{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:11:56Z","timestamp":1758269516408},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T00:00:00Z","timestamp":1497398400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Young Teachers Scientific Research and Cultivating Foundation of South China Normal University","award":["15KJ06"],"award-info":[{"award-number":["15KJ06"]}]},{"name":"the Natural Science Foundation of P.R.China","award":["11371127"],"award-info":[{"award-number":["11371127"]}]},{"name":"the Natural Science Foundation of P.R.China","award":["11571124"],"award-info":[{"award-number":["11571124"]}]},{"name":"he Natural Science Foundation of P.R.China","award":["61572028"],"award-info":[{"award-number":["61572028"]}]},{"name":"the Guangdong Applied Science and Technology Research Foundation of P.R.China","award":["2016B020244003"],"award-info":[{"award-number":["2016B020244003"]}]},{"name":"the major Guangzhou University-industry Collaboration Innovation Project","award":["201604016002"],"award-info":[{"award-number":["201604016002"]}]},{"name":"the major Guangzhou University-industry Collaboration Innovation Project","award":["201704020203"],"award-info":[{"award-number":["201704020203"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11042-017-4905-5","type":"journal-article","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T07:40:09Z","timestamp":1497426009000},"page":"12563-12579","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A novel adaptive data hiding based on improved EMD and interpolation"],"prefix":"10.1007","volume":"77","author":[{"given":"Shu-yuan","family":"Shen","sequence":"first","affiliation":[]},{"given":"Li-hong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Song-sen","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"issue":"1","key":"4905_CR1","first-page":"196","volume":"1","author":"W Abu-Aarie","year":"2010","unstructured":"Abu-Aarie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Signal Image Process (IJSIP) 1(1):196\u2013204","journal-title":"Int J Signal Image Process (IJSIP)"},{"key":"4905_CR2","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1109\/ICIP.1996.560768","volume":"3","author":"J Allebach","year":"1996","unstructured":"Allebach J, Wong PW (1996) Edge-directed interpolation. IEEE Int Conf Image Process 3:707\u2013710","journal-title":"IEEE Int Conf Image Process"},{"issue":"2","key":"4905_CR3","first-page":"151","volume":"2","author":"NA Al-Otaibi","year":"2014","unstructured":"Al-Otaibi N A, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory. Eng Tech Publ 2 (2):151\u2013157","journal-title":"Eng Tech Publ"},{"key":"4905_CR4","doi-asserted-by":"crossref","unstructured":"Byung J, Jung K, Yoo K (2008) Improved data hiding method by exploiting modification direction. In: International symposium on ubiquitous multimedia computing, UMC\u201908, pp 264\u2013266","DOI":"10.1109\/UMC.2008.63"},{"key":"4905_CR5","doi-asserted-by":"crossref","unstructured":"Chang C, Lee C, Chuang L (2007) Using dynamic programming strategy to find an optimal solution to exploiting modification direction embedding method. In: Proceedings of the third international conference on intelligent information hiding and multi-media signal processing. Kaohsiung, pp 489\u2013492","DOI":"10.1109\/IIH-MSP.2007.318"},{"key":"4905_CR6","doi-asserted-by":"crossref","unstructured":"Chang C, Tai W, Chen K (2007) Improvements of EMD embedding for large payloads. In: Proceedings of the third international conference on intelligent information hiding and multimedia signal processing (IIHMSP07). Kaohsiung, pp 473\u2013476","DOI":"10.1109\/IIHMSP.2007.4457590"},{"key":"4905_CR7","doi-asserted-by":"publisher","unstructured":"Chao R, Wu H, Lee C, Chu Y (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur. doi: 10.1155\/2009\/658047","DOI":"10.1155\/2009\/658047"},{"key":"4905_CR8","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in grayscale and color images. In: Proceedings of the ACM workshop on multimedia and security, pp 27\u201330","DOI":"10.1145\/1232454.1232466"},{"key":"4905_CR9","unstructured":"Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel Indicator high capacity technique for RGB image based steganography. In: WoSPA 2008\u20145th IEEE international workshop on signal processing and its applications. University of Sharjah, U.A.E."},{"key":"4905_CR10","doi-asserted-by":"crossref","unstructured":"Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: secure RGB image steganography based on randomization. In: AICCSA-2009\u2014the 7th ACS\/IEEE international conference on computer systems and applications, pp 400\u2013403","DOI":"10.1109\/AICCSA.2009.5069356"},{"issue":"2","key":"4905_CR11","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.jvcir.2010.11.004","volume":"22","author":"W Hong","year":"2011","unstructured":"Hong W, Chen T (2011) Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J Vis Commun Image Represent 22(2):131\u2013140","journal-title":"J Vis Commun Image Represent"},{"key":"4905_CR12","doi-asserted-by":"crossref","first-page":"3761","DOI":"10.1007\/s11042-016-3977-y","volume":"76","author":"W Hong","year":"2017","unstructured":"Hong W, Chen T, Yin Z, Luo B, Ma Y (2017) Data hiding in AMBTC images using quantization level modification and perturbation technique. Multimed Tools Appl 76:3761\u20133782","journal-title":"Multimed Tools Appl"},{"key":"4905_CR13","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.compeleceng.2015.04.014","volume":"46","author":"J Hu","year":"2015","unstructured":"Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447\u2013455","journal-title":"Comput Electr Eng"},{"key":"4905_CR14","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","volume":"31","author":"K Jung","year":"2009","unstructured":"Jung K, Yoo K (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31:465\u2013470","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"4905_CR15","first-page":"79","volume":"2","author":"K Jung","year":"2009","unstructured":"Jung K, Yoo K (2009) Improved exploiting modification direction method by modulus operation. Int J Signal Process Image Process Pattern 2(1):79\u201388","journal-title":"Int J Signal Process Image Process Pattern"},{"issue":"6","key":"4905_CR16","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1007\/s11042-013-1832-y","volume":"74","author":"K Jung","year":"2015","unstructured":"Jung K, Yoo K (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimed Tools Appl 74(6):2143\u20132155","journal-title":"Multimed Tools Appl"},{"key":"4905_CR17","unstructured":"Khan F, Gutub AA-A (2007) Message concealment techniques using image based steganography. In: The 4th IEEE GCC conference and exhibition. Gulf International Convention Centre, Manamah, pp 11\u201314"},{"issue":"8","key":"4905_CR18","doi-asserted-by":"crossref","first-page":"10648","DOI":"10.1016\/j.eswa.2011.02.122","volume":"38","author":"T Kieu","year":"2011","unstructured":"Kieu T, Chang C (2011) A steganographic scheme by fully exploiting modification directions. Expert Syst Appl 38(8):10648\u201310657","journal-title":"Expert Syst Appl"},{"issue":"12","key":"4905_CR19","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1016\/j.imavis.2008.05.005","volume":"26","author":"C Lee","year":"2008","unstructured":"Lee C, Chang C, Wang K (2008) An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis Comput 26(12):1670\u20131676","journal-title":"Image Vis Comput"},{"key":"4905_CR20","doi-asserted-by":"crossref","first-page":"6712","DOI":"10.1016\/j.eswa.2011.12.019","volume":"39","author":"C Lee","year":"2012","unstructured":"Lee C, Huang Y (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39:6712\u20136719","journal-title":"Expert Syst Appl"},{"key":"4905_CR21","doi-asserted-by":"crossref","unstructured":"Lee C, Wang Y, Chang C (2007) A steganographic method with high embedding capacity by improving exploiting modification direction. In: Proceedings of the third international conference on intelligent information hiding and multimedia signal processing (IIHMSP07). Kaohsiung, pp 497\u2013500","DOI":"10.1109\/IIH-MSP.2007.62"},{"key":"4905_CR22","doi-asserted-by":"publisher","unstructured":"Lee C, Weng C, Chen K (2017) An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection. Multimed Tools Appl. doi: 10.1007\/s11042-016-3591-z","DOI":"10.1007\/s11042-016-3591-z"},{"issue":"11","key":"4905_CR23","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1109\/42.816070","volume":"18","author":"MT Lehmann","year":"1999","unstructured":"Lehmann MT, Gonner C, Spitzer K (1999) Survey: interpolation methods in medical image processing. IEEE Trans Med Imaging 18(11):1049\u20131075","journal-title":"IEEE Trans Med Imaging"},{"key":"4905_CR24","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11042-013-1369-0","volume":"72","author":"T Lu","year":"2014","unstructured":"Lu T, Chang C, Huang Y (2014) High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimed Tools Appl 72:417\u2013435","journal-title":"Multimed Tools Appl"},{"key":"4905_CR25","doi-asserted-by":"publisher","unstructured":"Malik A, Sikka G, Verma H (2017) Image interpolation based high capacity reversible data hiding scheme. Multimed Tools Appl. doi: 10.1007\/s11042-016-4186-4","DOI":"10.1007\/s11042-016-4186-4"},{"key":"4905_CR26","doi-asserted-by":"crossref","unstructured":"Parvez M T, Gutub A-A (2008) RGB intensity based variable-bits image steganography. In: APSCC 2008\u2014Proceedings of 3rd IEEE Asia-Pacific services computing conference. Yilan, pp 9\u201312","DOI":"10.1109\/APSCC.2008.105"},{"issue":"1B","key":"4905_CR27","first-page":"127","volume":"38","author":"MT Parvez","year":"2011","unstructured":"Parvez M T, Gutub AA-A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng (KJSE) 38(1B):127\u2013142","journal-title":"Kuwait J Sci Eng (KJSE)"},{"issue":"15","key":"4905_CR28","doi-asserted-by":"crossref","first-page":"3972","DOI":"10.1016\/j.ijleo.2014.01.149","volume":"125","author":"M Tang","year":"2014","unstructured":"Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layr embedding. Optik 125(15):3972\u20133976","journal-title":"Optik"},{"key":"4905_CR29","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1016\/j.aeue.2015.08.011","volume":"69","author":"M Tang","year":"2015","unstructured":"Tang M, Hu J, Wen S, Zeng S (2015) Reversible and adaptive image steganographic method. Int J Electron Commun 69:1745\u20131754","journal-title":"Int J Electron Commun"},{"issue":"3","key":"4905_CR30","first-page":"29","volume":"15","author":"C Yang","year":"2008","unstructured":"Yang C, Wang C, Sun H (2008) Information hiding technique based on blocked PVD. J Inf Manag 15(3):29\u201348","journal-title":"J Inf Manag"},{"key":"4905_CR31","doi-asserted-by":"publisher","unstructured":"Yang C, Weng C, Lin Y, Liu K (2017) High-fidelity lossless data hiding based on predictors selection. Multimed Tools Appl. doi: 10.1007\/s11042-016-4133-4","DOI":"10.1007\/s11042-016-4133-4"},{"key":"4905_CR32","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.jss.2010.11.889","volume":"84","author":"C Yang","year":"2011","unstructured":"Yang C, Weng C, Tso H, Wang S (2011) A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J Syst Softw 84:669\u2013678","journal-title":"J Syst Softw"},{"issue":"11","key":"4905_CR33","doi-asserted-by":"crossref","first-page":"2954","DOI":"10.1016\/j.sigpro.2010.04.022","volume":"90","author":"J Wang","year":"2010","unstructured":"Wang J, Sun Y, Xu H, Chen K, Kim H, Joo S (2010) An improved section-wise exploiting modification direction method. Signal Process 90(11):2954\u20132964","journal-title":"Signal Process"},{"issue":"3","key":"4905_CR34","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang Z, Bovik A (2002) A universal image quality index. IEEE Signal Process Lett 9(3):81\u201384","journal-title":"IEEE Signal Process Lett"},{"issue":"7","key":"4905_CR35","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1016\/j.aeue.2011.11.004","volume":"66","author":"X Zeng","year":"2012","unstructured":"Zeng X, Li Z, Ping L (2012) Reversible data hiding scheme using reference pixel and multi-layer embedding. Int J Electron Commun 66(7):532\u2013539","journal-title":"Int J Electron Commun"},{"issue":"8","key":"4905_CR36","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1109\/LCOMM.2007.070438","volume":"11","author":"W Zhang","year":"2007","unstructured":"Zhang W, Wang S, Zhang X (2007) Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun Lett 11(8):680\u2013682","journal-title":"IEEE Commun Lett"},{"issue":"11","key":"4905_CR37","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/LSP.2007.903255","volume":"14","author":"W Zhang","year":"2007","unstructured":"Zhang W, Zhang X, Wang S (2007) A double layered \u2018plus-minus one\u201d data embedding scheme. IEEE Signal Process Lett 14(11):848\u2013851","journal-title":"IEEE Signal Process Lett"},{"key":"4905_CR38","doi-asserted-by":"publisher","unstructured":"Zhang X, Sun Z et al (2017) High capacity data hiding based on interpolated image. Multimed Tools Appl. doi: 10.1007\/s11042-016-3521-0","DOI":"10.1007\/s11042-016-3521-0"},{"key":"4905_CR39","doi-asserted-by":"crossref","unstructured":"Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analyais and modification for enhanced security. Pattern Recogn Lett 331\u2013339","DOI":"10.1016\/j.patrec.2003.10.014"},{"issue":"11","key":"4905_CR40","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"},{"issue":"8","key":"4905_CR41","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1049\/el:20070248","volume":"43","author":"X Zhang","year":"2007","unstructured":"Zhang X, Zhang W, Wang S (2007) Efficient double-layered stegano- graphic embedding. Electron Lett 43(8):482\u2013483","journal-title":"Electron Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4905-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4905-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4905-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T22:22:43Z","timestamp":1569450163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4905-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,14]]},"references-count":41,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["4905"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4905-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,14]]}}}