{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T18:33:07Z","timestamp":1769020387109,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T00:00:00Z","timestamp":1602115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09823-4","type":"journal-article","created":{"date-parts":[[2020,10,8]],"date-time":"2020-10-08T04:02:43Z","timestamp":1602129763000},"page":"5617-5652","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Improved center-folding based directional pixel value ordering for reversible data hiding scheme"],"prefix":"10.1007","volume":"80","author":[{"given":"Sudipta","family":"Meikap","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4476-3459","authenticated-orcid":false,"given":"Biswapati","family":"Jana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,8]]},"reference":[{"issue":"8","key":"9823_CR1","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"key":"9823_CR2","doi-asserted-by":"crossref","unstructured":"Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two steganographic images. In: TENCON 2007\u20132007 IEEE Region 10 conference. IEEE, pp 1\u20134","DOI":"10.1109\/TENCON.2007.4483783"},{"key":"9823_CR3","doi-asserted-by":"crossref","unstructured":"Chang CC, Chou YC, Kieu TD (2009) Information hiding in dual images with reversibility. In: 2009 Third international conference on multimedia and ubiquitous engineering. IEEE, pp 145\u2013152","DOI":"10.1109\/MUE.2009.35"},{"key":"9823_CR4","doi-asserted-by":"crossref","unstructured":"Chang CC, Lu TC, Horng G, Huang YH, Hsu YM (2013) A high payload data embedding scheme using dual stego-images with reversibility. In: 2013 9th International conference on information, communications & signal processing. IEEE, pp 1\u20135","DOI":"10.1109\/ICICS.2013.6782790"},{"issue":"3","key":"9823_CR5","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"Coltuc D (2011) Improved embedding for prediction-based reversible watermarking. IEEE Trans Inf Forensics Secur 6(3):873\u2013882","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9823_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 workshop on multimedia and security: new challenges, pp 27\u201330","DOI":"10.1145\/1232454.1232466"},{"issue":"2","key":"9823_CR7","first-page":"250","volume":"19","author":"Y Hu","year":"2008","unstructured":"Hu Y, Lee HK, Li J (2008) DE-based reversible data hiding with improved overflow location map. IEEE Trans Circ Syst Video Technol 19(2):250\u2013260","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"3","key":"9823_CR8","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"HJ Kim","year":"2008","unstructured":"Kim HJ, Sachnev V, Shi YQ, Nam J, Choo HG (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3(3):456\u2013465","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9823_CR9","unstructured":"Kodak Lossless True Color Image Suite, http:\/\/r0k.us\/graphics\/kodak\/. Accessed 11 Dec 2017"},{"issue":"4","key":"9823_CR10","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","volume":"52","author":"CF Lee","year":"2013","unstructured":"Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52 (4):2237\u20132247","journal-title":"Telecommun Syst"},{"issue":"6","key":"9823_CR11","doi-asserted-by":"publisher","first-page":"2097","DOI":"10.1016\/j.patcog.2007.11.018","volume":"41","author":"CC Lee","year":"2008","unstructured":"Lee CC, Wu HC, Tsai CS, Chu YP (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognit 41 (6):2097\u20132106","journal-title":"Pattern Recognit"},{"key":"9823_CR12","doi-asserted-by":"crossref","unstructured":"Lee CF, Wang KH, Chang CC, Huang YL (2009) A reversible data hiding scheme based on dual steganographic images. In: Proceedings of the 3rd international conference on ubiquitous information management and communication, pp 228\u2013237","DOI":"10.1145\/1516241.1516281"},{"issue":"12","key":"9823_CR13","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2156803","volume":"20","author":"X Li","year":"2011","unstructured":"Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20(12):3524\u20133533","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"9823_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93(1):198\u2013205","journal-title":"Signal Process"},{"issue":"2","key":"9823_CR15","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.csi.2008.05.009","volume":"31","author":"DC Lou","year":"2009","unstructured":"Lou DC, Hu MC, Liu JL (2009) Multiple layer data hiding scheme for medical images. Comput Stand Interfaces 31(2):329\u2013335","journal-title":"Comput Stand Interfaces"},{"key":"9823_CR16","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.sigpro.2014.08.022","volume":"108","author":"TC Lu","year":"2015","unstructured":"Lu TC, Tseng CY, Wu JH (2015) Dual imaging-based reversible hiding technique using LSB matching. Signal Process 108:77\u201389","journal-title":"Signal Process"},{"key":"9823_CR17","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.sigpro.2015.03.017","volume":"115","author":"TC Lu","year":"2015","unstructured":"Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Signal Process 115:195\u2013213","journal-title":"Signal Process"},{"key":"9823_CR18","doi-asserted-by":"publisher","unstructured":"Lu TC, Huang SR, Huang SW (2020) Reversible hiding method for interpolation images featuring a multilayer center folding strategy. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-020-05129-7","DOI":"10.1007\/s00500-020-05129-7"},{"issue":"23","key":"9823_CR19","doi-asserted-by":"publisher","first-page":"31281","DOI":"10.1007\/s11042-018-6203-2","volume":"77","author":"S Meikap","year":"2018","unstructured":"Meikap S, Jana B (2018) Directional PVO for reversible data hiding scheme with image interpolation. Multimed Tools Appl 77(23):31281\u201331311","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"9823_CR20","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s42452-019-0659-1","volume":"1","author":"S Meikap","year":"2019","unstructured":"Meikap S, Jana B (2019) Directional pixel value ordering based secret sharing using sub-sampled image exploiting Lagrange polynomial. SN Appl Sci 1 (6):645","journal-title":"SN Appl Sci"},{"key":"9823_CR21","unstructured":"Nottingham Trent University, UCID Image Database. http:\/\/jasoncantarella.com\/downloads\/ucid.v2.tar.gz. Accessed 6 Nov 2019"},{"key":"9823_CR22","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.jvcir.2016.03.011","volume":"38","author":"B Ou","year":"2016","unstructured":"Ou B, Li X, Wang J (2016) Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification. J Vis Commun Image Represent 38:328\u2013339","journal-title":"J Vis Commun Image Represent"},{"key":"9823_CR23","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.dsp.2013.11.002","volume":"25","author":"F Peng","year":"2014","unstructured":"Peng F, Li X, Yang B (2014) Improved PVO-based reversible data hiding. Digit Signal Process 25:255\u2013265","journal-title":"Digit Signal Process"},{"issue":"15","key":"9823_CR24","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861\u20135872","journal-title":"Multimed Tools Appl"},{"key":"9823_CR25","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2015.01.002","volume":"111","author":"X Qu","year":"2015","unstructured":"Qu X, Kim HJ (2015) Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process 111:249\u2013260","journal-title":"Signal Process"},{"issue":"7","key":"9823_CR26","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circ Syst Video Technol 19(7):989\u2013999","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"9823_CR27","unstructured":"The National Library of Medicine presents MedPix\u00ae, https:\/\/openi.nlm.nih.gov\/gridquery.php?q=&it=x. Accessed 11 Dec 2017"},{"issue":"3","key":"9823_CR28","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodr\u00edguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721\u2013730","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"9823_CR29","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Vid Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"9823_CR30","unstructured":"University of California, Berkeley, \u201cThe Berkeley Segmentation Dataset and Benchmark\u201d, http:\/\/www.eecs.berkeley.edu\/Research\/Projects\/CS\/vision\/grouping\/BSR\/BSR_bsds500.tgz. Accessed 11 Dec 2017"},{"key":"9823_CR31","unstructured":"University of Southern California, \u201cThe USC-SIPI Image Database\u201d, http:\/\/sipi.usc.edu\/database\/database.php?volume=misc. Accessed 11 Dec 2017"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09823-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09823-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09823-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,8]],"date-time":"2021-10-08T13:59:50Z","timestamp":1633701590000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09823-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,8]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9823"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09823-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,8]]},"assertion":[{"value":"27 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}