{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T14:02:35Z","timestamp":1762956155336},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T00:00:00Z","timestamp":1573171200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T00:00:00Z","timestamp":1573171200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11042-019-08193-w","type":"journal-article","created":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T20:32:07Z","timestamp":1570307527000},"page":"35537-35558","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Joint index coding and reversible data hiding methods for color image quantization"],"prefix":"10.1007","volume":"78","author":[{"given":"Jun-Chou","family":"Chuang","sequence":"first","affiliation":[]},{"given":"Yu-Chen","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Chia-Mei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yu-Hsiu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,8]]},"reference":[{"issue":"2","key":"8193_CR1","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s11554-012-0291-4","volume":"10","author":"ME Celebi","year":"2015","unstructured":"Celebi ME, Wen Q, Hang S (2015) An effective real-time color quantization method based on divisive hierarchical clustering. J Real-Time Image Proc 10(2):329\u2013344","journal-title":"J Real-Time Image Proc"},{"key":"8193_CR2","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.sigpro.2014.09.036","volume":"108","author":"IC Chang","year":"2015","unstructured":"Chang IC, Hu YC, Chen WL, Lo CC (2015) High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process 108:376\u2013388","journal-title":"Signal Process"},{"key":"8193_CR3","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1142\/S0218001402001770","volume":"16","author":"CC Chang","year":"2002","unstructured":"Chang CC, Lin MH, Hu YC (2002) A fast and secure image hiding scheme based on LSB substitution. Int J Pattern Recognit Artif Intell 16:399\u2013416","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"5","key":"8193_CR4","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/j.patcog.2004.11.006","volume":"38","author":"CC Chang","year":"2005","unstructured":"Chang CC, Yu YH, Hu YC (2005) Hiding secret data in images via predictive coding. Pattern Recogn 38(5):691\u2013705","journal-title":"Pattern Recogn"},{"issue":"5","key":"8193_CR5","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1016\/j.jvcir.2011.03.011","volume":"22","author":"JC Chuang","year":"2011","unstructured":"Chuang JC, Hu YC (2011) An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image Represent 22(5):440\u2013449","journal-title":"J Vis Commun Image Represent"},{"issue":"9","key":"8193_CR6","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1016\/j.patcog.2006.02.005","volume":"39","author":"YC Hu","year":"2006","unstructured":"Hu YC (2006) High capacity image hiding scheme based on vector quantization. Pattern Recogn 39(9):1715\u20131724","journal-title":"Pattern Recogn"},{"issue":"C","key":"8193_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.future.2016.04.001","volume":"62","author":"YC Hu","year":"2016","unstructured":"Hu YC, Chen WL, Lo CC (2016) Probability-based reversible image authentication scheme for image demosaicking. Futur Gener Comput Syst 62(C):92\u2013103","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"8193_CR8","first-page":"159","volume":"20","author":"YC Hu","year":"2012","unstructured":"Hu YC, Chen WL, Lo CC, Wu CM (2012) On a predictive scheme for color image quantization. Opto-Electronics Review 20(2):159\u2013167","journal-title":"Opto-Electronics Review"},{"issue":"1","key":"8193_CR9","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1179\/1743131X11Y.0000000007","volume":"60","author":"YC Hu","year":"2012","unstructured":"Hu YC, Chiang CY, Chen WL, Chou WK (2012) Lossless index coding for indexed color images. Imaging Science Journal 60(1):54\u201363","journal-title":"Imaging Science Journal"},{"issue":"14","key":"8193_CR10","doi-asserted-by":"publisher","first-page":"15435","DOI":"10.1007\/s11042-016-3847-7","volume":"76","author":"YC Hu","year":"2017","unstructured":"Hu YC, Choo KKR, Chen WL (2017) Tamper detection and image recovery for BTC-compressed images. Multimed Tools Appl 76(14):15435\u201315463","journal-title":"Multimed Tools Appl"},{"key":"8193_CR11","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-319-76451-1_18","volume-title":"Security with Intelligent Computing and Big-data Services. SICBS 2017","author":"YC Hu","year":"2018","unstructured":"Hu YC, Lee CF, Liu YH (2018) Reversible image steganography for color image quantization based on lossless index coding. In: Peng SL, Wang SJ, Balas V, Zhao M (eds) Security with Intelligent Computing and Big-data Services. SICBS 2017. Advances in Intelligent Systems and Computing, vol 733. Springer, Cham, pp 185\u2013195"},{"issue":"3","key":"8193_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JEI.27.3.033039","volume":"16","author":"YC Hu","year":"2007","unstructured":"Hu YC, Li MG (2007) A k-means based color palette design scheme with the use of stable flags. Journal of Electronic Imaging 16(3, 033003):1\u201311","journal-title":"Journal of Electronic Imaging"},{"issue":"3","key":"8193_CR13","doi-asserted-by":"publisher","first-page":"282","DOI":"10.2478\/s11772-011-0025-3","volume":"19","author":"YC Hu","year":"2011","unstructured":"Hu YC, Li CY, Chuang JC, Lo CC (2011) Variable-rate color image quantization based on quadtree segmentation. Opto-Electronics Review 19(3):282\u2013289","journal-title":"Opto-Electronics Review"},{"issue":"1","key":"8193_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1179\/174313109X373675","volume":"57","author":"YC Hu","year":"2009","unstructured":"Hu YC, Li MG, Tsai PY (2009) Color palette generation schemes for color image quantization. Imaging Science Journal 57(1):46\u201359","journal-title":"Imaging Science Journal"},{"issue":"2","key":"8193_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1179\/174313107X214231","volume":"56","author":"YC Hu","year":"2008","unstructured":"Hu YC, Su BH (2008) Accelerated pixel mapping scheme for color image quantization. Imaging Science Journal 56(2):67\u201378","journal-title":"Imaging Science Journal"},{"issue":"1","key":"8193_CR16","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11554-015-0548-9","volume":"14","author":"DS Kim","year":"2018","unstructured":"Kim DS, Yoon EJ, Kim C, Yoo KY (2018) Reversible data hiding scheme with edge-direction predictor and modulo operation. J Real-Time Image Proc 14(1):137\u2013145","journal-title":"J Real-Time Image Proc"},{"issue":"9","key":"8193_CR17","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"XL Li","year":"2015","unstructured":"Li XL, Zhang WM, Gui XL, Yang B (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Transactions on Information Forensics and Security 10(9):2016\u20132027","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8193_CR18","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.sigpro.2013.11.028","volume":"98","author":"CC Lo","year":"2014","unstructured":"Lo CC, Hu YC (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174\u2013185","journal-title":"Signal Process"},{"issue":"12","key":"8193_CR19","doi-asserted-by":"publisher","first-page":"2677","DOI":"10.1109\/78.107417","volume":"39","author":"T Michael","year":"1991","unstructured":"Michael T, Charles A (1991) Color quantization of images. IEEE Trans Signal Process 39(12):2677\u20132690","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"8193_CR20","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354\u2013362","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"8193_CR21","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security Privacy 1(3):32\u201344","journal-title":"IEEE Security Privacy"},{"issue":"3","key":"8193_CR22","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969\u2013978","journal-title":"IEEE Trans Image Process"},{"issue":"15","key":"8193_CR23","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861\u20135872","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"8193_CR24","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Transactions on Circuits and Systems for Video Technology 23(7):1109\u20131118","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"8193_CR25","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.sigpro.2016.05.032","volume":"129","author":"C Qin","year":"2016","unstructured":"Qin C, Hu YC (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process 129:48\u201355","journal-title":"Signal Process"},{"key":"8193_CR26","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Computer Science Review 13:95\u2013113","journal-title":"Computer Science Review"},{"issue":"8","key":"8193_CR27","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8):890\u2013896","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"6","key":"8193_CR28","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"PY Tsai","year":"2009","unstructured":"Tsai PY, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129\u20131143","journal-title":"Signal Process"},{"issue":"1","key":"8193_CR29","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s11554-015-0555-x","volume":"14","author":"CN Yang","year":"2018","unstructured":"Yang CN, Kim C, Lo YH (2018) Adaptive real-time reversible data hiding for JPEG images. J Real-Time Image Proc 14(1):147\u2013157","journal-title":"J Real-Time Image Proc"},{"key":"8193_CR30","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jvcir.2017.01.004","volume":"43","author":"H Yao","year":"2017","unstructured":"Yao H, Qin C, Tang Z, Tian Y (2017) Guided filtering based color image reversible data hiding. J Vis Commun Image Represent 43:152\u2013163","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"8193_CR31","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s11554-018-0811-y","volume":"16","author":"W Zhang","year":"2019","unstructured":"Zhang W, Kong P, Yao H, Hu YC, Cao F (2019) Real-time reversible data hiding in encrypted images based on hybrid embedding mechanism. J Real-Time Image Proc 16(3):697\u2013708","journal-title":"J Real-Time Image Proc"},{"key":"8193_CR32","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Qin C, Zhang WM, Liu FL, Luo XY (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99\u2013111","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08193-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08193-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08193-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:09:16Z","timestamp":1604707756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08193-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,8]]},"references-count":32,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["8193"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08193-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,8]]},"assertion":[{"value":"3 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}