{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:19:12Z","timestamp":1770275952327,"version":"3.49.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T00:00:00Z","timestamp":1599177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T00:00:00Z","timestamp":1599177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61702305"],"award-info":[{"award-number":["61702305"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09686-9","type":"journal-article","created":{"date-parts":[[2020,9,4]],"date-time":"2020-09-04T11:02:56Z","timestamp":1599217376000},"page":"711-735","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["An adaptive reversible watermarking in IWT domain"],"prefix":"10.1007","volume":"80","author":[{"given":"Lingzhuang","family":"Meng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4400-6490","authenticated-orcid":false,"given":"Lianshan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Xiaoli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,4]]},"reference":[{"issue":"1","key":"9686_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCI.2018.2794065","volume":"4","author":"B Ahmaderaghi","year":"2018","unstructured":"Ahmaderaghi B, Kurugollu F, Rincon JMD, Bouridane A (2018) Blind image watermark detection algorithm based on discrete Shearlet transform using statistical decision theory. IEEE Transact Comput Imaging 4(1):46\u201359. https:\/\/doi.org\/10.1109\/TCI.2018.2794065","journal-title":"IEEE Transact Comput Imaging"},{"key":"9686_CR2","doi-asserted-by":"crossref","unstructured":"Alattar AM (2004) Reversible watermark using difference expansion of quads. In: IEEE International Conference on Acoustics","DOI":"10.1201\/9781420038262.pt4"},{"issue":"8","key":"9686_CR3","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"9686_CR4","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jss.2010.08.055","volume":"84","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi OM, Khoo BE (2011) High capacity data hiding schemes for medical images based on difference expansion. J Syst Softw 84(1):105\u2013112","journal-title":"J Syst Softw"},{"key":"9686_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5815\/ijcnis.2018.05.04","volume":"10","author":"VT Ashwag Alrehily","year":"2018","unstructured":"Ashwag Alrehily VT (2018) Computer security and software watermarking based on return-oriented programming. Int J Comp Netw Info Secur (IJCNIS) 10:28\u201336. https:\/\/doi.org\/10.5815\/ijcnis.2018.05.04","journal-title":"Int J Comp Netw Info Secur (IJCNIS)"},{"key":"9686_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.future.2018.07.051","volume":"90","author":"B Carpentieri","year":"2019","unstructured":"Carpentieri B, Castiglione A, De Santis A, Palmieri F, Pizzolante R (2019) One-pass lossless data hiding and compression of remote sensing data. Futur Gener Comput Syst 90:222\u2013239. https:\/\/doi.org\/10.1016\/j.future.2018.07.051","journal-title":"Futur Gener Comput Syst"},{"key":"9686_CR7","doi-asserted-by":"crossref","unstructured":"Chen X, Li X, Yang B, Tang Y (2010) Reversible image watermarking based on a generalized integer transform. In: IEEE International Conference on Acoustics Speech & Signal Processing","DOI":"10.1109\/ICASSP.2010.5496175"},{"issue":"1","key":"9686_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s11042-012-1332-5","volume":"72","author":"F Chen","year":"2014","unstructured":"Chen F, He H, Tai HM, Wang H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl 72(1):41\u201356","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"9686_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.chaos.2003.12.104","volume":"22","author":"Z Dawei","year":"2004","unstructured":"Dawei Z, Guanrong C, Wenbo L (2004) A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons Fractals 22(1):47\u201354. https:\/\/doi.org\/10.1016\/j.chaos.2003.12.104","journal-title":"Chaos, Solitons Fractals"},{"issue":"5","key":"9686_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIP.2016.2549458","volume":"25","author":"IC Dragoi","year":"2016","unstructured":"Dragoi IC, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25(5):1\u20131","journal-title":"IEEE Trans Image Process"},{"key":"9686_CR11","doi-asserted-by":"crossref","unstructured":"Ghardallou A, Kricha A, Sakly A, Mtibaa A (2016) Adaptive block sized reversible watermarking scheme based on integer transform. In: International Conference on Sciences & Techniques of Automatic Control & Computer Engineering","DOI":"10.1109\/STA.2016.7952069"},{"issue":"12","key":"9686_CR12","doi-asserted-by":"publisher","first-page":"4947","DOI":"10.1007\/s12652-019-01179-4","volume":"10","author":"A Girdhar","year":"2019","unstructured":"Girdhar A, Kumar V (2019) A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map. J Ambient Intell Humaniz Comput 10(12):4947\u20134961. https:\/\/doi.org\/10.1007\/s12652-019-01179-4","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"5","key":"9686_CR13","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1007\/s12652-018-1158-8","volume":"11","author":"S Gull","year":"2020","unstructured":"Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 11(5):1799\u20131808. https:\/\/doi.org\/10.1007\/s12652-018-1158-8","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"9686_CR14","doi-asserted-by":"publisher","unstructured":"Haghighi BB, Taherinia AH, Monsefi R (2020) An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network. Cogn Comput 28. https:\/\/doi.org\/10.1007\/s12559-019-09700-9","DOI":"10.1007\/s12559-019-09700-9"},{"key":"9686_CR15","doi-asserted-by":"crossref","unstructured":"Hsu L-Y, Hu H-T (2019) A reinforced blind color image watermarking scheme based on Schur decomposition. IEEE Access (99):1\u20131","DOI":"10.1109\/ACCESS.2019.2932077"},{"key":"9686_CR16","first-page":"1","volume":"99","author":"W-W Hu","year":"2019","unstructured":"Hu W-W, Zhou R-G, El-Rafei A, Jiang S-X (2019) Quantum image watermarking algorithm based on Haar wavelet transform. IEEE Access PP 99:1\u20131","journal-title":"IEEE Access PP"},{"issue":"2","key":"9686_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/lsp.2010.2095498","volume":"18","author":"SW Jung","year":"2011","unstructured":"Jung SW, Ha LT, Ko SJ (2011) A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Signal Process Lett 18(2):95\u201398. https:\/\/doi.org\/10.1109\/lsp.2010.2095498","journal-title":"IEEE Signal Process Lett"},{"issue":"13","key":"9686_CR18","first-page":"39","volume":"99","author":"R Kaur","year":"2014","unstructured":"Kaur R, Singh J (2014) Reversible watermarking based on entropy masking with histogram shifting. Int J Comput Appl 99(13):39\u201343","journal-title":"Int J Comput Appl"},{"key":"9686_CR19","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1080\/13682199.2016.1240945","volume":"64","author":"M Kuslu","year":"2016","unstructured":"Kuslu M, Yalman Y (2016) A reversible data hiding method without rounding based on Haar wavelet transform: NON-R. Imaging Sci J 64:471\u2013479","journal-title":"Imaging Sci J"},{"issue":"3","key":"9686_CR20","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transact Info Foren Secur 2(3):321\u2013330","journal-title":"IEEE Transact Info Foren Secur"},{"key":"9686_CR21","doi-asserted-by":"crossref","unstructured":"Li X, Li J (2014) Research on image digital watermarking based on wavelet transform and grey relational analysis. In: International Computer Conference on Wavelet Active Media Technology & Information Processing","DOI":"10.1109\/ICCWAMTIP.2013.6716623"},{"key":"9686_CR22","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1007\/s11042-017-4388-4","volume":"77","author":"F Li","year":"2017","unstructured":"Li F, Mao Q, Chang CC (2017) Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed Tools Appl 77:5149\u20135168","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"9686_CR23","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"CC Lin","year":"2008","unstructured":"Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582\u20133591","journal-title":"Pattern Recogn"},{"issue":"5","key":"9686_CR24","doi-asserted-by":"publisher","first-page":"6355","DOI":"10.1007\/s11042-018-6361-2","volume":"78","author":"XY Liu","year":"2019","unstructured":"Liu XY, Wang YF, Du JY, Liao SH, Lou JT, Zou BJ (2019) Robust hybrid image watermarking scheme based on KAZE features and IWT-SVD. Multimed Tools Appl 78(5):6355\u20136384. https:\/\/doi.org\/10.1007\/s11042-018-6361-2","journal-title":"Multimed Tools Appl"},{"key":"9686_CR25","doi-asserted-by":"publisher","first-page":"80849","DOI":"10.1109\/access.2019.2915596","volume":"7","author":"JX Liu","year":"2019","unstructured":"Liu JX, Huang JD, Luo YL, Cao C, Yang S, Wei DQ, Zhou RL (2019) An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7:80849\u201380860. https:\/\/doi.org\/10.1109\/access.2019.2915596","journal-title":"IEEE Access"},{"issue":"11","key":"9686_CR26","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s11128-018-2075-7","volume":"17","author":"G Luo","year":"2018","unstructured":"Luo G, Zhou R-G, Hu W, Luo J, Liu X, Ian H (2018) Enhanced least significant qubit watermarking scheme for quantum images. Quantum Inf Process 17(11):299. https:\/\/doi.org\/10.1007\/s11128-018-2075-7","journal-title":"Quantum Inf Process"},{"key":"9686_CR27","doi-asserted-by":"crossref","unstructured":"Meerwald P, Uhl A (2001) Survey of wavelet-domain watermarking algorithms, vol 4314. Photonics West 2001 - Electronic Imaging. SPIE","DOI":"10.1117\/12.435434"},{"issue":"3\u20134","key":"9686_CR28","doi-asserted-by":"publisher","first-page":"2031","DOI":"10.1007\/s11042-019-08271-z","volume":"79","author":"N Mehallegue","year":"2020","unstructured":"Mehallegue N, Loukhaoukha K, Zebbiche K, Refaey A, Djellab M (2020) Ambiguity attacks on SVD audio watermarking approach using chaotic encrypted images. Multimed Tools Appl 79(3\u20134):2031\u20132045. https:\/\/doi.org\/10.1007\/s11042-019-08271-z","journal-title":"Multimed Tools Appl"},{"key":"9686_CR29","doi-asserted-by":"crossref","unstructured":"Nagarju P, Naskar R, Chakraborty RS (2013) Improved histogram bin shifting based reversible watermarking. In: International Conference on Intelligent Systems & Signal Processing","DOI":"10.1109\/ISSP.2013.6526875"},{"issue":"11","key":"9686_CR30","doi-asserted-by":"publisher","first-page":"13721","DOI":"10.1007\/s11042-017-4986-1","volume":"77","author":"K Naik","year":"2018","unstructured":"Naik K, Trivedy S, Pal AK (2018) An IWT based blind and robust image watermarking scheme using secret key matrix. Multimed Tools Appl 77(11):13721\u201313752","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"9686_CR31","doi-asserted-by":"publisher","first-page":"16433","DOI":"10.1007\/s11042-018-7029-7","volume":"78","author":"AF Qasim","year":"2019","unstructured":"Qasim AF, Aspin R, Meziane F, Hogg P (2019) ROI-based reversible watermarking scheme for ensuring the integrity and authenticity of DICOM MR images. Multimed Tools Appl 78(12):16433\u201316463. https:\/\/doi.org\/10.1007\/s11042-018-7029-7","journal-title":"Multimed Tools Appl"},{"key":"9686_CR32","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/access.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi Y-Q, Li X, Zhang X, Wu H-T, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210\u20133237. https:\/\/doi.org\/10.1109\/access.2016.2573308","journal-title":"IEEE Access"},{"key":"9686_CR33","doi-asserted-by":"crossref","unstructured":"Subburam S, Selvakumar S, Geetha S (2017) High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multimed Tools Appl","DOI":"10.1007\/s11042-017-4622-0"},{"key":"9686_CR34","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"WL Tai","year":"2009","unstructured":"Tai WL, Yeh CM, Chang CC (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Transact Circ Systems Vid Technol 19:906\u2013910","journal-title":"IEEE Transact Circ Systems Vid Technol"},{"issue":"1","key":"9686_CR35","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11042-015-3055-x","volume":"76","author":"R Thabit","year":"2017","unstructured":"Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76(1):309\u2013332. https:\/\/doi.org\/10.1007\/s11042-015-3055-x","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"9686_CR36","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1007\/s12652-019-01295-1","volume":"11","author":"RM Thanki","year":"2020","unstructured":"Thanki RM, Kothari AM (2020) Hybrid domain watermarking technique for copyright protection of images using speech watermarks. J Ambient Intell Humaniz Comput 11(5):1835\u20131857. https:\/\/doi.org\/10.1007\/s12652-019-01295-1","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"11","key":"9686_CR37","doi-asserted-by":"publisher","first-page":"1986","DOI":"10.1049\/iet-ipr.2019.0038","volume":"13","author":"R Uyyala","year":"2019","unstructured":"Uyyala R, Pal R, Prasad MVNK (2019) Reversible data hiding using B-tree triangular decomposition based prediction. IET Image Process 13(11):1986\u20131997","journal-title":"IET Image Process"},{"issue":"15","key":"9686_CR38","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1016\/j.patrec.2004.06.012","volume":"25","author":"Y Wang","year":"2004","unstructured":"Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recogn Lett 25(15):1681\u20131689","journal-title":"Pattern Recogn Lett"},{"issue":"6","key":"9686_CR39","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1109\/lsp.2010.2046930","volume":"17","author":"X Wang","year":"2010","unstructured":"Wang X, Li XL, Yang B, Guo ZM (2010) Efficient generalized integer transform for reversible watermarking. IEEE Signal Process Lett 17(6):567\u2013570. https:\/\/doi.org\/10.1109\/lsp.2010.2046930","journal-title":"IEEE Signal Process Lett"},{"key":"9686_CR40","doi-asserted-by":"publisher","first-page":"8882","DOI":"10.1109\/access.2018.2810058","volume":"6","author":"YL Wang","year":"2018","unstructured":"Wang YL, Gong DF, Lu B, Xiang F, Liu FL (2018) Exception handling-based dynamic software watermarking. IEEE Access 6:8882\u20138889. https:\/\/doi.org\/10.1109\/access.2018.2810058","journal-title":"IEEE Access"},{"key":"9686_CR41","doi-asserted-by":"crossref","unstructured":"Wen J, Lei J, Wan Y (2012) Adaptive reversible data hiding through autoregression. In: International Conference on Information Science & Technology","DOI":"10.1109\/ICIST.2012.6221765"},{"issue":"2","key":"9686_CR42","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/s12083-018-0709-2","volume":"13","author":"CY Weng","year":"2020","unstructured":"Weng CY (2020) DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images. Peer Peer Netw Appl 13(2):514\u2013523. https:\/\/doi.org\/10.1007\/s12083-018-0709-2","journal-title":"Peer Peer Netw Appl"},{"key":"9686_CR43","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1007\/s11045-017-0497-5","volume":"29","author":"L Xiong","year":"2017","unstructured":"Xiong L, Xu Z, Shi YQ (2017) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29:1191\u20131202","journal-title":"Multidim Syst Sign Process"},{"key":"9686_CR44","doi-asserted-by":"publisher","unstructured":"Yousefi S, Rabiee HR, Yousefi E, Ghanbari M (2007) Reversible date hiding using multi level integer wavelet decomposition and intelligent coefficient selection. 2007 IEEE International Conference on Multimedia and Expo:2130\u20132133. https:\/\/doi.org\/10.1109\/ICME.2007.4285104","DOI":"10.1109\/ICME.2007.4285104"},{"issue":"3","key":"9686_CR45","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s11554-018-0845-1","volume":"16","author":"T Zhang","year":"2019","unstructured":"Zhang T, Li X, Qi W, Li W, Guo Z (2019) Real-time reversible data hiding based on multiple histogram modification. J Real-Time Image Proc 16(3):661\u2013671. https:\/\/doi.org\/10.1007\/s11554-018-0845-1","journal-title":"J Real-Time Image Proc"},{"key":"9686_CR46","doi-asserted-by":"crossref","unstructured":"Zhou RG, Hu W, Fan P Quantum watermarking scheme through Arnold scrambling and LSB steganography. Quantum Inf Process 16(9):212","DOI":"10.1007\/s11128-017-1640-9"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09686-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09686-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09686-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T02:14:18Z","timestamp":1630721658000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09686-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,4]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9686"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09686-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,4]]},"assertion":[{"value":"20 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}