{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:07:48Z","timestamp":1744157268227,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T00:00:00Z","timestamp":1552348800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Statistical Research of China","award":["No. 2015LZ59"],"award-info":[{"award-number":["No. 2015LZ59"]}]},{"name":"Key Projects of National Natural Science Foundation of China","award":["No. 61433012"],"award-info":[{"award-number":["No. 61433012"]}]},{"name":"Qingdao Scientific Development Plan of China","award":["No. KJZD-13-28-JCH"],"award-info":[{"award-number":["No. KJZD-13-28-JCH"]}]},{"name":"Natural Science Foundation of Shandong Province of China","award":["No. ZR2014JL044"],"award-info":[{"award-number":["No. ZR2014JL044"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-019-7380-3","type":"journal-article","created":{"date-parts":[[2019,3,13]],"date-time":"2019-03-13T13:13:25Z","timestamp":1552482805000},"page":"21041-21064","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Digital image self-recovery algorithm based on improved joint source-channel coding optimizer"],"prefix":"10.1007","volume":"78","author":[{"given":"Yuying","family":"Gu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6237-3302","authenticated-orcid":false,"given":"Hongmei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhongying","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,12]]},"reference":[{"issue":"6","key":"7380_CR1","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/LSP.2016.2559805","volume":"23","author":"N Baig","year":"2016","unstructured":"Baig N, Riaz MM, Ghafoor A, Siddiqui AM (2016) Image Dehazing Using Quadtree Decomposition and Entropy-Based Contextual Regularization. IEEE Signal Processing Letters 23(6):853\u2013857","journal-title":"IEEE Signal Processing Letters"},{"issue":"4","key":"7380_CR2","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1109\/LCOMM.2018.2804382","volume":"22","author":"C Chen","year":"2018","unstructured":"Chen C, Wang L, Liu S (2018) The design of protograph LDPC codes as source codes in a JSCC system. IEEE Commun Lett 22(4):672\u2013675","journal-title":"IEEE Commun Lett"},{"issue":"99","key":"7380_CR3","first-page":"1","volume":"PP","author":"HW Chung","year":"2017","unstructured":"Chung HW, Sadler BM, Zheng L, Hero AO (2017) Unequal error protection querying policies for the noisy 20 questions problem. Journal PP(99):1\u20131","journal-title":"Journal"},{"issue":"10","key":"7380_CR4","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.image.2014.09.001","volume":"29","author":"S Dadkhah","year":"2014","unstructured":"Dadkhah S, Abd Manaf A, Hori Y, Hassanien AE, Sadeghi S (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197\u20131210","journal-title":"Signal Process Image Commun"},{"key":"7380_CR5","first-page":"792","volume":"3","author":"J Fridrich","year":"1999","unstructured":"Fridrich J, Goljan M (1999) Images with self-correcting capabilities. Int Conference Image Proc 3:792\u2013796","journal-title":"Int Conference Image Proc"},{"issue":"8","key":"7380_CR6","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1016\/j.sigpro.2009.02.009","volume":"89","author":"HJ He","year":"2009","unstructured":"He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89(8):1557\u20131566","journal-title":"Signal Process"},{"issue":"99","key":"7380_CR7","first-page":"1","volume":"PP","author":"L Jin","year":"2018","unstructured":"Jin L, Yang H (2018) Joint source-channel polarization with side information. IEEE Access PP(99):1\u20131","journal-title":"IEEE Access"},{"key":"7380_CR8","doi-asserted-by":"crossref","unstructured":"Korus P, Dziech A (2011) A novel approach to adaptive image authentication. IEEE international conference on image processing, pp 2765\u20132768","DOI":"10.1109\/ICIP.2011.6116243"},{"issue":"3","key":"7380_CR9","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1109\/TIP.2012.2227769","volume":"22","author":"P Korus","year":"2013","unstructured":"Korus P, Dziech A (2013) Efficient method for content reconstruction with self-embedding. IEEE Trans Image Process 22(3):1134\u20131147","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"7380_CR10","first-page":"1","volume":"59","author":"Du Ling","year":"2016","unstructured":"Ling D u, Cao X, Zhang W, Zhang X, Liu N (2016) Semi-fragile watermarking for image authentication based on compressive sensing. Sci China 59 (5):1\u20133","journal-title":"Sci China"},{"issue":"3","key":"7380_CR11","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1109\/TIP.2018.2875363","volume":"28","author":"M Liu","year":"2019","unstructured":"Liu M, Nie L, Wang X, Tian Q, Chen B (2019) Online data organizer: Micro-video categorization by structure-guided multimodal dictionary learning[J]. IEEE Trans Image Process 28(3):1235\u20131247","journal-title":"IEEE Trans Image Process"},{"issue":"C","key":"7380_CR12","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.sigpro.2015.10.023","volume":"123","author":"Z Liu","year":"2016","unstructured":"Liu Z, Zhang F, Wang J, Wang H, Huang J (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123(C):157\u2013166","journal-title":"Signal Process"},{"issue":"2","key":"7380_CR13","doi-asserted-by":"publisher","first-page":"118","DOI":"10.2200\/S00714ED1V01Y201603ICR048","volume":"8","author":"L Nie","year":"2016","unstructured":"Nie L, Song X, Chua TS (2016) Learning from multiple social networks[J]. Synthesis Lectures on Information Concepts Retrieval & Services 8(2):118","journal-title":"Synthesis Lectures on Information Concepts Retrieval & Services"},{"key":"7380_CR14","volume-title":"Numerical optimization[M]","author":"J Nocedal","year":"2006","unstructured":"Nocedal J, Wright SJ (2006) Numerical optimization[M]. Springer, Berlin"},{"issue":"2","key":"7380_CR15","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.dsp.2010.04.006","volume":"21","author":"Z Qian","year":"2011","unstructured":"Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Process 21(2):278\u2013286","journal-title":"Digital Signal Process"},{"issue":"11","key":"7380_CR16","doi-asserted-by":"publisher","first-page":"1672","DOI":"10.1109\/LSP.2016.2585580","volume":"23","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhang X, Feng G (2016) Reversible data hiding in encrypted images based on progressive recovery. IEEE Signal Process Lett 23(11):1672\u20131676","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"7380_CR17","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.1007\/s11042-015-3218-9","volume":"76","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Wang J, Chang CC (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267\u20132287","journal-title":"Multimed Tools Appl"},{"issue":"C","key":"7380_CR18","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138 (C):280\u2013293","journal-title":"Signal Process"},{"issue":"C","key":"7380_CR19","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","volume":"31","author":"C Qin","year":"2015","unstructured":"Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31(C):154\u2013164","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"7380_CR20","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/76.499834","volume":"6","author":"A Said","year":"1996","unstructured":"Said A, Pearlman WA (1996) A new fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circuits Syst Video Technol 6(3):243\u2013250","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"7380_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11760-017-1095-6","volume":"11","author":"S Sarreshtedari","year":"2017","unstructured":"Sarreshtedari S, Abbasfar A, Akhaee MA (2017) A joint source-channel coding approach to digital image self-recovery. Signal Image & Video Processing 11(7):1\u20138","journal-title":"Signal Image & Video Processing"},{"issue":"7","key":"7380_CR22","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TIP.2015.2414878","volume":"24","author":"S Sarreshtedari","year":"2015","unstructured":"Sarreshtedari S, Akhaee MA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24(7):2266\u20132277","journal-title":"IEEE Trans Image Process"},{"issue":"12","key":"7380_CR23","doi-asserted-by":"publisher","first-page":"3445","DOI":"10.1109\/78.258085","volume":"41","author":"JM Shapiro","year":"1993","unstructured":"Shapiro JM (1993) Embedded image coding using zerotrees of wavelet coefficients. IEEE Trans Signal Process 41(12):3445\u20133462","journal-title":"IEEE Trans Signal Process"},{"issue":"14","key":"7380_CR24","doi-asserted-by":"publisher","first-page":"8165","DOI":"10.1007\/s11042-015-2736-9","volume":"75","author":"P Singh","year":"2016","unstructured":"Singh P, Agarwal S (2016) An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multimed Tools Appl 75(14):8165\u20138194","journal-title":"Multimed Tools Appl"},{"key":"7380_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/9780470546345","volume-title":"Reed-solomon codes and their applications, vol 583-584","author":"SB Wicker","year":"1999","unstructured":"Wicker SB, Bhargava VK (1999) Reed-solomon codes and their applications, vol 583-584. Wiley, Hoboken"},{"issue":"3","key":"7380_CR26","doi-asserted-by":"publisher","first-page":"3899","DOI":"10.1007\/s11042-016-4049-z","volume":"76","author":"Z Yin","year":"2017","unstructured":"Yin Z, Abel A, Tang J, Zhang X, Luo B (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimed Tools Appl 76(3):3899\u20133920","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"7380_CR27","first-page":"1","volume":"8","author":"Z Yin","year":"2016","unstructured":"Yin Z, Niu X, Zhou Z, Tang J, Luo B (2016) Improved reversible image authentication scheme. Congnitive Computation 8(5):1\u201310","journal-title":"Congnitive Computation"},{"issue":"2","key":"7380_CR28","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s11042-010-0541-z","volume":"54","author":"X Zhang","year":"2011","unstructured":"Zhang X, Wang S, Qian Z, Feng G (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54(2):385\u2013395","journal-title":"Multimed Tools Appl"},{"key":"7380_CR29","unstructured":"Bows2 (at) gipsa-lab (dot) grenoble-inp (dot) fr (2012) The dataset from the 2nd bows contest. [DB\/OL]. Available: \n                    http:\/\/bows2.ec-lille.fr\/"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7380-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7380-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7380-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T20:18:47Z","timestamp":1583871527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7380-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,12]]},"references-count":29,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7380"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7380-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,3,12]]},"assertion":[{"value":"28 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}