{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T17:12:18Z","timestamp":1772125938712,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T00:00:00Z","timestamp":1549497600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Education and Scientific Research Project of Fujian Province","award":["JT180436"],"award-info":[{"award-number":["JT180436"]}]},{"name":"Xiamen Science and Technology Planning Project","award":["3502Z20183058"],"award-info":[{"award-number":["3502Z20183058"]}]},{"name":"Open Fund of Engineering Research Center for Software Testing and Evaluation of Fujian Province"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11042-019-7252-x","type":"journal-article","created":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T20:02:32Z","timestamp":1549483352000},"page":"19045-19059","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Extended squared magic matrix for embedding secret information with large payload"],"prefix":"10.1007","volume":"78","author":[{"given":"Xiao-Zhu","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3518-5562","authenticated-orcid":false,"given":"Yanjun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,7]]},"reference":[{"issue":"3&4","key":"7252_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313\u2013336","journal-title":"IBM Syst J"},{"issue":"13","key":"7252_CR2","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768\u20132786","journal-title":"Inf Sci"},{"key":"7252_CR3","doi-asserted-by":"crossref","unstructured":"Chang C C, Chou Y C, Kieu T D (2008) An information hiding scheme using Sudoku. In Proceedings of the Third International Conference on Innovative Computing, Information and Control (Dalian, China, June 18\u201320, 2008):17\u201322","DOI":"10.1109\/ICICIC.2008.149"},{"issue":"7","key":"7252_CR4","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.patcog.2008.11.040","volume":"42","author":"CC Chang","year":"2009","unstructured":"Chang CC, Kieu TD, Wu WC (2009) A loss-less data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597\u20131603","journal-title":"Pattern Recogn"},{"key":"7252_CR5","doi-asserted-by":"crossref","unstructured":"Chang C C, Liu Y, Nguyen T S (2014) A novel turtle shell based scheme for data hiding. In Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (Kitakyushu, Japan, August 27\u201329, 2014): 89\u201393","DOI":"10.1109\/IIH-MSP.2014.29"},{"issue":"6","key":"7252_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MCOM.1978.1089771","volume":"16","author":"RM Davis","year":"1978","unstructured":"Davis RM (1978) The data encryption standard in perspective. IEEE Commun Soc Mag 16(6):5\u20139","journal-title":"IEEE Commun Soc Mag"},{"issue":"9","key":"7252_CR7","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1016\/j.patcog.2006.02.005","volume":"39","author":"YC Hu","year":"2006","unstructured":"Hu YC (2006) High capacity image hiding scheme based on vector quantization. Pattern Recogn 39(9):1715\u20131724","journal-title":"Pattern Recogn"},{"issue":"9","key":"7252_CR8","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","volume":"26","author":"F Huang","year":"2016","unstructured":"Huang F, Qu X, Kim HJ, Huang J (2016) Reversible data hiding in JPEG images. IEEE Trans Circuits Syst Video Technol 26(9):1610\u20131621","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"7252_CR9","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-30114-1_8","volume":"3200","author":"AD Ker","year":"2004","unstructured":"Ker AD (2004) Improved detection of LSB steganography in grayscale images. Proc Inform Hiding Workshop 3200:97\u2013115","journal-title":"Proc Inform Hiding Workshop"},{"issue":"2","key":"7252_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.camwa.2010.01.006","volume":"60","author":"HJ Kim","year":"2010","unstructured":"Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction schemes. Comput Math Appl 60(2):319\u2013325","journal-title":"Comput Math Appl"},{"issue":"2","key":"7252_CR11","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1049\/iet-ipr.2014.1015","volume":"10","author":"Y Liu","year":"2016","unstructured":"Liu Y, Chang CC, Nguyen TS (2016) High capacity turtle shell-based data hiding. IET Image Process 10(2):130\u2013137","journal-title":"IET Image Process"},{"key":"7252_CR12","doi-asserted-by":"crossref","unstructured":"Liu Y, Chang C C, Huang P C (2017) Extended exploiting-modification-direction data hiding with high capacity. 2017 International Conference on Video and Image Processing (Singapore, Dec. 27\u201329, 2017): 151\u2013155","DOI":"10.1145\/3177404.3177452"},{"issue":"1","key":"7252_CR13","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3390\/sym10010019","volume":"10","author":"Y Liu","year":"2018","unstructured":"Liu Y, Chang CC, Huang PC (2018) Efficient information hiding based on theory of numbers. Symmetry 10(1):19","journal-title":"Symmetry"},{"issue":"5","key":"7252_CR14","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Proc Lett 13(5):285\u2013287","journal-title":"IEEE Signal Proc Lett"},{"issue":"15","key":"7252_CR15","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Hsu T (2015) Reversible data hiding scheme based on exploiting modification direction with two Steganographic images. Multimed Tools Appl 74(15):5861\u20135872","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"7252_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest R, Shamir A, Adleman L (1978) A scheme for obtaining digital signature and public key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"issue":"11","key":"7252_CR17","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7252-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7252-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7252-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T19:09:49Z","timestamp":1581016189000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7252-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,7]]},"references-count":17,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["7252"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7252-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,7]]},"assertion":[{"value":"13 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}