{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T10:05:58Z","timestamp":1769853958202,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T00:00:00Z","timestamp":1612742400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T00:00:00Z","timestamp":1612742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China Natural Science Foundation of China","award":["61872203"],"award-info":[{"award-number":["61872203"]}]},{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation","doi-asserted-by":"crossref","award":["61802212"],"award-info":[{"award-number":["61802212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10532-9","type":"journal-article","created":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T23:21:37Z","timestamp":1612912897000},"page":"17569-17581","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A reversible data hiding algorithm for audio files based on code division multiplexing"],"prefix":"10.1007","volume":"80","author":[{"given":"Bin","family":"Ma","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7564-612X","authenticated-orcid":false,"given":"Jin-Cheng","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Chun-Peng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiao-Ming","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,8]]},"reference":[{"key":"10532_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. University of Buckingham"},{"key":"10532_CR2","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. Proc. SPIE Electronic imaging security forensics steganography and watermarking of multimedia contents","DOI":"10.1117\/12.2050518"},{"key":"10532_CR3","unstructured":"Abdulla A A, Sellahewa H, Jassim S A (2020) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images[J]. Multimed Tools Appl 1\u201325"},{"key":"10532_CR4","unstructured":"Barton JM (1997) Method and apparatus for embedding authentication information within digital data, U.S. Patent 5646997"},{"key":"10532_CR5","doi-asserted-by":"crossref","unstructured":"Bobeica A, Dragoi IC et al. (2018) Capacity control for prediction error expansion based audio reversible data hiding. In: Proceedings of 22nd international conference on system theory, control and computing (ICSTCC). Sinaia, Romania, 810\u2013815","DOI":"10.1109\/ICSTCC.2018.8540672"},{"key":"10532_CR6","doi-asserted-by":"crossref","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding[J]. Image Process IEEE Trans 14(2):253\u2013266","DOI":"10.1109\/TIP.2004.840686"},{"key":"10532_CR7","doi-asserted-by":"crossref","unstructured":"Cheng Z, Shen J (2016) On effective location-aware music recommendation[J]. Acm Transactions on Information Systems","DOI":"10.1145\/2846092"},{"issue":"1","key":"10532_CR8","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TIP.2011.2162424","volume":"21","author":"D Coltuc","year":"2012","unstructured":"Coltuc D (2012) Low distortion transform for reversible watermarking[J]. IEEE Trans Image Process 21(1):412\u2013417","journal-title":"IEEE Trans Image Process"},{"key":"10532_CR9","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"IC Dragoi","year":"2014","unstructured":"Dragoi IC, Coltuc D (2014) Local-prediction-based difference expansion reversible watermarking[J]. IEEE IEEE Trans Image Process 23:1779\u20131790","journal-title":"IEEE IEEE Trans Image Process"},{"key":"10532_CR10","unstructured":"EBU Committee: sound quality assessment material recordings for subjective tests [online]. Available: https:\/\/tech.ebu.ch\/publications\/sqamcd"},{"key":"10532_CR11","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1117\/12.435400","volume":"4314","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Du R (2001) Invertible authentication. Proc SPIE 4314:197\u2013208","journal-title":"Proc SPIE"},{"key":"10532_CR12","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2002) Lossless Data Embedding-New Paradigm in Digital Watermarking[J]\u201d. EURASIP J Adv Signal Process pp 185\u2013196","DOI":"10.1155\/S1110865702000537"},{"key":"10532_CR13","doi-asserted-by":"crossref","unstructured":"Han S, Fujiyoshi M, Kiya H (2009) A reversible image authentication method without memorization of hiding parameters. IEICE Trans.Fundam E92-A.pp. 2572\u20132579","DOI":"10.1587\/transfun.E92.A.2572"},{"key":"10532_CR14","doi-asserted-by":"crossref","unstructured":"Huang X, Ono N, Echizen I, et al. (2013) Reversible audio information hiding based on integer DCT coefficients with adaptive hiding locations[J]","DOI":"10.1007\/978-3-662-43886-2_27"},{"key":"10532_CR15","doi-asserted-by":"crossref","unstructured":"Kalker T, Willems F (2002) Capacity bounds and constructions for reversible data-hiding. Proc Int Conf Digit Signal Process 1:71\u201376","DOI":"10.1117\/12.473164"},{"key":"10532_CR16","doi-asserted-by":"crossref","unstructured":"Kamstra L, Heijmans HJAM (2005) Reversible data embedding into images using wavelet techniques and sorting. Image Process IEEE Trans 14(12):2082\u20132090","DOI":"10.1109\/TIP.2005.859373"},{"issue":"3","key":"10532_CR17","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"HJ Kim","year":"2008","unstructured":"Kim HJ, Sachnev V, Shi YQ, Nam J, Choo H-G (2008) A novel difference expansion transform for reversible data embedding. Information Forensics Secur IEEE Trans 3(3):456\u2013465","journal-title":"Information Forensics Secur IEEE Trans"},{"issue":"12","key":"10532_CR18","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2156803","volume":"20","author":"X Li","year":"2011","unstructured":"Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. Image Process IEEE Trans 20(12):3524\u20133533","journal-title":"Image Process IEEE Trans"},{"issue":"9","key":"10532_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2016.2606958","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma B, Shi YQ (2016) A Reversible Data Hiding Scheme Based on Code Division Multiplexing[J]. IEEE Trans Information Forensics Secur 11(9):1\u20131","journal-title":"IEEE Trans Information Forensics Secur"},{"key":"10532_CR20","doi-asserted-by":"crossref","unstructured":"Ma B, Wang X, Li Q, et al. (2019) Adaptive error prediction method based on multiple linear regression for reversible data hiding[J]. J Real-Time Image Process:821\u2013834","DOI":"10.1007\/s11554-019-00891-w"},{"key":"10532_CR21","doi-asserted-by":"crossref","unstructured":"Ma B, Li B, Wang XY. et al. (2019) A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images. J Real-Time Image Proc:857\u2013869","DOI":"10.1007\/s11554-019-00884-9"},{"issue":"4","key":"10532_CR22","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TCSVT.2008.918761","volume":"18","author":"Z Ni","year":"2008","unstructured":"Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2008) Robust lossless image data hiding. IEEE Trans Circuits Syst Video Technol 18(4):497\u2013509","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10532_CR23","doi-asserted-by":"crossref","unstructured":"Nishimura A (2011) Reversible audio data hiding using linear prediction and error expansion, in Proc. of IIHMSP2011, pp 318\u2013321","DOI":"10.1109\/IIHMSP.2011.76"},{"key":"10532_CR24","doi-asserted-by":"crossref","unstructured":"Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ (2009) Reversible data embedding using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):989\u2013999","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"10532_CR25","doi-asserted-by":"crossref","unstructured":"Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19(6):906\u2013910","DOI":"10.1109\/TCSVT.2009.2017409"},{"issue":"3","key":"10532_CR26","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodr\u00edguez JJ (2007) Expansion embedding techniques for reversible watermarking. Image Process IEEE Trans 16(3):721\u2013730","journal-title":"Image Process IEEE Trans"},{"issue":"8","key":"10532_CR27","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Techn 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Techn"},{"key":"10532_CR28","doi-asserted-by":"crossref","unstructured":"Wang F, Xie Z, Chen Z (2014) High capacity reversible watermarking for audio by histogram shifting and predicted error expansion. Sci World J 2014:656251","DOI":"10.1155\/2014\/656251"},{"key":"10532_CR29","doi-asserted-by":"crossref","unstructured":"Wu XY, Diao W, Hou DD, Zhang WM (2019) Reversible watermarking on stereo audio signals by exploring Inter-Channel correlation. Int J Digital Crime Forensics (IJDCF) 11(1):29\u201345","DOI":"10.4018\/IJDCF.2019010103"},{"key":"10532_CR30","doi-asserted-by":"crossref","unstructured":"Xiang SJ (2012) Non-integer expansion embedding for prediction-based reversible watermarking, Proceeding of the 14th Tnternational Conference IH Berkeley USA, 7692, pp. 224\u2013239","DOI":"10.1007\/978-3-642-36373-3_15"},{"key":"10532_CR31","doi-asserted-by":"crossref","unstructured":"Xiang SJ, Li ZH (2017) Reversible audio data hiding algorithm using noncausal prediction of alterable orders, EURASIP journal on audio, speech, and music processing. 2017(1)4","DOI":"10.1186\/s13636-017-0101-9"},{"key":"10532_CR32","doi-asserted-by":"crossref","unstructured":"Xie XZ, Chang CC, Lin CC (2019) Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing. IET Image Process 13(9):1411\u20131420","DOI":"10.1049\/iet-ipr.2018.5333"},{"key":"10532_CR33","doi-asserted-by":"publisher","first-page":"24329","DOI":"10.1007\/s11042-019-08402-6","volume":"79","author":"XZ Xie","year":"2020","unstructured":"Xie XZ, Chang CC, Hu YC (2020) An adaptive reversible data hiding scheme based on prediction error histogram shifting by exploiting signed-digit representation[J]. Multimed Tools Appl 79:24329\u201324346","journal-title":"Multimed Tools Appl"},{"key":"10532_CR34","unstructured":"Yan DQ, Wang RD (2018) Reversible data hiding for audio based on prediction error expansion. in Proceedings of the 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing (IIHMSP \u201908), pp. 249\u2013252"},{"key":"10532_CR35","doi-asserted-by":"crossref","unstructured":"Yu H, Wang R , Dong L, et al. (2020) A high-capacity reversible data hiding scheme using dual-channel audio [J]. IEEE Access","DOI":"10.1109\/ACCESS.2020.3015851"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10532-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10532-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10532-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T08:51:46Z","timestamp":1621500706000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10532-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,8]]},"references-count":35,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10532"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10532-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,8]]},"assertion":[{"value":"3 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that there are no conflicts of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}