{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:00:00Z","timestamp":1760598000337,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:00:00Z","timestamp":1604620800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10058-6","type":"journal-article","created":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T05:03:13Z","timestamp":1604638993000},"page":"8931-8955","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A new reversible data hiding in transform domain"],"prefix":"10.1007","volume":"80","author":[{"given":"Zahra","family":"Pakdaman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3350-7348","authenticated-orcid":false,"given":"Hossein","family":"Nezamabadi-pour","sequence":"additional","affiliation":[]},{"given":"Saeid","family":"Saryazdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,6]]},"reference":[{"issue":"1","key":"10058_CR1","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.sigpro.2012.07.012","volume":"93","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi OM, Khoo BE (2013) Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Signal Process 93(1):154\u2013162","journal-title":"Signal Process"},{"issue":"8","key":"10058_CR2","doi-asserted-by":"publisher","first-page":"3598","DOI":"10.1109\/TIP.2012.2191564","volume":"21","author":"L An","year":"2012","unstructured":"An L, Gao X, Li X, Tao D, Cheng D, Li J (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21(8):3598\u20133611","journal-title":"IEEE Trans Image Process"},{"key":"10058_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2011.08.019","volume":"79","author":"L An","year":"2012","unstructured":"An L, Gao X, Yuan Y, Tao D, Cheng D, Ji F (2012) Content-adaptive reliable robust lossless data embedding. Neurocomputing 79:1\u201311","journal-title":"Neurocomputing"},{"key":"10058_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2011.06.012","volume":"77","author":"L An","year":"2012","unstructured":"An L, Gao X, Yuan Y, Tao D (2012) Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing 77:1\u201311","journal-title":"Neurocomputing"},{"issue":"1","key":"10058_CR5","doi-asserted-by":"publisher","DOI":"10.1117\/1.1877523","volume":"14","author":"M Awrangjeb","year":"2005","unstructured":"Awrangjeb M, Kankanhalli MS (2005) Reversible watermarking using a perceptual model. J Electron Imaging 14(1):013014","journal-title":"J Electron Imaging"},{"doi-asserted-by":"publisher","unstructured":"Bajaj A (2014) Robust and reversible digital image watermarking technique based on RDWT-DCT-SVD. IEEE Int Conf Adv Eng Technol Res. https:\/\/doi.org\/10.1109\/ICAETR.2014.7012955","key":"10058_CR6","DOI":"10.1109\/ICAETR.2014.7012955"},{"key":"10058_CR7","first-page":"997","volume":"5646","author":"JM Barton","year":"1997","unstructured":"Barton JM (1997) Method and apparatus for embedding authentication information within digital data. U S Patent 5646:997","journal-title":"U S Patent"},{"issue":"2","key":"10058_CR8","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized LSB data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"key":"10058_CR9","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.jss.2008.07.008","volume":"82","author":"YK Chan","year":"2009","unstructured":"Chan YK, Chen WT, Yu SS, Ho YA, Tsai CS, Chu YP (2009) A HDWT-based reversible data hiding method. J Syst Softw 82:411\u2013421","journal-title":"J Syst Softw"},{"key":"10058_CR10","doi-asserted-by":"publisher","first-page":"2286","DOI":"10.1016\/j.ins.2010.01.034","volume":"180","author":"CC Chang","year":"2010","unstructured":"Chang CC, Pai PY, Yeh CM, Chan YK (2010) A high payload frequency-based reversible image hiding method. Inf Sci 180:2286\u20132298","journal-title":"Inf Sci"},{"doi-asserted-by":"crossref","unstructured":"Du Y, Zhang T (2009) A reversible and fragile watermarking algorithm based on DCT, Proc IEEE Int Conf Artif Intell Comput Intell, 301\u2013304","key":"10058_CR11","DOI":"10.1109\/AICI.2009.30"},{"key":"10058_CR12","first-page":"197","volume":"3971","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Rui D (2001) Invertible authentication. In security and watermarking of multimedia contents III, Proc. SPIE 3971:197\u2013208","journal-title":"SPIE"},{"key":"10058_CR13","doi-asserted-by":"publisher","first-page":"25889","DOI":"10.1007\/s11042-019-07767-y","volume":"78","author":"S Gujjunoori","year":"2019","unstructured":"Gujjunoori S, Oruganti M (2019) Defference expansion based reversible data embedding and edge detection. Multimed Tools Appl 78:25889\u201325917. https:\/\/doi.org\/10.1007\/s11042-019-07767-y","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"10058_CR14","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1109\/TCSVT.2011.2130410","volume":"21","author":"X Gao","year":"2011","unstructured":"Gao X, An L, Yuan Y, Tao D, Li X (2011) Lossless data embedding using generalized statistical quantity histogram. IEEE Trans Circuits Syst Video Technol 21(8):1061\u20131070","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"doi-asserted-by":"crossref","unstructured":"Gao L, Gao T, Sheng G, Cao Y, Fan L (2012) A new reversible watermarking scheme based on integer DCT for medical images, Proc IEEE Int Conf Wavelet Anal Pattern Recogn 33\u201337","key":"10058_CR15","DOI":"10.1109\/ICWAPR.2012.6294751"},{"key":"10058_CR16","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.ins.2020.02.003","volume":"520","author":"W He","year":"2020","unstructured":"He W, Cai Z, Wang Y (2020) Flexible spatial location- based PVO predictor for high-fidelity reversible data hiding. Inf Sci 520:431\u2013444. https:\/\/doi.org\/10.1016\/j.ins.2020.02.003","journal-title":"Inf Sci"},{"key":"10058_CR17","first-page":"11","volume":"7","author":"HC Huang","year":"2016","unstructured":"Huang HC, Chang FC (2016) Multi-tier and multi-bit reversible data hiding with contents characteristics. J Inf hid Multimed Signal Process 7:11\u201320","journal-title":"J Inf hid Multimed Signal Process"},{"key":"10058_CR18","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2013.07.035","volume":"256","author":"AK Kamran","year":"2014","unstructured":"Kamran AK, Malik SA (2014) A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection. Inf Sci 256:162\u2013183","journal-title":"Inf Sci"},{"key":"10058_CR19","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1016\/j.patcog.2009.04.004","volume":"42","author":"KS Kim","year":"2009","unstructured":"Kim KS, Lee MJ, Lee HY, Lee HK (2009) Reversible data hiding exploiting spatial correlation between subsampled images. Pattern Recogn 42:3083\u20133096","journal-title":"Pattern Recogn"},{"key":"10058_CR20","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","volume":"517","author":"H Ko","year":"2019","unstructured":"Ko H, Huang C, Horng G, WANG S (2019) Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf Sci 517:128\u2013147. https:\/\/doi.org\/10.1016\/j.ins.2019.11.005","journal-title":"Inf Sci"},{"doi-asserted-by":"publisher","unstructured":"Kumar M, Agrawal S, Pant T (2016) SVD-based fragile reversible data hiding using DWT Adv Intell Syst Comput 436, DOI https:\/\/doi.org\/10.1007\/978-981-10-0448-3_62","key":"10058_CR21","DOI":"10.1007\/978-981-10-0448-3_62"},{"key":"10058_CR22","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.ins.2019.09.062","volume":"512","author":"R Kumar","year":"2020","unstructured":"Kumar R, Jung K (2020) Robust reversible data hiding scheme based on two-layer embedding strategy. Inf Sci 512:96\u2013107","journal-title":"Inf Sci"},{"doi-asserted-by":"crossref","unstructured":"Lamarche L, Liu Y, Zhao J, Ave KE, Kn C (2006) Flaw in SVD-based watermarking. IEEE CCECE\/CCGEI, 2082\u20132085","key":"10058_CR23","DOI":"10.1109\/CCECE.2006.277676"},{"key":"10058_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2016.01.026","volume":"54","author":"C Li","year":"2016","unstructured":"Li C, Yang R, Liu Z, Li J, Guo Z (2016) Semi-fragile self-recoverable watermarking scheme for face image protection. Comput Electr Eng 54:1\u201310. https:\/\/doi.org\/10.1016\/j.compeleceng.2016.01.026","journal-title":"Comput Electr Eng"},{"key":"10058_CR25","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1016\/j.jss.2012.05.032","volume":"85","author":"Y-K Lin","year":"2012","unstructured":"Lin Y-K (2012) High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw 85:2395\u20132404","journal-title":"J Syst Softw"},{"key":"10058_CR26","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.aeue.2014.11.004","volume":"69","author":"SU Maheswari","year":"2015","unstructured":"Maheswari SU, Hemath DJ (2015) Frequency domain QR code based image steganography using Fresnelet transform. Int J Electron Connun 69:539\u2013544","journal-title":"Int J Electron Connun"},{"issue":"3","key":"10058_CR27","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10058_CR28","doi-asserted-by":"publisher","first-page":"8517","DOI":"10.1007\/s11042-016-3490-3","volume":"76","author":"Z Pakdaman","year":"2016","unstructured":"Pakdaman Z, Saryazdi S, Nezamabadi-pour H (2016) A prediction based reversible image watermarking in Hadamard domain. Multimed Tools Appl 76:8517\u20138545. https:\/\/doi.org\/10.1007\/s11042-016-3490-3","journal-title":"Multimed Tools Appl"},{"key":"10058_CR29","doi-asserted-by":"publisher","first-page":"115715","DOI":"10.1016\/j.image.2019.115715","volume":"81","author":"F Peng","year":"2020","unstructured":"Peng F, Zhao Y, Zhang X, Long M, Pan W (2020) Reversible data hiding based on RSBEMD coding and adaptive multi-segmant left and right histogram shifting. Signal Process Image Commun 81:115715","journal-title":"Signal Process Image Commun"},{"key":"10058_CR30","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ins.2018.07.021","volume":"465","author":"C Qin","year":"2018","unstructured":"Qin C, He Z, Luo X, Dong J (2018) Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf Sci 465:285\u2013304. https:\/\/doi.org\/10.1016\/j.ins.2018.07.021","journal-title":"Inf Sci"},{"issue":"7","key":"10058_CR31","first-page":"26","volume":"3","author":"RA Sadek","year":"2012","unstructured":"Sadek RA (2012) SVD based image processing applications: state of the art, contributions and research challenges. Int J Adv Comput Sci Appl 3(7):26\u201334","journal-title":"Int J Adv Comput Sci Appl"},{"key":"10058_CR32","doi-asserted-by":"publisher","first-page":"26821","DOI":"10.1007\/s11042-018-5890-z","volume":"77","author":"R Samee","year":"2018","unstructured":"Samee R, Riaz M, Ghafoor A (2018) Adaptive interpolation and segmentationbased reversible image watermarking. Multimed Tools Appl 77:26821\u201326843. https:\/\/doi.org\/10.1007\/s11042-018-5890-z","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10058_CR33","doi-asserted-by":"publisher","first-page":"309","DOI":"10.2298\/FUEE0703309S","volume":"20","author":"H Sarukhanyan","year":"2007","unstructured":"Sarukhanyan H, Agaian S, Egiazarian K, Astola J (2007) Reversible Hadamard transform. Facta Univ (NIS) 20(3):309\u2013330","journal-title":"Facta Univ (NIS)"},{"key":"10058_CR34","doi-asserted-by":"publisher","first-page":"237","DOI":"10.12785\/ijcds\/030307","volume":"3","author":"B Souad","year":"2014","unstructured":"Souad B, Mohamed FK (2014) Reversible combined R-DWT-DCT-SVD watermarking scheme. Int J com dig sys 3:237\u2013245","journal-title":"Int J com dig sys"},{"unstructured":"Thodi DM, Rodriguez JJ (2004) Reversible watermarking by prediction-error expansion, Image Ana Interpret, 6th IEEE southwest symposium on, 21\u201325","key":"10058_CR35"},{"issue":"8","key":"10058_CR36","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circ Syst Video Technol"},{"doi-asserted-by":"publisher","unstructured":"Wai CK, Ahmad NA (2014) Robust DWT-SVD image watermarking with hybrid technique for embedding data in all frequencies. AIP Conf Proc DOI https:\/\/doi.org\/10.1063\/1.4887593","key":"10058_CR37","DOI":"10.1063\/1.4887593"},{"key":"10058_CR38","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cad.2011.11.001","volume":"44","author":"N Wang","year":"2012","unstructured":"Wang N, Men C (2012) Reversible fragile watermarking for 2-D vector map authentication with localization. Comput Aided Des 44:320\u2013330","journal-title":"Comput Aided Des"},{"key":"10058_CR39","first-page":"135","volume":"3919","author":"X Wu","year":"2006","unstructured":"Wu X, Liang X, Liu H, Huang J, Qiu G (2006) Reversible semi-fragile image authentication using zernike moments and integer Wavelete transform, digital rights management. Technologies, issues, challenges and systems. LNCS in Comput Sci 3919:135\u2013145","journal-title":"LNCS in Comput Sci"},{"key":"10058_CR40","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-540-31805-7_10","volume":"3304","author":"G Xuan","year":"2004","unstructured":"Xuan G, Yang C, Zhen Y, Shi YQ, Ni Z (2004) Reversible data hiding using integer wavelet transform and companding technique. Digit Watermark 3304:115\u2013124","journal-title":"Digit Watermark"},{"key":"10058_CR41","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.sigpro.2019.05.035","volume":"164","author":"H Zheng","year":"2019","unstructured":"Zheng H, Wang C, Wang J, Xiang S (2019) A new reversible watermarking scheme using the content-adaptive block size for prediction. Signal Process 164:74\u201383. https:\/\/doi.org\/10.1016\/j.sigpro.2019.05.035","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10058-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10058-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10058-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:41:54Z","timestamp":1614634914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10058-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,6]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10058"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10058-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,11,6]]},"assertion":[{"value":"23 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}