{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:36Z","timestamp":1740122916003,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2019B010137004"],"award-info":[{"award-number":["2019B010137004"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772208"],"award-info":[{"award-number":["61772208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"crossref","award":["x2js-D2190700"],"award-info":[{"award-number":["x2js-D2190700"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-020-09985-1","type":"journal-article","created":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T04:12:57Z","timestamp":1602648777000},"page":"30863-30877","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Reversible image visual transformation for privacy and content protection"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6462-7193","authenticated-orcid":false,"given":"Hao-Tian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Ruoyan","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[]},{"given":"Junhui","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,14]]},"reference":[{"issue":"3","key":"9985_CR1","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TIFS.2012.2187516","volume":"7","author":"T Bianchi","year":"2012","unstructured":"Bianchi T, Piva A (2012) Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Foren. Sec 7(3):1003\u20131017","journal-title":"IEEE Trans. Inf. Foren. Sec"},{"key":"9985_CR2","unstructured":"Break Our Watermarking System, 2nd Edition. http:\/\/bows2.ec-lille.fr\/"},{"issue":"8","key":"9985_CR3","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1109\/TCSVT.2007.903553","volume":"17","author":"YM Cheung","year":"2007","unstructured":"Cheung YM, Wu HT (2007) A sequential quantization strategy for data embedding and integrity verification. IEEE Trans. Circuits Syst. Video Technol 17 (8):1007\u20131016","journal-title":"IEEE Trans. Circuits Syst. Video Technol"},{"issue":"4","key":"9985_CR4","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2006.884895","volume":"14","author":"D Coltuc","year":"2007","unstructured":"Coltuc D, Chassery J-M (2007) Very fast watermarking by reversible contrast mapping. IEEE Signal Processing Letters 14(4):255\u2013258","journal-title":"IEEE Signal Processing Letters"},{"issue":"4","key":"9985_CR5","doi-asserted-by":"publisher","first-page":"1244","DOI":"10.1109\/TIP.2015.2395724","volume":"24","author":"I-C Dragoi","year":"2015","unstructured":"Dragoi I-C, Coltuc D (2015) On local prediction based reversible watermarking. IEEE Trans. Image Process 24(4):1244\u20131246","journal-title":"IEEE Trans. Image Process"},{"issue":"A","key":"9985_CR6","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.jvcir.2016.06.018","volume":"40","author":"D Hou","year":"2016","unstructured":"Hou D, Zhang W, Yu N (2016) Image camouflage by reversible image transformation. J. Vis. Commun. Image R 40(A):225\u2013236","journal-title":"J. Vis. Commun. Image R"},{"key":"9985_CR7","doi-asserted-by":"crossref","unstructured":"Hou D, Zhang W, Zhan Z, Jiang R, Yang Y, Yu N (2016) Reversible image processing via reversible data hiding. Proc. IEEE International Workshop on Digital Signal Processing, pp 427\u2013431","DOI":"10.1109\/ICDSP.2016.7868593"},{"issue":"1","key":"9985_CR8","doi-asserted-by":"publisher","first-page":"315","DOI":"10.32604\/cmc.2019.05242","volume":"59","author":"Y Kang","year":"2019","unstructured":"Kang Y, Liu F, Yang C, Luo X, Zhang T (2019) Color image steganalysis based on residuals of channel differences. Computers, Materials & Continua 59(1):315\u2013329","journal-title":"Computers, Materials & Continua"},{"issue":"3","key":"9985_CR9","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1109\/TIFS.2011.2135853","volume":"6","author":"IJ Lai","year":"2011","unstructured":"Lai IJ, Tsai WH (2011) Secret-fragment-visible mosaic image - a new computer art and its application to information hiding. IEEE Trans. Inf. Forens. Secur 6(3):936\u2013945","journal-title":"IEEE Trans. Inf. Forens. Secur"},{"issue":"4","key":"9985_CR10","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TCSVT.2013.2283431","volume":"24","author":"YL Lee","year":"2014","unstructured":"Lee YL, Tsai WH (2014) A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations. IEEE Trans. Circuits Syst. Video Technol 24(4):695\u2013703","journal-title":"IEEE Trans. Circuits Syst. Video Technol"},{"issue":"9","key":"9985_CR11","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"X Li","year":"2015","unstructured":"Li X, et al. (2015) Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Foren. Sec 10(9):2016\u20132027","journal-title":"IEEE Trans. Inf. Foren. Sec"},{"issue":"5","key":"9985_CR12","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, et al. (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Selected Topics Signal Process 14 (5):955\u2013968","journal-title":"IEEE J Selected Topics Signal Process"},{"issue":"9","key":"9985_CR13","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma B, Shi YQ (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Foren. Sec 11(9):1914\u20131927","journal-title":"IEEE Trans. Inf. Foren. Sec"},{"issue":"12","key":"9985_CR14","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process 22(12):5010\u20135021","journal-title":"IEEE Trans. Image Process"},{"issue":"9","key":"9985_CR15","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1109\/TIFS.2019.2899520","volume":"14","author":"F Peng","year":"2019","unstructured":"Peng F, Lin Z, Zhang X, Long M (2019) Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers. IEEE Trans. Inf. Foren. Sec 14(9):2400\u20132411","journal-title":"IEEE Trans. Inf. Foren. Sec"},{"key":"9985_CR16","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74:5861\u20135872","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"9985_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/38.946629","volume":"21","author":"E Reinhard","year":"2001","unstructured":"Reinhard E, Ashikhmin M, Gooch B, Shirley P (2001) Color transfer between images. IEEE Comput. Graph. Appl 21(5):34\u201341","journal-title":"IEEE Comput. Graph. Appl"},{"issue":"7","key":"9985_CR18","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol 19(7):989\u2013999","journal-title":"IEEE Trans. Circuits Syst. Video Technol"},{"key":"9985_CR19","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Shi YQ, Li X, Zhang X, Wu HT, Ma B (2016) Reversible data hiding: Advances in the past two decades. IEEE Access 4:3210\u20133237","journal-title":"IEEE Access"},{"key":"9985_CR20","doi-asserted-by":"publisher","first-page":"7927","DOI":"10.1007\/s11042-018-6410-x","volume":"78","author":"W Su","year":"2019","unstructured":"Su W, Wang X, Li F, Shen Y, Pei Q (2019) Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering. Multimedia Tools and Applications 78:7927\u20137945","journal-title":"Multimedia Tools and Applications"},{"key":"9985_CR21","doi-asserted-by":"publisher","first-page":"7071","DOI":"10.1007\/s11042-017-4622-0","volume":"77","author":"S Subburam","year":"2018","unstructured":"Subburam S, Selvakumar S, Geetha S (2018) High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform. Multimedia Tools and Applications 77:7071\u20137095","journal-title":"Multimedia Tools and Applications"},{"key":"9985_CR22","unstructured":"The USC Image Database. http:\/\/sipi.usc.edu\/database\/"},{"issue":"4","key":"9985_CR23","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process 13(4):600\u2013612","journal-title":"IEEE Trans. Image Process"},{"issue":"3","key":"9985_CR24","doi-asserted-by":"publisher","first-page":"679","DOI":"10.32604\/cmc.2019.06106","volume":"58","author":"B Wang","year":"2019","unstructured":"Wang B, Kong W, Li W, Xiong NN (2019) A dual-chaining watermark scheme for data integrity protection in internet of things, computers. Materials & Continua 58(3):679\u2013695","journal-title":"Materials & Continua"},{"issue":"2","key":"9985_CR25","first-page":"315","volume":"47","author":"J Wang","year":"2017","unstructured":"Wang J, Ni J, Zhang X, Shi YQ (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybernetics 47(2):315\u2013326","journal-title":"IEEE Trans. Cybernetics"},{"issue":"8","key":"9985_CR26","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1109\/TCYB.2017.2740309","volume":"48","author":"Y Wang","year":"2018","unstructured":"Wang Y, Zhu G, Kwong S, Shi YQ (2018) A study on the security levels of spread-spectrum embedding schemes in the WOA framework. IEEE Trans. Cybernetics 48(8):2307\u20132320","journal-title":"IEEE Trans. Cybernetics"},{"issue":"12","key":"9985_CR27","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.1016\/j.sigpro.2012.05.034","volume":"92","author":"HT Wu","year":"2012","unstructured":"Wu HT, Huang J (2012) Reversible image watermarking on prediction error by efficient histogram modification. Signal Process 92(12):3000\u20133009","journal-title":"Signal Process"},{"key":"9985_CR28","doi-asserted-by":"crossref","unstructured":"Wu HT, Dugelay JL, Cheung YM (2008) A data mapping method for steganography and its application to images. In: Proc. Information Hiding. IH 2008. Lecture Notes in Computer Science, vol 5284. Springer, Berlin, Heidelberg, pp 236\u2013250","DOI":"10.1007\/978-3-540-88961-8_17"},{"issue":"1","key":"9985_CR29","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","volume":"22","author":"HT Wu","year":"2015","unstructured":"Wu HT, Dugelay JL, Shi YQ (2015) Reversible image data hiding with contrast enhancement. IEEE Signal Process. Lett 22(1):81\u201385","journal-title":"IEEE Signal Process. Lett"},{"key":"9985_CR30","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/j.jvcir.2016.08.021","volume":"40","author":"HT Wu","year":"2016","unstructured":"Wu HT, Cheung YM, Huang J (2016) Reversible data hiding in Paillier cryptosystem. J Vis Commun Image R 40:765\u2013771","journal-title":"J Vis Commun Image R"},{"key":"9985_CR31","doi-asserted-by":"crossref","unstructured":"Wu HT, Tang S, Dugelay JL (2018) Image reversible visual transformation based on MSB replacement and histogram bin mapping. Proc. the 10th International Conference on Advanced Computational Intelligence, pp 813\u2013818","DOI":"10.1109\/ICACI.2018.8377566"},{"key":"9985_CR32","first-page":"64","volume":"62","author":"H-T Wu","year":"2018","unstructured":"Wu H-T, Tang S, Huang J, Shi Y-Q (2018) A novel reversible data hiding method with image contrast enhancement. Signal Process: Image Communication 62:64\u201373","journal-title":"Signal Process: Image Communication"},{"key":"9985_CR33","doi-asserted-by":"publisher","first-page":"62361","DOI":"10.1109\/ACCESS.2019.2916355","volume":"7","author":"HT Wu","year":"2019","unstructured":"Wu HT, Yang Z, Cheung YM, Xu L, Yang S (2019) High-capacity reversible data hiding in encrypted images by bit plane partiton and MSB prediction. IEEE Access 7:62361\u201362371","journal-title":"IEEE Access"},{"issue":"1","key":"9985_CR34","doi-asserted-by":"publisher","first-page":"27","DOI":"10.32604\/cmc.2019.02688","volume":"58","author":"Z Xia","year":"2019","unstructured":"Xia Z, Lu L, Qiu T, Shim HJ, Chen X, Jeon B (2019) A privacy-preserving image retrieval based on ac-coefficients and color histograms in cloud environment, computers. Materials & Continua 58(1):27\u201343","journal-title":"Materials & Continua"},{"issue":"1","key":"9985_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.32604\/cmc.2019.02171","volume":"58","author":"D Xiao","year":"2019","unstructured":"Xiao D, Liang J, Ma Q, Xiang Y, Zhang Y (2019) High capacity data hiding in encrypted image based on compressive sensing for nonequivalent resources. Computers, Materials & Continua 58(1):1\u201313","journal-title":"Computers, Materials & Continua"},{"issue":"11","key":"9985_CR36","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1109\/TIFS.2014.2359368","volume":"9","author":"J Yang","year":"2014","unstructured":"Yang J, Xie J, Zhu G, Kwong S, Shi YQ (2014) An effective method for detecting double JPEG compression with the same quantization matrix. IEEE Trans. Inf. Foren. Sec 9(11):1933\u20131942","journal-title":"IEEE Trans. Inf. Foren. Sec"},{"key":"9985_CR37","doi-asserted-by":"publisher","unstructured":"Yang J, Zhang Y, Zhu G, Kwong S (2020) A Clustering-based framework for improving the performance of jpeg quantization step estimation. IEEE Trans. Circuits Syst. Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2020.3003653","DOI":"10.1109\/TCSVT.2020.3003653"},{"issue":"8","key":"9985_CR38","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TMM.2016.2569497","volume":"18","author":"W Zhang","year":"2016","unstructured":"Zhang W, Wang H, Hou D, Yu N (2016) Reversible data hiding in encrypted images by reversible image transformation. IEEE Trans. Multimedia 18 (8):1469\u20131479","journal-title":"IEEE Trans. Multimedia"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09985-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09985-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09985-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T01:20:49Z","timestamp":1634174449000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09985-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,14]]},"references-count":38,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["9985"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09985-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,10,14]]},"assertion":[{"value":"20 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests"}}]}}