{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:23:23Z","timestamp":1763457803937,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T00:00:00Z","timestamp":1546905600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802400"],"award-info":[{"award-number":["2017YFB0802400"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11042-018-7130-y","type":"journal-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T00:59:21Z","timestamp":1546995561000},"page":"17535-17554","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Reversible data hiding in compressed and encrypted images by using Kd-tree"],"prefix":"10.1007","volume":"78","author":[{"given":"Nasrullah","family":"Nasrullah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8703-7310","authenticated-orcid":false,"given":"Jun","family":"Sang","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Mateen","sequence":"additional","affiliation":[]},{"given":"Muhammad Azeem","family":"Akbar","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,8]]},"reference":[{"key":"7130_CR1","first-page":"341","volume":"5","author":"R Amirtharajan","year":"2013","unstructured":"Amirtharajan R, Archana P, Rayappan J (2013) Why image encryption for better steganography. Res J Inf Technol 5:341\u2013351","journal-title":"Res J Inf Technol"},{"key":"7130_CR2","doi-asserted-by":"crossref","unstructured":"Arivazhagan S, Jebarani WSL, Karthika C (2014) Reversible data hiding by reserving room. In: Communication and Network Technologies (ICCNT), 2014 International Conference on, IEEE, pp 100-104","DOI":"10.1109\/CNT.2014.7062733"},{"issue":"13","key":"7130_CR3","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"C-C Chang","year":"2007","unstructured":"Chang C-C, Lin C-C, Tseng C-S, Tai W-L (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768\u20132786","journal-title":"Inf Sci"},{"issue":"7","key":"7130_CR4","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1016\/j.patcog.2007.12.009","volume":"41","author":"C-C Chang","year":"2008","unstructured":"Chang C-C, Lin C-Y, Fan Y-H (2008) Lossless data hiding for color images based on block truncation coding. Pattern Recogn 41(7):2347\u20132357","journal-title":"Pattern Recogn"},{"issue":"7","key":"7130_CR5","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.patcog.2008.11.040","volume":"42","author":"C-C Chang","year":"2009","unstructured":"Chang C-C, Kieu TD, Wu W-C (2009) A lossless data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597\u20131603","journal-title":"Pattern Recogn"},{"key":"7130_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.sigpro.2016.11.003","volume":"133","author":"J-C Chang","year":"2017","unstructured":"Chang J-C, Lu Y-Z, Wu H-L (2017) A separable reversible data hiding scheme for encrypted JPEG bitstreams. Signal Process 133:135\u2013143","journal-title":"Signal Process"},{"issue":"12","key":"7130_CR7","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra L, Heijmans HJ (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082\u20132090","journal-title":"IEEE Trans Image Process"},{"key":"7130_CR8","unstructured":"Kavin BE, Latha B (2014) Reversible data hiding in image encryption with efficient compression and enhanced security. In: Information Communication and Embedded Systems (ICICES), 2014 International Conference on. IEEE, pp 1-5"},{"issue":"4","key":"7130_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.3390\/sym9040050","volume":"9","author":"F-T-Z Khanam","year":"2017","unstructured":"Khanam F-T-Z, Kim S (2017) Enhanced joint and separable reversible data hiding in encrypted images with high payload. Symmetry 9(4):50","journal-title":"Symmetry"},{"issue":"4","key":"7130_CR10","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1109\/TIFS.2010.2066971","volume":"5","author":"J-D Lee","year":"2010","unstructured":"Lee J-D, Chiou Y-H, Guo J-M (2010) Reversible data hiding based on histogram modification of SMVQ indices. IEEE Transactions on Information Forensics and Security 5(4):638\u2013648","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7130_CR11","doi-asserted-by":"crossref","unstructured":"Li Z, Wu W (2016) Reversible Data Hiding for Encrypted Images Based on Statistical Learning. In: Australasian Conference on Information Security and Privacy, Springer, pp 198-212","DOI":"10.1007\/978-3-319-40253-6_12"},{"key":"7130_CR12","doi-asserted-by":"crossref","unstructured":"Li Q, Yan B, Li H, Chen N (2018) Separable reversible data hiding in encrypted images with improved security and capacity. Multimed Tools Appl:1\u201320","DOI":"10.1007\/s11042-018-6187-y"},{"issue":"11","key":"7130_CR13","doi-asserted-by":"publisher","first-page":"3823","DOI":"10.1007\/s11042-013-1801-5","volume":"74","author":"C-C Lin","year":"2015","unstructured":"Lin C-C, Liu X-L, Tai W-L, Yuan S-M (2015) A novel reversible data hiding scheme based on AMBTC compression technique. Multimed Tools Appl 74(11):3823\u20133842","journal-title":"Multimed Tools Appl"},{"key":"7130_CR14","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"issue":"3","key":"7130_CR15","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on Information Forensics and Security 8(3):553\u2013562","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"7130_CR16","doi-asserted-by":"publisher","DOI":"10.1063\/1.3645185","volume":"21","author":"M McCartney","year":"2011","unstructured":"McCartney M (2011) Lyapunov exponents for multi-parameter tent and logistic maps. Chaos: An Interdisciplinary Journal of Nonlinear Science 21(4):043104","journal-title":"Chaos: An Interdisciplinary Journal of Nonlinear Science"},{"key":"7130_CR17","unstructured":"Mohan AK, Saranya M, Anusudha K (2014) Separable Reversible Data Hiding using Chaotic Encryption and Histogram Shifting. International Journal of Simulation--Systems, Science & Technology 15 (4)"},{"key":"7130_CR18","doi-asserted-by":"crossref","unstructured":"Nasrullah SJ, Akbar M, Cai B, Xiang H, Hu H (2018, 1963) Joint image compression and encryption using IWT with SPIHT, Kd-tree and chaotic maps. Appl Sci 8(10)","DOI":"10.3390\/app8101963"},{"key":"7130_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","volume":"53","author":"SA Parah","year":"2016","unstructured":"Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Processing 53:11\u201324","journal-title":"Digital Signal Processing"},{"issue":"4","key":"7130_CR20","doi-asserted-by":"publisher","first-page":"80","DOI":"10.4018\/JGIM.2017100106","volume":"25","author":"SA Parah","year":"2017","unstructured":"Parah SA, Sheikh JA, Dey N, Bhat G (2017) Realization of a new robust and secure watermarking technique using DC coefficient modification in pixel domain and chaotic encryption. Journal of Global Information Management (JGIM) 25(4):80\u2013102","journal-title":"Journal of Global Information Management (JGIM)"},{"key":"7130_CR21","doi-asserted-by":"crossref","unstructured":"Parah SA, Loan NA, Shah AA, Sheikh JA, Bhat G (2018) A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dynamics:1-19","DOI":"10.1007\/s11071-018-4299-6"},{"issue":"3","key":"7130_CR22","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1007\/s11045-017-0490-z","volume":"29","author":"SA Parah","year":"2018","unstructured":"Parah SA, Sheikh JA, Loan NA, Ahad F, Bhat GM (2018) Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidim Syst Sign Process 29(3):1095\u20131117","journal-title":"Multidim Syst Sign Process"},{"key":"7130_CR23","unstructured":"Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Transactions on Dependable and Secure Computing"},{"key":"7130_CR24","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi Y-Q, Li X, Zhang X, Wu H-T, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210\u20133237","journal-title":"IEEE Access"},{"issue":"6","key":"7130_CR25","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"W-L Tai","year":"2009","unstructured":"Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video technology 19(6):906\u2013910","journal-title":"IEEE Transactions on Circuits and Systems for Video technology"},{"key":"7130_CR26","unstructured":"Tang Z, Xu S, Yao H, Qin C, Zhang X (2018) Reversible data hiding with differential compression in encrypted image. Multimedia Tools and Applications:1-25"},{"key":"7130_CR27","doi-asserted-by":"crossref","unstructured":"Thanikaiselvan V, Shastri S, Ahmad S (2017) Information Hiding: Steganography. In: Intelligent Techniques in Signal Processing for Multimedia Security. Springer, pp 65-91","DOI":"10.1007\/978-3-319-44790-2_4"},{"issue":"8","key":"7130_CR28","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video technology 13(8):890\u2013896","journal-title":"IEEE Transactions on Circuits and Systems for Video technology"},{"key":"7130_CR29","doi-asserted-by":"crossref","unstructured":"Wang L, Pan Z, Zhu R (2017) A novel reversible data hiding scheme by introducing current state codebook and prediction strategy for joint neighboring coding. Multimedia Tools and Applications:1-24","DOI":"10.1007\/s11042-016-4000-3"},{"key":"7130_CR30","unstructured":"Xu D, Chen K, Wang R, Su S (2015) Completely Separable Reversible Data Hiding in Encrypted Images. In: International Workshop on Digital Watermarking, Springer, pp 365-377"},{"key":"7130_CR31","doi-asserted-by":"crossref","unstructured":"Yin Z, Niu X, Zhang X, Tang J, Luo B (2018) Reversible data hiding in encrypted AMBTC images. Multimedia Tools and Applications:1-17","DOI":"10.1007\/s11042-017-4957-6"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7130-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-7130-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7130-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T19:07:43Z","timestamp":1578424063000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-7130-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,8]]},"references-count":31,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["7130"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-7130-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,1,8]]},"assertion":[{"value":"21 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}