{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:42Z","timestamp":1740122862003,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10347-0","type":"journal-article","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T04:45:05Z","timestamp":1610599505000},"page":"13099-13120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A reversible data hiding scheme based on (5, 3) Hamming code using extra information on overlapped pixel blocks of grayscale images"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5261-271X","authenticated-orcid":false,"given":"Tuan Duc","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Huu Dung","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,13]]},"reference":[{"key":"10347_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/8981240","volume":"2019","author":"R Abbasi","year":"2019","unstructured":"Abbasi R, Xu L, Amin F, Luo B (2019) Efficient lossless compression based reversible data hiding using multilayered n-bit localization. Secur Commun Netw 2019:1\u201313. https:\/\/doi.org\/10.1155\/2019\/8981240","journal-title":"Secur Commun Netw"},{"key":"10347_CR2","volume-title":"Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography","author":"A Abdulla","year":"2015","unstructured":"Abdulla A (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. The University of Buckingham, Buckingham"},{"key":"10347_CR3","doi-asserted-by":"publisher","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Baltimore, Maryland, p. 912005, https:\/\/doi.org\/10.1117\/12.2050518.","DOI":"10.1117\/12.2050518"},{"key":"10347_CR4","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"12","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp A, Saber E (2005) Lossless generalized-LSB data embedding. Image Process IEEE Trans 12:253\u2013266","journal-title":"Image Process IEEE Trans"},{"issue":"12","key":"10347_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17706\/jsw.13.1.1-17","volume":"12","author":"C-C Chang","year":"2018","unstructured":"Chang C-C, Tang R, Lin C-C, Lyu W-L (2018) High-capacity reversible data hiding method for JPEG images. J Softw 12(12):1\u201317. https:\/\/doi.org\/10.17706\/jsw.13.1.1-17","journal-title":"J Softw"},{"issue":"1","key":"10347_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.3390\/sym11010051","volume":"11","author":"K Chen","year":"2019","unstructured":"Chen K, Chang C-C (2019) Real-time error-free reversible data hiding in encrypted images using (7, 4) Hamming code and most significant bit prediction. Symmetry 11(1):51. https:\/\/doi.org\/10.3390\/sym11010051","journal-title":"Symmetry"},{"issue":"1","key":"10347_CR7","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/JETCAS.2014.2298919","volume":"4","author":"Y Fang","year":"2014","unstructured":"Fang Y, Zeng K, Wang Z, Lin W, Fang Z, Lin C-W (2014) Objective quality assessment for image retargeting based on structural similarity. IEEE J Emerg Sel Top Circuits Syst 4(1):95\u2013105. https:\/\/doi.org\/10.1109\/JETCAS.2014.2298919","journal-title":"IEEE J Emerg Sel Top Circuits Syst"},{"key":"10347_CR8","doi-asserted-by":"publisher","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. 27. https:\/\/doi.org\/10.1145\/1232454.1232466","DOI":"10.1145\/1232454.1232466"},{"key":"10347_CR9","doi-asserted-by":"publisher","unstructured":"Ghosal SK, Mukhopadhyay S, Hossain S, Sarkar R (2020) Application of Lah transform for security and privacy of data through information hiding in telecommunication. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.3984","DOI":"10.1002\/ett.3984"},{"key":"10347_CR10","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.jvcir.2017.10.001","volume":"49","author":"W He","year":"2017","unstructured":"He W, Zhou K, Cai J, Wang L, Xiong G (Nov. 2017) Reversible data hiding using multi-pass pixel value ordering and prediction-error expansion. J Vis Commun Image Represent 49:351\u2013360. https:\/\/doi.org\/10.1016\/j.jvcir.2017.10.001","journal-title":"J Vis Commun Image Represent"},{"key":"10347_CR11","doi-asserted-by":"publisher","unstructured":"Hore A, Ziou D (2010) Image Quality Metrics: PSNR vs. SSIM. In 2010 20th International Conference on Pattern Recognition, Istanbul, Turkey. pp. 2366\u20132369. https:\/\/doi.org\/10.1109\/ICPR.2010.579","DOI":"10.1109\/ICPR.2010.579"},{"issue":"20","key":"10347_CR12","doi-asserted-by":"publisher","first-page":"21691","DOI":"10.1007\/s11042-016-3990-1","volume":"76","author":"B Jana","year":"2017","unstructured":"Jana B, Giri D, Mondal SK (2017) Partial reversible data hiding scheme using (7, 4) Hamming code. Multimed Tools Appl 76(20):21691\u201321706. https:\/\/doi.org\/10.1007\/s11042-016-3990-1","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10347_CR13","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1007\/s11042-016-4230-4","volume":"77","author":"B Jana","year":"2018","unstructured":"Jana B, Giri D, Kumar Mondal S (2018) Dual image based reversible data hiding scheme using (7,4) Hamming code. Multimed Tools Appl 77(1):763\u2013785. https:\/\/doi.org\/10.1007\/s11042-016-4230-4","journal-title":"Multimed Tools Appl"},{"key":"10347_CR14","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251\u2013272. https:\/\/doi.org\/10.1016\/j.ins.2014.03.118","journal-title":"Inf Sci"},{"key":"10347_CR15","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1007\/978-3-319-19321-2_45","volume-title":"Digital-forensics and watermarking","author":"C Kim","year":"2015","unstructured":"Kim C, Yang C-N (2015) Steganography based on Grayscale images using (5, 3) Hamming code. In: Shi Y-Q, Kim HJ, P\u00e9rez-Gonz\u00e1lez F, Yang C-N (eds) Digital-forensics and watermarking, vol 9023. Springer International Publishing, Cham, pp 588\u2013598"},{"issue":"1","key":"10347_CR16","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s11554-017-0674-7","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Kim B-G, Yang C-N (2018) Secure medical images based on data hiding using a hybrid scheme with the Hamming code, LSB, and OPAP. J Real-Time Image Process 14(1):115\u2013126. https:\/\/doi.org\/10.1007\/s11554-017-0674-7","journal-title":"J Real-Time Image Process"},{"issue":"2","key":"10347_CR17","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for Steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432\u2013444. https:\/\/doi.org\/10.1109\/TIFS.2011.2175919","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"10347_CR18","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/S1665-6423(13)71536-0","volume":"11","author":"HY Liang","year":"2013","unstructured":"Liang HY, Cheng CH, Yang CY, Zhang KF (2013) A blind data hiding technique with error correction abilities and a high embedding payload. J Appl Res Technol 11(2):259\u2013271. https:\/\/doi.org\/10.1016\/S1665-6423(13)71536-0","journal-title":"J Appl Res Technol"},{"key":"10347_CR19","doi-asserted-by":"publisher","first-page":"21534","DOI":"10.1109\/ACCESS.2019.2962230","volume":"8","author":"J Lin","year":"2020","unstructured":"Lin J, Weng S, Zhang T, Ou B, Chang C-C (2020) Two-layer reversible data hiding based on AMBTC image with (7, 4) Hamming code. IEEE Access 8:21534\u201321548. https:\/\/doi.org\/10.1109\/ACCESS.2019.2962230","journal-title":"IEEE Access"},{"issue":"1","key":"10347_CR20","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1186\/s13640-019-0458-z","volume":"2019","author":"H-H Liu","year":"2019","unstructured":"Liu H-H, Lee C-M (2019) High-capacity reversible image steganography based on pixel value ordering. EURASIP J Image Vid Process 2019(1):54. https:\/\/doi.org\/10.1186\/s13640-019-0458-z","journal-title":"EURASIP J Image Vid Process"},{"issue":"12","key":"10347_CR21","doi-asserted-by":"publisher","first-page":"764","DOI":"10.3390\/sym10120764","volume":"10","author":"T-C Lu","year":"2018","unstructured":"Lu T-C, Tseng C-Y, Huang S-W, Nhan T (2018) Pixel-Value-Ordering based Reversible Information Hiding Scheme with Self-Adaptive Threshold Strategy. Symmetry 10(12):764. https:\/\/doi.org\/10.3390\/sym10120764","journal-title":"Symmetry"},{"issue":"3","key":"10347_CR22","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.jksuci.2018.01.011","volume":"31","author":"P Maniriho","year":"2019","unstructured":"Maniriho P, Ahmad T (2019) Information hiding scheme for digital images using difference expansion and modulus function. J King Saud Univ - Comput Inf Sci 31(3):335\u2013347. https:\/\/doi.org\/10.1016\/j.jksuci.2018.01.011","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"2","key":"10347_CR23","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevny","year":"2010","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Foren Secur 5(2):215\u2013224. https:\/\/doi.org\/10.1109\/TIFS.2010.2045842","journal-title":"IEEE Trans Inf Foren Secur"},{"key":"10347_CR24","unstructured":"SIPI Image Database. http:\/\/sipi.usc.edu\/database\/ (Accessed 05 Apr 2019)"},{"key":"10347_CR25","doi-asserted-by":"crossref","unstructured":"Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T A Stochastic Approach to Content Adaptive Digital Image Watermarking. In: Pfitzmann A (ed) Information Hiding, vol 1768, 2000. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 211\u2013236","DOI":"10.1007\/10719724_16"},{"issue":"2","key":"10347_CR26","first-page":"315","volume":"47","author":"J Wang","year":"2017","unstructured":"Wang J, Ni J, Zhang X, Shi Y (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans Cybern 47(2):315\u2013326","journal-title":"IEEE Trans Cybern"},{"key":"10347_CR27","doi-asserted-by":"publisher","first-page":"38337","DOI":"10.1109\/ACCESS.2019.2906500","volume":"7","author":"H Wang","year":"2019","unstructured":"Wang H, Lin H, Gao X, Cheng W, Chen Y (2019) Reversible AMBTC-based data hiding with security improvement by chaotic encryption. IEEE Access 7:38337\u201338347","journal-title":"IEEE Access"},{"key":"10347_CR28","doi-asserted-by":"publisher","first-page":"35564","DOI":"10.1109\/ACCESS.2019.2903079","volume":"7","author":"J Wang","year":"2019","unstructured":"Wang J, Chen X, Shi Y (2019) Unconstraint optimal selection of side information for histogram shifting based reversible data hiding. IEEE Access 7:35564\u201335578","journal-title":"IEEE Access"},{"key":"10347_CR29","doi-asserted-by":"publisher","first-page":"28902","DOI":"10.1109\/ACCESS.2020.2972622","volume":"8","author":"P Wang","year":"2020","unstructured":"Wang P, Cai B, Xu S, Chen B (2020) Reversible data hiding scheme based on adjusting pixel modulation and block-wise compression for encrypted images. IEEE Access 8:28902\u201328914","journal-title":"IEEE Access"},{"key":"10347_CR30","unstructured":"Watermarking Virtual Laboratory (Wavila) of the European Network of Excellence ECRYPT (http:\/\/www.ecrypt.eu.org\/), \u201cBreak Our Watermarking System 2nd Ed.\u201d http:\/\/bows2.ec-lille.fr\/index.php?mode=VIEW&tmpl=index2 (Accessed 06 May 2020)"},{"key":"10347_CR31","doi-asserted-by":"publisher","first-page":"107657","DOI":"10.1016\/j.sigpro.2020.107657","volume":"175","author":"X Wu","year":"2020","unstructured":"Wu X, Yang C-N, Liu Y-W (Oct. 2020) A general framework for partial reversible data hiding using Hamming code. Signal Process 175:107657. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107657","journal-title":"Signal Process"},{"issue":"31\u201332","key":"10347_CR32","doi-asserted-by":"publisher","first-page":"23425","DOI":"10.1007\/s11042-020-09098-9","volume":"79","author":"X Wu","year":"2020","unstructured":"Wu X, Yang C-N, Liu Y-W (2020) High capacity partial reversible data hiding by Hamming code. Multimed Tools Appl 79(31\u201332):23425\u201323444. https:\/\/doi.org\/10.1007\/s11042-020-09098-9","journal-title":"Multimed Tools Appl"},{"key":"10347_CR33","doi-asserted-by":"publisher","first-page":"46506","DOI":"10.1109\/ACCESS.2019.2909560","volume":"7","author":"Q Ying","year":"2019","unstructured":"Ying Q, Qian Z, Zhang X, Ye D (2019) Reversible data hiding with image enhancement using histogram shifting. IEEE Access 7:46506\u201346521","journal-title":"IEEE Access"},{"issue":"8","key":"10347_CR34","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/LCOMM.2007.070438","volume":"11","author":"W Zhang","year":"2007","unstructured":"Zhang W, Wang S, Zhang X (2007) Improving embedding efficiency of covering codes for applications in steganography. IEEE Commun Lett 11(8):680\u2013682. https:\/\/doi.org\/10.1109\/LCOMM.2007.070438","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10347-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10347-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10347-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T08:38:54Z","timestamp":1619339934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10347-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,13]]},"references-count":34,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10347"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10347-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,13]]},"assertion":[{"value":"6 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}