{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:24:41Z","timestamp":1762507481353},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T00:00:00Z","timestamp":1533340800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11042-018-6450-2","type":"journal-article","created":{"date-parts":[[2018,8,4]],"date-time":"2018-08-04T03:38:45Z","timestamp":1533353925000},"page":"7005-7027","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Encrypted separable reversible watermarking with authentication and error correction"],"prefix":"10.1007","volume":"78","author":[{"given":"C.","family":"Vinoth Kumar","sequence":"first","affiliation":[]},{"given":"V.","family":"Natarajan","sequence":"additional","affiliation":[]},{"given":"K.","family":"Nirmala","sequence":"additional","affiliation":[]},{"given":"T.","family":"Balasubramanian","sequence":"additional","affiliation":[]},{"given":"K.","family":"Ramnarayan Rao","sequence":"additional","affiliation":[]},{"given":"S.","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,4]]},"reference":[{"issue":"8","key":"6450_CR1","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform. IEEE Trans Image Process 13(8):1147\u20131156. \n                    https:\/\/doi.org\/10.1109\/TIP.2004.828418","journal-title":"IEEE Trans Image Process"},{"key":"6450_CR2","unstructured":"Barton JM 1997 Method and apparatus for embedding authentication information within digital data. US Patent 5646997"},{"issue":"2","key":"6450_CR3","first-page":"1","volume":"2010","author":"R Caldelli","year":"2010","unstructured":"Caldelli R, Filippini F, Becarelli R (2010) Reversible Watermarking Techniques: An Overview and a Classification. EURASIP J Inf Secur 2010(2):1\u201319 10.1155\/2010\/134546","journal-title":"EURASIP J Inf Secur"},{"issue":"1","key":"6450_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/4233.992161","volume":"6","author":"H-M Chao","year":"2002","unstructured":"Chao H-M, Hsu C-M, Miaou S-G (2002) A data-hiding Technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46\u201353. \n                    https:\/\/doi.org\/10.1109\/4233.992161","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"21","key":"6450_CR5","doi-asserted-by":"publisher","first-page":"13679","DOI":"10.1007\/s11042-015-2825-9","volume":"75","author":"Y-H Chen","year":"2016","unstructured":"Chen Y-H, Huang H-C, Lin C-C (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimedia Tools and Applications 75(21):13679\u201313704. \n                    https:\/\/doi.org\/10.1007\/s11042-015-2825-9","journal-title":"Multimedia Tools and Applications"},{"issue":"20","key":"6450_CR6","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1587\/elex.5.870","volume":"5","author":"M Fallahpour","year":"2008","unstructured":"Fallahpour M (2008) Reversible image data hiding based on gradient adjusted prediction. IEICE Electronics Express 5(20):870\u2013876 10.1587\/elex.5.870","journal-title":"IEICE Electronics Express"},{"key":"6450_CR7","first-page":"161","volume":"2","author":"J-B Feng","year":"2006","unstructured":"Feng J-B, Lin I-C, Tsai C-S, Chu Y-P (2006) Reversible Watermarking : Current status and key issues. International Journal of Network Security 2:161\u2013171 10.1.1.97.507","journal-title":"International Journal of Network Security"},{"key":"6450_CR8","doi-asserted-by":"publisher","first-page":"274845.1","DOI":"10.1155\/2009\/274845","volume":"2009","author":"C Fontaine","year":"2008","unstructured":"Fontaine C, Galand F (2008) How Reed-Solomon Codes Can Improve Steganographic Schemes. EURASIP J Inf Secur 2009:274845.1\u2013274845.10. \n                    https:\/\/doi.org\/10.1155\/2009\/274845","journal-title":"EURASIP J Inf Secur"},{"issue":"6","key":"6450_CR9","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.782097","volume":"45","author":"V Guruswami","year":"1999","unstructured":"Guruswami V, Sudan M (1999) Improved decoding of Reed Solomon and Algebraic-Geometry Codes. IEEE Trans Inf Theory 45(6):1757\u20131767. \n                    https:\/\/doi.org\/10.1109\/18.782097","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"6450_CR10","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen T, Wu H (2012) An Improved Reversible Data Hiding in Encrypted Images using Side Match. IEEE Signal Processing Letters 19(4):199\u2013202. \n                    https:\/\/doi.org\/10.1109\/LSP.2012.2187334","journal-title":"IEEE Signal Processing Letters"},{"key":"6450_CR11","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251\u2013272. \n                    https:\/\/doi.org\/10.1016\/j.ins.2014.03.118","journal-title":"Inf Sci"},{"key":"6450_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2016","unstructured":"Kim C, Shin D, Lu L, Yang C-N (2016) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14:101\u2013114. \n                    https:\/\/doi.org\/10.1007\/s11554-016-0641-8","journal-title":"J Real-Time Image Proc"},{"key":"6450_CR13","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-642-20042-7_38","volume":"6592","author":"C Kim","year":"2011","unstructured":"Kim C, Shin D, Shin D (2011) Data hiding in a halftone image using hamming code (15, 11). Intelligent Information and Database Systems 6592:372\u2013381. \n                    https:\/\/doi.org\/10.1007\/978-3-642-20042-7_38","journal-title":"Intelligent Information and Database Systems"},{"key":"6450_CR14","unstructured":"Lee S-K, Suh Y-H, Ho Y-S (2006) Reversible Image Authentication Based on Watermarking. Proceedings of the IEEE International Conference Multimedia Expo:1321\u20131324 10.1.1.420.5626"},{"key":"6450_CR15","doi-asserted-by":"publisher","unstructured":"Lee J-H, Wu M-Y (2008) Reversible Data Hiding Scheme for Color Image Protection Based on Palette Color Replacement. Third International Conference on Innovative Computing Information and Control:1\u20134. \n                    https:\/\/doi.org\/10.1109\/ICICIC.2008.471","DOI":"10.1109\/ICICIC.2008.471"},{"key":"6450_CR16","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36:1365\u20131371. \n                    https:\/\/doi.org\/10.1016\/j.jnca.2013.02.034","journal-title":"J Netw Comput Appl"},{"key":"6450_CR17","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","volume":"67","author":"Xin Liao","year":"2018","unstructured":"Liao X, Yin J, Guo S, Li X, Sangaiah AK (2017) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng:1\u201310. \n                    https:\/\/doi.org\/10.1016\/j.compeleceng.2017.08.020","journal-title":"Computers & Electrical Engineering"},{"key":"6450_CR18","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao X, Zheng Q, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146\u2013156. \n                    https:\/\/doi.org\/10.1016\/j.image.2017.07.006","journal-title":"Signal Process Image Commun"},{"key":"6450_CR19","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-12286-1_18","volume":"329","author":"BK Lien","year":"2015","unstructured":"Lien BK, Chen SK, Wang WS, King KP (2015) Dispersed Data Hiding using Hamming Code with Recovery Capability. Genetic and Evolutionary Computing 329:179\u2013187. \n                    https:\/\/doi.org\/10.1007\/978-3-319-12286-1_18","journal-title":"Genetic and Evolutionary Computing"},{"key":"6450_CR20","doi-asserted-by":"publisher","unstructured":"Lin C-H, Yeh Y-S, Chien S-P, Lee C-Y, Chien H-S (2011) Generalized Secure Hashing Algorithm: SHA-X. International Conference on Computer as a Tool:1\u20134. \n                    https:\/\/doi.org\/10.1109\/EUROCON.2011.5929187","DOI":"10.1109\/EUROCON.2011.5929187"},{"issue":"3","key":"6450_CR21","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Li NYF (2013) Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption. IEEE Transactions on Information Forensics and Security 8(3):553\u2013562. \n                    https:\/\/doi.org\/10.1109\/TIFS.2013.2248725","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"6450_CR22","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y-Q, Ansari N, Wei S (2006) Reversible Data Hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354\u2013362. \n                    https:\/\/doi.org\/10.1109\/TCSVT.2006.869964","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"6450_CR23","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1016\/j.compeleceng.2014.01.006","volume":"40","author":"I Prathap","year":"2014","unstructured":"Prathap I, Natarajan V, Anitha R (2014) Hybrid robust watermarking for color images. Comput Electr Eng 40(3):920\u2013930. \n                    https:\/\/doi.org\/10.1016\/j.compeleceng.2014.01.006","journal-title":"Comput Electr Eng"},{"key":"6450_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2016.2634161","volume":"99","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Transactions on Dependable and Secure Computing 99:1\u201313. \n                    https:\/\/doi.org\/10.1109\/TDSC.2016.2634161","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"5","key":"6450_CR25","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qin","year":"2014","unstructured":"Qin Z, Zhang X, Wang S (2014) Reversible Data Hiding in Encrypted JPEG bitstream. IEEE Transactions on Multimedia 16(5):1486\u20131491. \n                    https:\/\/doi.org\/10.1109\/TMM.2014.2316154","journal-title":"IEEE Transactions on Multimedia"},{"key":"6450_CR26","doi-asserted-by":"publisher","unstructured":"Sabery MK, Yaghoobi M (2008) A New Approach for Image Encryption using Chaotic Logistic Map. International Conference on Advanced Computer Theory and Engineering:585\u2013590. \n                    https:\/\/doi.org\/10.1109\/ICACTE.2008.177","DOI":"10.1109\/ICACTE.2008.177"},{"key":"6450_CR27","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi Y-Q, Li X, Zhang X, Wu H-T, Ma B (2016) Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4:3210\u20133237. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2016.2573308","journal-title":"IEEE Access"},{"issue":"12","key":"6450_CR28","doi-asserted-by":"publisher","first-page":"1627","DOI":"10.1109\/TIP.2004.837557","volume":"13","author":"K Solanki","year":"2004","unstructured":"Solanki K, Jacobsen N, Madhow U, Manjunath BS, Chandrasekaran S (2004) Robust image-adaptive data hiding based on erasure and error correction. IEEE Trans Image Process 13(12):1627\u20131639. \n                    https:\/\/doi.org\/10.1109\/TIP.2004.837557","journal-title":"IEEE Trans Image Process"},{"key":"6450_CR29","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1109\/ICIP.2004.1421361","volume":"3","author":"DM Thodi","year":"2004","unstructured":"Thodi DM, Rodriguez JJ (2004) Prediction-error based reversible watermarking. Proc IEEE Int Conf Inf Process 3:1549\u20131552. \n                    https:\/\/doi.org\/10.1109\/ICIP.2004.1421361","journal-title":"Proc IEEE Int Conf Inf Process"},{"issue":"3","key":"6450_CR30","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodr\u00edguez JJ (2007) Expansion Embedding Techniques for Reversible Watermarking. IEEE Trans Image Process 16(3):721\u2013730. \n                    https:\/\/doi.org\/10.1109\/TIP.2006.891046","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"6450_CR31","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible Data Embedding Using a Difference Expansion. IEEE Transactions on Circuits and Systems For Video Technology 13(8):890\u2013896. \n                    https:\/\/doi.org\/10.1109\/TCSVT.2003.815962","journal-title":"IEEE Transactions on Circuits and Systems For Video Technology"},{"issue":"8","key":"6450_CR32","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1109\/TCSVT.2016.2556585","volume":"27","author":"H-Z Wu","year":"2016","unstructured":"Wu H-Z, Shi Y-Q, Wang H-X, Zhou L-N (2016) Separable Reversible Data Hiding for Encrypted Palette Images with Color Partitioning and Flipping Verification. IEEE Transactions on Circuits and Systems for Video Technology 27(8):1620\u20131631. \n                    https:\/\/doi.org\/10.1109\/TCSVT.2016.2556585","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"6450_CR33","doi-asserted-by":"publisher","first-page":"61","DOI":"10.5815\/ijigsp.2010.01.08","volume":"1","author":"S Xu","year":"2010","unstructured":"Xu S, Wang Y (2010) A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map. International Journal on Image, Graphics and Signal Processing 1:61\u201368","journal-title":"International Journal on Image, Graphics and Signal Processing"},{"issue":"4","key":"6450_CR34","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible Data Hiding in Encrypted Image. IEEE Signal Processing Letters 18(4):255\u2013258. \n                    https:\/\/doi.org\/10.1109\/LSP.2011.2114651","journal-title":"IEEE Signal Processing Letters"},{"issue":"2","key":"6450_CR35","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable Reversible Data Hiding in Encrypted Image. IEEE Transaction on Information Forensics and Security 7(2):826\u2013832. \n                    https:\/\/doi.org\/10.1109\/TIFS.2011.2176120","journal-title":"IEEE Transaction on Information Forensics and Security"},{"issue":"2","key":"6450_CR36","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.jvcir.2013.11.001","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient Reversible Data Hiding in Encrypted Images. ournal of. Visual Communication and Image Representation 25(2):322\u2013328. \n                    https:\/\/doi.org\/10.1016\/j.jvcir.2013.11.001","journal-title":"Visual Communication and Image Representation"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6450-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6450-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6450-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,3]],"date-time":"2019-08-03T23:07:29Z","timestamp":1564873649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6450-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,4]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["6450"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6450-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,4]]},"assertion":[{"value":"28 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}