{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:21:03Z","timestamp":1775578863072,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T00:00:00Z","timestamp":1566345600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T00:00:00Z","timestamp":1566345600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11042-019-08109-8","type":"journal-article","created":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T07:02:28Z","timestamp":1566370948000},"page":"34541-34561","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Reversible data hiding in JPEG images based on zero coefficients and distortion cost function"],"prefix":"10.1007","volume":"78","author":[{"given":"Fuqiang","family":"Di","sequence":"first","affiliation":[]},{"given":"Minqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fangjun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,21]]},"reference":[{"key":"8109_CR1","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"15","author":"MU Celik","year":"2006","unstructured":"Celik MU, Sharma G, Tekalp AM (2006) Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042\u20131049","journal-title":"IEEE Trans Image Process"},{"issue":"13","key":"8109_CR2","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"C Chang","year":"2007","unstructured":"Chang C, Lin C, Tseng C, Tai W (2007) Reversible hiding in DCT-based compressed images. Inform Sciences 177(13):2768\u20132786","journal-title":"Inform Sciences"},{"issue":"16","key":"8109_CR3","doi-asserted-by":"publisher","first-page":"20917","DOI":"10.1007\/s11042-017-5498-8","volume":"77","author":"F Di","year":"2018","unstructured":"Di F, Huang F, Zhang M et al (2018) Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding. Multimed Tools Appl 77(16):20917\u201320935","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"8109_CR4","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1080\/00207217.2012.680786","volume":"99","author":"M El-Bendary","year":"2012","unstructured":"El-Bendary M, Abou El-Azm AE, El-Fishawy NA et al (2012) JPEG image transmission over mobile network with an efficient channel coding and interleaving. Int J Electron 99(11):1497\u20131518","journal-title":"Int J Electron"},{"key":"8109_CR5","unstructured":"El-Bendary M, El-Tokhy M, Shawki F, et al (2013) Studying the throughput efficiency of JPEG image transmission over mobile IEEE 802.15.1 network using EDR packets. In: International Conference on Sciences of Electronics, pp 573\u2013577"},{"key":"8109_CR6","doi-asserted-by":"publisher","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","volume":"6","author":"A El-Latif","year":"2018","unstructured":"El-Latif A, Abd-El-Atty B, Hossain M et al (2018) Efficient quantum information hiding for remote medical image sharing acknowledgement. IEEE Access 6:21075\u201321083","journal-title":"IEEE Access"},{"key":"8109_CR7","doi-asserted-by":"publisher","first-page":"10332","DOI":"10.1109\/ACCESS.2018.2799879","volume":"6","author":"A El-Latif","year":"2018","unstructured":"El-Latif A, Abd-El-Atty B, Hossain M et al (2018) Secure quantum steganography protocol for fog cloud internet of things. IEEE Access 6:10332\u201310340","journal-title":"IEEE Access"},{"key":"8109_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.sigpro.2018.02.002","volume":"148","author":"D Hou","year":"2018","unstructured":"Hou D, Wang H, Zhang W et al (2018) Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process 148:41\u201347","journal-title":"Signal Process"},{"issue":"8","key":"8109_CR9","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1016\/j.jss.2013.03.102","volume":"86","author":"Y Hu","year":"2013","unstructured":"Hu Y, Wang K, Lu Z (2013) An improved vlc-based lossless data hiding scheme for JPEG images. J Syst Software 86(8):2166\u20132173","journal-title":"J Syst Software"},{"issue":"9","key":"8109_CR10","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","volume":"26","author":"F Huang","year":"2016","unstructured":"Huang F, Qu X, Kim HJ et al (2016) Reversible data hiding in JPEG images. IEEE Trans Circuits Syst Video Technol 26(9):1610\u20131621","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"03","key":"8109_CR11","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1142\/S0218001410007968","volume":"24","author":"S Lee","year":"2010","unstructured":"Lee S, Sian J, Ja L (2010) Reversible JPEG-based hiding method with high hiding-ratio. Int J Pattern Recogn 24(03):433\u2013456","journal-title":"Int J Pattern Recogn"},{"key":"8109_CR12","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/978-3-642-15702-8_60","volume-title":"Advances in Multimedia Information Processing - PCM 2010","author":"Qiming Li","year":"2010","unstructured":"Li Q, Wu Y, Bao F (2010) A reversible data hiding scheme for JPEG images. In: Proceedings of 11th Pacific Rim Conference on Multimedia, LNCS 6297, pp 653\u2013664"},{"issue":"2","key":"8109_CR13","doi-asserted-by":"publisher","first-page":"327","DOI":"10.4304\/jsw.5.2.214-224","volume":"5","author":"C Lin","year":"2010","unstructured":"Lin C, Shiu P (2010) DCT-based reversible data hiding scheme. J Softw 5(2):327\u2013335","journal-title":"J Softw"},{"issue":"2","key":"8109_CR14","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1109\/TCSVT.2018.2799243","volume":"29","author":"Y Ma","year":"2019","unstructured":"Ma Y, Luo X, Li X et al (2019) Selection of rich model steganalysis features based on decision rough set \u03b1-positive region reduction. IEEE Trans Circuits Syst Video Technol 29(2):336\u2013350","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"8109_CR15","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N et al (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16:354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"8109_CR16","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1049\/iet-ipr.2014.0689","volume":"9","author":"A Nikolaidis","year":"2015","unstructured":"Nikolaidis A (2015) Reversible data hiding in JPEG images utilising zero quantised coefficients. IET Image Process 9(7):560\u2013568","journal-title":"IET Image Process"},{"key":"8109_CR17","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou B, Li J, Zhao Y et al (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22:5010\u20135021","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"8109_CR18","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.jss.2011.08.015","volume":"85","author":"Z Qian","year":"2012","unstructured":"Qian Z, Zhang X (2012) Lossless data hiding in JPEG bitstream. J Syst Software 85(2):309\u2013313","journal-title":"J Syst Software"},{"key":"8109_CR19","doi-asserted-by":"crossref","unstructured":"Sakai H, Kuribayashi M, Morii M (2008) Adaptive reversible data hiding for JPEG images. In: Proceedings of 2018 international symposium on information theory and its applications. IEEE, pp 1\u20136","DOI":"10.1109\/ISITA.2008.4895529"},{"issue":"12","key":"8109_CR20","doi-asserted-by":"publisher","first-page":"3689","DOI":"10.1007\/s11128-013-0629-2","volume":"12","author":"X Song","year":"2013","unstructured":"Song X, Wang S, Liu S et al (2013) A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf Process 12(12):3689\u20133706","journal-title":"Quantum Inf Process"},{"issue":"4","key":"8109_CR21","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s00530-014-0355-3","volume":"20","author":"X Song","year":"2014","unstructured":"Song X, Wang S, El-Latif A et al (2014) Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimedia Syst 20(4):379\u2013388","journal-title":"Multimedia Syst"},{"issue":"8","key":"8109_CR22","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"8109_CR23","doi-asserted-by":"publisher","first-page":"1965","DOI":"10.1016\/j.jss.2013.03.083","volume":"86","author":"K Wang","year":"2013","unstructured":"Wang K, Lu ZM, Hu YJ (2013) A high capacity lossless data hiding scheme for JPEG images. J Syst Software 86(7):1965\u20131975","journal-title":"J Syst Software"},{"issue":"1","key":"8109_CR24","first-page":"213","volume":"393","author":"L Woods","year":"1988","unstructured":"Woods L (1988) Website of the independent JPEG group. J Physiol 393(1):213\u2013231","journal-title":"J Physiol"},{"key":"8109_CR25","doi-asserted-by":"crossref","unstructured":"Xuan G, Shi Y Q, Ni Z, et al (2007) Reversible data hiding for JPEG images based on histogram pairs. In: Proceedings of 4th international conference on image analysis and recognition, Springer Verlag, pp 715\u2013727","DOI":"10.1007\/978-3-540-74260-9_64"},{"issue":"3","key":"8109_CR26","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s11760-013-0465-y","volume":"9","author":"X Yan","year":"2015","unstructured":"Yan X, Wang S, El-Latif A et al (2015) New approaches for efficient information hiding-based secret image sharing schemes. Signal Image Video P 9(3):499\u2013510","journal-title":"Signal Image Video P"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08109-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08109-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08109-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T23:21:15Z","timestamp":1597879275000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08109-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,21]]},"references-count":26,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["8109"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08109-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,21]]},"assertion":[{"value":"19 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}