{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T08:22:46Z","timestamp":1746260566565,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T00:00:00Z","timestamp":1540944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572052"],"award-info":[{"award-number":["61572052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636206"],"award-info":[{"award-number":["U1636206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6812-9","type":"journal-article","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T23:55:15Z","timestamp":1540943715000},"page":"8289-8310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Improved reversible visible image watermarking based on HVS and ROI-selection"],"prefix":"10.1007","volume":"78","author":[{"given":"Wenfa","family":"Qi","sequence":"first","affiliation":[]},{"given":"Guangyuan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3817-3279","authenticated-orcid":false,"given":"Zongming","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,31]]},"reference":[{"issue":"5","key":"6812_CR1","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783\u2013791","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"6812_CR2","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/76.993436","volume":"12","author":"M Barni","year":"2002","unstructured":"Barni M, Bartolini F, Piva A (2002) Multichannel watermarking of color images. IEEE Trans Circuits Syst Video Technol 12(3):142\u2013156","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"6812_CR3","doi-asserted-by":"crossref","unstructured":"Caldelli R, Filippini F, Becarelli R (2010) Reversible watermarking techniques: An overview and a classification. EURASIP J Information Security 2010","DOI":"10.1155\/2010\/134546"},{"issue":"2","key":"6812_CR4","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"6812_CR5","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"15","author":"MU Celik","year":"2006","unstructured":"Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15(4):1042\u20131049","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"6812_CR6","doi-asserted-by":"publisher","first-page":"8497","DOI":"10.1007\/s11042-016-3452-9","volume":"76","author":"C Chen","year":"2017","unstructured":"Chen C, Tsai Y, Yeh H (2017) Difference-expansion based reversible and visible image watermarking scheme. Multimed Tools Appl 76(6):8497\u20138516","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"6812_CR7","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"Coltuc D (2011) Improved embedding for prediction-based reversible watermarking. IEEE Trans Inf Forensics Secur 6(3):873\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"12","key":"6812_CR8","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"issue":"12","key":"6812_CR9","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TIP.2005.857263","volume":"14","author":"P Dong","year":"2005","unstructured":"Dong P, Brankov JG, Galatsanos NP, Yang Y, Davoine F (2005) Digital watermarking robust to geometric distortions. IEEE Trans Image Process 14 (12):2140\u20132150","journal-title":"IEEE Trans Image Process"},{"key":"6812_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich JJ, Goljan M, Du R (2001) Invertible authentication. In: Security and watermarking of multimedia contents III, San Jose, pp 197\u2013208","DOI":"10.1117\/12.435400"},{"issue":"2","key":"6812_CR11","first-page":"185","volume":"2002","author":"JJ Fridrich","year":"2002","unstructured":"Fridrich JJ, Goljan M, Du R (2002) Lossless data embedding - new paradigm in digital watermarking. EURASIP J Adv Sig Proc 2002(2):185\u2013196","journal-title":"EURASIP J Adv Sig Proc"},{"issue":"11","key":"6812_CR12","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/TCSVT.2006.884011","volume":"16","author":"Y Hu","year":"2006","unstructured":"Hu Y, Jeon B (2006) Reversible visible watermarking and lossless recovery of original images. IEEE Trans Circuits Syst Video Technol 16(11):1423\u20131429","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"12","key":"6812_CR13","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2156803","volume":"20","author":"X Li","year":"2011","unstructured":"Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20 (12):3524\u20133533","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"6812_CR14","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li X, Li B, Yang B, Zeng T (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22 (6):2181\u20132191","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"6812_CR15","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93 (1):198\u2013205","journal-title":"Signal Process"},{"issue":"7","key":"6812_CR16","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"X Li","year":"2013","unstructured":"Li X, Zhang W, Gui X, Yang B (2013) A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans Inf Forensics Secur 8(7):1091\u20131100","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"6812_CR17","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"X Li","year":"2015","unstructured":"Li X, Zhang W, Gui X, Yang B (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans Inf Forensics Security 10(9):2016\u20132027","journal-title":"IEEE Trans Inf Forensics Security"},{"issue":"5","key":"6812_CR18","doi-asserted-by":"publisher","first-page":"1224","DOI":"10.1109\/TIP.2010.2040757","volume":"19","author":"TY Liu","year":"2010","unstructured":"Liu TY, Tsai WH (2010) Generic lossless visible watermarking - a new approach. IEEE Trans Image Process 19(5):1224\u20131235","journal-title":"IEEE Trans Image Process"},{"issue":"21","key":"6812_CR19","doi-asserted-by":"publisher","first-page":"13,557","DOI":"10.1007\/s11042-015-2759-2","volume":"75","author":"X Luo","year":"2016","unstructured":"Luo X, Song X, Li X, Zhang W, Li J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13,557\u201313,583","journal-title":"Multimed Tools Appl"},{"issue":"1109","key":"6812_CR20","first-page":"2799,243","volume":"10","author":"Y Ma","year":"2018","unstructured":"Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection Of rich model steganalysis features based on decision rough set alpha-positive region reduction. IEEE Trans Circuits Syst Video Technol 10(1109):2799,243","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"4","key":"6812_CR21","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2005.843776","volume":"12","author":"TM Ng","year":"2005","unstructured":"Ng TM, Garg HK (2005) Maximum-likelihood detection in dwt domain image watermarking using laplacian modeling. IEEE Signal Process Lett 12(4):285\u2013288","journal-title":"IEEE Signal Process Lett"},{"issue":"3","key":"6812_CR22","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"12","key":"6812_CR23","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou B, Li X, Zhao Y, Ni R, Shi Y (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22(12):5010\u20135021","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"6812_CR24","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.sigpro.2011.06.006","volume":"92","author":"F Peng","year":"2012","unstructured":"Peng F, Li X, Yang B (2012) Adaptive reversible data hiding scheme based on integer transform. Signal Process 92(1):54\u201362","journal-title":"Signal Process"},{"key":"6812_CR25","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.dsp.2013.11.002","volume":"25","author":"F Peng","year":"2014","unstructured":"Peng F, Li X, Yang B (2014) Improved pvo-based reversible data hiding. Digital Signal Process 25:255\u2013265","journal-title":"Digital Signal Process"},{"issue":"7","key":"6812_CR26","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang C, Huang Y, Liao L (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"6812_CR27","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","volume":"361-362","author":"C Qin","year":"2016","unstructured":"Qin C, Chen X, Ye D, Wang J, Sun X (2016) A novel image hashing scheme with perceptual robustness using block truncation coding. Inf Sci 361-362:84\u201399","journal-title":"Inf Sci"},{"key":"6812_CR28","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280\u2013293","journal-title":"Signal Process"},{"issue":"7","key":"6812_CR29","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):989\u2013999","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"6812_CR30","doi-asserted-by":"crossref","unstructured":"Shi YQ, Ni Z, Zou D, Liang C, Xuan G (2004) Lossless data hiding: fundamentals, algorithms and applications. In: Proceedings of the 2004 international symposium on circuits and systems, Vancouver, pp 33\u201336","DOI":"10.1109\/ISCAS.2004.1329201"},{"key":"6812_CR31","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Shi YQ, Li X, Zhang X, Wu HT, Ma B (2016) Reversible data hiding: Advances in the past two decades. IEEE Access 4:3210\u20133237","journal-title":"IEEE Access"},{"issue":"3","key":"6812_CR32","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721\u2013730","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"6812_CR33","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"6812_CR34","doi-asserted-by":"crossref","unstructured":"Tsai H, Chang L (2007) A high secure reversible visible watermarking scheme. In: Proceedings of the 2007 IEEE international conference on multimedia and expo, Beijing, pp 2106\u20132109","DOI":"10.1109\/ICME.2007.4285098"},{"issue":"1","key":"6812_CR35","first-page":"10","volume":"25","author":"H Tsai","year":"2010","unstructured":"Tsai H, Chang L (2010) Secure reversible visible image watermarking with authentication. Sig Proc: Image Comm 25(1):10\u201317","journal-title":"Sig Proc: Image Comm"},{"issue":"22","key":"6812_CR36","doi-asserted-by":"publisher","first-page":"23,721","DOI":"10.1007\/s11042-016-4153-0","volume":"76","author":"J Wang","year":"2017","unstructured":"Wang J, Li T, Shi XY, Lian S, Ye J (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76(22):23,721\u201323,737","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"6812_CR37","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1109\/LSP.2010.2046930","volume":"17","author":"X Wang","year":"2010","unstructured":"Wang X, Li X, Yang B, Guo Z (2010) Efficient generalized integer transform for reversible watermarking. IEEE Signal Process Lett 17(6):567\u2013570","journal-title":"IEEE Signal Process Lett"},{"key":"6812_CR38","doi-asserted-by":"crossref","unstructured":"Yang G, Qi W, Li X, Guo Z (2017) Improved reversible visible watermarking based on adaptive block partition. In: digital forensics and watermarking - 16th international workshop, Magdeburg, pp 303\u2013317","DOI":"10.1007\/978-3-319-64185-0_23"},{"issue":"6","key":"6812_CR39","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1007\/s11042-013-1714-3","volume":"74","author":"H Yang","year":"2015","unstructured":"Yang H, Yin J (2015) A secure removable visible watermarking for btc compressed images. Multimed Tools Appl 74(6):1725\u20131739","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"6812_CR40","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/TCSVT.2009.2017401","volume":"19","author":"Y Yang","year":"2009","unstructured":"Yang Y, Sun X, Yang H, Li CT, Xiao R (2009) A contrast-sensitive reversible visible image watermarking technique. IEEE Trans Circuits Syst Video Technol 19 (5):656\u2013667","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"6812_CR41","doi-asserted-by":"crossref","unstructured":"Yip S, Au OC, Ho C, Wong H (2006) Lossless visible watermarking. In: Proceedings of the 2006 IEEE international conference on multimedia and expo, Toronto, pp 853\u2013856","DOI":"10.1109\/ICME.2006.262635"},{"issue":"7","key":"6812_CR42","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"W Zhang","year":"2013","unstructured":"Zhang W, Hu X, Li X, Yu N (2013) Recursive histogram modification: Establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22(7):2775\u20132785","journal-title":"IEEE Trans Image Process"},{"key":"6812_CR43","doi-asserted-by":"crossref","unstructured":"Zhang X, Wang Z, Yu J, Qian Z (2015) Reversible visible watermark embedded in encrypted domain. In: IEEE China summit and international conference on signal and information processing, Chengdu, pp 826\u2013830","DOI":"10.1109\/ChinaSIP.2015.7230520"},{"key":"6812_CR44","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99\u2013111","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6812-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6812-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6812-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T12:14:06Z","timestamp":1576498446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6812-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,31]]},"references-count":44,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6812"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6812-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,10,31]]},"assertion":[{"value":"19 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}