{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T06:50:53Z","timestamp":1759042253223},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:00:00Z","timestamp":1552608000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-019-7425-7","type":"journal-article","created":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T05:24:47Z","timestamp":1552627487000},"page":"21223-21244","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A low bit-rate SOC-based reversible data hiding algorithm by using new encoding strategies"],"prefix":"10.1007","volume":"78","author":[{"given":"Zhibin","family":"Pan","sequence":"first","affiliation":[]},{"given":"Erdun","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ruoxin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Lingfei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"issue":"2","key":"7425_CR1","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Sable E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"7425_CR2","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1016\/j.patrec.2004.04.003","volume":"25","author":"CC Chang","year":"2004","unstructured":"Chang CC, Chen GM, Lin MH (2004) Information hiding based on search-order coding for VQ indices. Pattern Recogn Lett 25(11):1253\u20131261","journal-title":"Pattern Recogn Lett"},{"key":"7425_CR3","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768\u20132786","journal-title":"Inf Sci"},{"issue":"6","key":"7425_CR4","doi-asserted-by":"publisher","first-page":"3537","DOI":"10.1007\/s11042-015-2463-2","volume":"75","author":"CC Chang","year":"2016","unstructured":"Chang CC, Lu TC, Horng G, Huang YH (2016) Very efficient variable-length codes for the lossless compression of VQ indices. Multimed Tools Appl 75(6):3537\u20133552","journal-title":"Multimed Tools Appl"},{"key":"7425_CR5","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.ins.2014.12.028","volume":"300","author":"CC Chang","year":"2015","unstructured":"Chang CC, Nguyen TS, Lin CC (2015) A reversible compression code hiding using SOC and SMVQ indices. Inf Sci 300:85\u201399","journal-title":"Inf Sci"},{"issue":"7","key":"7425_CR6","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.patcog.2008.11.040","volume":"42","author":"CC Chang","year":"2009","unstructured":"Chang CC, Wu WC (2009) A lossless data embedding technique by joint neighboring coding. Pattern Recogn 42(7):1597\u20131603","journal-title":"Pattern Recogn"},{"issue":"6","key":"7425_CR7","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W Diffie","year":"1977","unstructured":"Diffie W, Hellman ME (1977) Exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6):74\u201384","journal-title":"Computer"},{"key":"7425_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2001.918795","volume-title":"Invertible authentication watermark for JPEG images","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Du R (2001) Invertible authentication watermark for JPEG images. Proc. ITCC, Las Vegas"},{"key":"7425_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3626-0","volume-title":"Vector Quantization and Signal Compression","author":"A Gersho","year":"1992","unstructured":"Gersho A, Gray RM (1992) Vector Quantization and Signal Compression. Kluwer, Norwell"},{"key":"7425_CR10","first-page":"4","volume":"1","author":"RM Gray","year":"1984","unstructured":"Gray RM (1984) Vector quantization. IEEE Acoust Speech Signal Process 1:4\u201329","journal-title":"IEEE Acoust Speech Signal Process"},{"issue":"11","key":"7425_CR11","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1109\/83.541428","volume":"5","author":"CH Hsieh","year":"1996","unstructured":"Hsieh CH, Tsai JC (1996) Lossless compression of VQ index with search-order coding. IEEE Trans Image Process 5(11):1579\u20131582","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"7425_CR12","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"DA Huffman","year":"1952","unstructured":"Huffman DA (1952) A method for the construction of minimum redundancy codes. Proc IRE 40(9):1098\u20131101","journal-title":"Proc IRE"},{"issue":"12","key":"7425_CR13","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14(12):2082\u20132090","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"7425_CR14","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/83.136594","volume":"1","author":"T Kim","year":"1992","unstructured":"Kim T (1992) Side match and overlap match vector quantizers for images. IEEE Trans Image Process 1(4):170\u2013185","journal-title":"IEEE Trans Image Process"},{"key":"7425_CR15","doi-asserted-by":"crossref","unstructured":"Lee J, Chiou Y, Guo J (2013) Lossless data hiding for VQ indices based on neighboring correlation. Inf Sci:419\u2013438","DOI":"10.1016\/j.ins.2012.09.020"},{"key":"7425_CR16","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.ins.2012.09.020","volume":"221","author":"JD Lee","year":"2013","unstructured":"Lee JD, Chiou YH, Guo JM (2013) Lossless data hiding for VQ indices based on neighboring correlation. Inf Sci 221:419\u2013438","journal-title":"Inf Sci"},{"issue":"9","key":"7425_CR17","first-page":"2016","volume":"10","author":"X Li","year":"2017","unstructured":"Li X, Zhang W, Gui X (2017) Efficient Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Transactions on Information Forensics & Security 10(9):2016\u20132027","journal-title":"IEEE Transactions on Information Forensics & Security"},{"issue":"10","key":"7425_CR18","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1016\/j.jss.2012.05.032","volume":"85","author":"YK Lin","year":"2012","unstructured":"Lin YK (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85(10):2395\u20132404","journal-title":"J Syst Softw"},{"key":"7425_CR19","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.ins.2014.08.057","volume":"293","author":"CC Lin","year":"2015","unstructured":"Lin CC, Liu XL, Yuan SM (2015) Reversible data hiding for VQ-compressed images based on search-order coding and state-codebook mapping. Inf Sci 293:314\u2013326","journal-title":"Inf Sci"},{"key":"7425_CR20","unstructured":"Lin YC, Wang CC (1999) Digital images watermarking by vector quantization. Proc Natl Comput Symp:76\u201387"},{"issue":"1","key":"7425_CR21","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"28","author":"Y Linde","year":"1980","unstructured":"Linde Y, Buzo A, Gray RM (1980) An algorithm for vector quantizer design. IEEE Trans Commun 28(1):84\u201395","journal-title":"IEEE Trans Commun"},{"key":"7425_CR22","unstructured":"Liu Y, Nie L, Han L, et al (2016) Action2Activity: recognizing complex activities from sensor data. 1617\u20131623"},{"key":"7425_CR23","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","volume":"181","author":"Y Liu","year":"2016","unstructured":"Liu Y, Nie L, Liu L et al (2016) From action to activity: Sensor-based activity recognition. Neurocomputing 181:108\u2013115","journal-title":"Neurocomputing"},{"key":"7425_CR24","doi-asserted-by":"crossref","unstructured":"Pan ZB, Hu S, Ma XX (2015) A new lossless data hiding method based on joint neighboring coding method. JVis Commun Image Represent:14\u201323","DOI":"10.1016\/j.jvcir.2014.09.005"},{"key":"7425_CR25","doi-asserted-by":"publisher","first-page":"2863","DOI":"10.1016\/j.jss.2013.06.066","volume":"86","author":"ZB Pan","year":"2013","unstructured":"Pan ZB, Ma XX, Deng XM, Hu S (2013) Low bit-rate information hiding method based on search-order-coding technique. J Syst Softw 86:2863\u20132869","journal-title":"J Syst Softw"},{"issue":"3","key":"7425_CR26","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969\u2013978","journal-title":"IEEE Trans Image Process"},{"key":"7425_CR27","doi-asserted-by":"crossref","unstructured":"Qin C, Hu Y (2016) Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process:48\u201355","DOI":"10.1016\/j.sigpro.2016.05.032"},{"issue":"2","key":"7425_CR28","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.1007\/s11042-015-3218-9","volume":"76","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Wang J, Chang CC (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267\u20132287","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"7425_CR29","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.eswa.2014.09.001","volume":"42","author":"S Ramroach","year":"2015","unstructured":"Ramroach S (2015) A reversible steganographic scheme for VQ indices based on joint neighboring coding. Expert Syst Appl 42(2):713\u2013722","journal-title":"Expert Syst Appl"},{"issue":"2","key":"7425_CR30","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest R, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"issue":"7","key":"7425_CR31","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1093\/ietisy\/e89-d.7.2250","volume":"E89-D","author":"H Tang","year":"2006","unstructured":"Tang H, Kamata S (2006) A gradient based predictive coding for lossless image compression. IEICE Trans Inf Syst E89-D(7):2250\u20132256","journal-title":"IEICE Trans Inf Syst"},{"issue":"8","key":"7425_CR32","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"7425_CR33","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ins.2013.05.007","volume":"246","author":"WJ Wang","year":"2013","unstructured":"Wang WJ, Huang CT, Liu CM, Su PC, Wang SJ (2013) Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping. Inf Sci 246:69\u201382","journal-title":"Inf Sci"},{"issue":"19","key":"7425_CR34","doi-asserted-by":"publisher","first-page":"3332","DOI":"10.1016\/j.ins.2009.05.021","volume":"179","author":"JX Wang","year":"2009","unstructured":"Wang JX, Lu ZM (2009) A path optional lossless data hiding scheme based on VQ joint neighboring coding. Inf Sci 179(19):3332\u20133348","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7425-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7425-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7425-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:12:36Z","timestamp":1584144756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7425-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,15]]},"references-count":34,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7425"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7425-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,15]]},"assertion":[{"value":"30 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}