-forensics and watermarking. IIWDW 2014. Lecture Notes in Computer Science, vol 9023. Springer, Cham, pp 433\u2013443","DOI":"10.1007\/978-3-319-19321-2_33"},{"issue":"17","key":"4899_CR20","doi-asserted-by":"crossref","first-page":"4002","DOI":"10.1002\/sec.1582","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu Q, Cai W, Shen J, Fu Z, Liu X, Linge N (2016) A speculative approach to spatial-temporal efficiency with multi-objective optimization in a Heterogeneous cloud environment. Security and Communication Networks 9(17):4002\u20134012","journal-title":"Security and Communication Networks"},{"issue":"1","key":"4899_CR21","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/30.826378","volume":"46","author":"DC Lou","year":"2000","unstructured":"Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31\u201339","journal-title":"IEEE Trans Consum Electron"},{"key":"4899_CR22","doi-asserted-by":"crossref","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC press","DOI":"10.1201\/9781439821916"},{"issue":"5","key":"4899_CR23","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Processing Letters 13(5):285\u2013287","journal-title":"IEEE Signal Processing Letters"},{"issue":"2","key":"4899_CR24","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TBC.2015.2419824","volume":"61","author":"Z Pan","year":"2015","unstructured":"Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity Multiview video coding. IEEE Trans Broadcast 61(2):166\u2013176","journal-title":"IEEE Trans Broadcast"},{"key":"4899_CR25","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1016\/j.jvcir.2016.07.018","volume":"40","author":"Z Pan","year":"2016","unstructured":"Pan Z, Jin P, Lei J, Zhang Y, Sun X, Kwong S (2016) Fast reference frame selection based on content similarity for low complexity HEVC encoder. J Vis Commun Image Represent 40:516\u2013524","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"4899_CR26","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/CC.2016.7559082","volume":"13","author":"Z Qu","year":"2016","unstructured":"Qu Z, Keeney J, Robitzsch S, Zaman F, Wang X (2016) Multilevel pattern mining architecture for automatic network monitoring in Heterogeneous wireless Communication Networks. China Communications 13(7):108\u2013116","journal-title":"China Communications"},{"key":"4899_CR27","unstructured":"The USC-SIPI Image Database. Available: http:\/\/sipi.usc.edu\/database\/ ."},{"key":"4899_CR28","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.neucom.2017.01.064","volume":"238","author":"Q Tian","year":"2017","unstructured":"Tian Q, Chen S (2017) Cross-Heterogeneous-database age estimation through correlation representation learning. Neurocomputing 238:286\u2013295","journal-title":"Neurocomputing"},{"issue":"3","key":"4899_CR29","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1179\/136821905X50406","volume":"53","author":"PY Tsai","year":"2005","unstructured":"Tsai PY, Hu YC, Chang CC (2005) A novel image authentication scheme based on Quadtree segmentation. The Imaging Science Journal 53(3):149\u2013162","journal-title":"The Imaging Science Journal"},{"key":"4899_CR30","doi-asserted-by":"crossref","unstructured":"J. Wang, T. Li, Y.Q. Shi, S. Lian, and J. Ye, Forensics Feature Analysis in Quaternion Wavelet Domain for Distinguishing Photographic Images and Computer Graphics, Multimedia Tools and Applications, pp. 1\u201317, 2016.","DOI":"10.1007\/s11042-016-4153-0"},{"key":"4899_CR31","doi-asserted-by":"crossref","unstructured":"C.M. Wu, Y.C. Hu, K.Y. Liu, and J.C. Chuang, A Novel Active Image Authentication Scheme for Block Truncation Coding, Int. J. Signal Process, Image Process. Pattern Recognit, vol. 7, no. 5, pp. 13\u201326, 2014.","DOI":"10.14257\/ijsip.2014.7.5.02"},{"issue":"8","key":"4899_CR32","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Communication Networks 7(8):1283\u20131291","journal-title":"Security and Communication Networks"},{"issue":"2","key":"4899_CR33","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked Search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems 27(2):340\u2013352","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"4","key":"4899_CR34","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools and Applications 75(4):1947\u20131962","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"4899_CR35","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/CC.2016.7559076","volume":"13","author":"C Yuan","year":"2016","unstructured":"Yuan C, Sun X, LV R (2016) Fingerprint liveness detection based on multi-scale LPQ and PCA. China Communications 13(7):60\u201365","journal-title":"China Communications"},{"issue":"2","key":"4899_CR36","first-page":"209","volume":"18","author":"C Yuan","year":"2017","unstructured":"Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. Journal of Internet Technology 18(2):209\u2013216","journal-title":"Journal of Internet Technology"},{"issue":"11","key":"4899_CR37","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient Steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"},{"issue":"7","key":"4899_CR38","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/CC.2016.7559071","volume":"13","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Sun X, Wang B (2016) Efficient algorithm for K-barrier coverage based on integer linear programming. China Communications 13(7):16\u201323","journal-title":"China Communications"},{"issue":"2","key":"4899_CR39","first-page":"2073","volume":"7","author":"H Zhong","year":"2016","unstructured":"Zhong H, Liu H, Chang CC, Lin CC (2016) A novel Fragile watermark-based image authentication scheme for AMBTC-compressed images. Journal of Information Hiding and Multimedia Signal Processing 7(2):2073\u20134212","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"1","key":"4899_CR40","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security 12(1):48\u201363","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4899-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4899-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4899-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T04:05:11Z","timestamp":1659153911000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4899-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,29]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["4899"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4899-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,29]]}}}