{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:36:06Z","timestamp":1742805366513,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:00:00Z","timestamp":1619654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T00:00:00Z","timestamp":1619654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10722-5","type":"journal-article","created":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T05:16:03Z","timestamp":1619673363000},"page":"26161-26179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A high payload reversible data hiding algorithm for homomorphic encrypted absolute moment block truncation coding compressed images"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4727-109X","authenticated-orcid":false,"given":"Rupali","family":"Bhardwaj","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,29]]},"reference":[{"key":"10722_CR1","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.patrec.2018.01.014","volume":"139","author":"R Bhardwaj","year":"2020","unstructured":"Bhardwaj R, Aggarwal A (2020) An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recog Lett 139:60\u201368","journal-title":"Pattern Recog Lett"},{"issue":"2","key":"10722_CR2","doi-asserted-by":"publisher","first-page":"023017","DOI":"10.1117\/1.JEI.27.2.023017","volume":"27","author":"R Bhardwaj","year":"2018","unstructured":"Bhardwaj R (2018) Enhanced encrypted reversible data hiding algorithm with minimum distortion through homomorphic encryption. J Electron Imaging 27(2):023017","journal-title":"J Electron Imaging"},{"issue":"2","key":"10722_CR3","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"10722_CR4","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1016\/j.jvcir.2014.04.003","volume":"25","author":"YC Chen","year":"2014","unstructured":"Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25 (5):1164\u20131170","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"10722_CR5","doi-asserted-by":"publisher","first-page":"8785","DOI":"10.1007\/s11042-017-4774-y","volume":"77","author":"LP Chi","year":"2018","unstructured":"Chi LP, Wu CH, Chang HP (2018) Reversible data hiding in dual stegano-image using an improved center folding strategy. Multimed Tools Appl 77(7):8785\u20138803","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10722_CR6","doi-asserted-by":"publisher","first-page":"9039","DOI":"10.1007\/s11042-017-4800-0","volume":"77","author":"CC Chang","year":"2018","unstructured":"Chang CC, Chen TS, Wang YK, Liu Y (2018) A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive or operator. Multimed Tools Appl 77(7):9039\u20139053","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10722_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match. IEEE Sig Process Lett 19(4):199\u2013202","journal-title":"IEEE Sig Process Lett"},{"issue":"5","key":"10722_CR8","doi-asserted-by":"publisher","first-page":"5767","DOI":"10.1007\/s11042-017-4487-2","volume":"77","author":"NT Huynh","year":"2018","unstructured":"Huynh NT, Bharanitharan K, Chang CC, Liu Y (2018) Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images. Multimed Tools Appl 77(5):5767\u20135783","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"10722_CR9","first-page":"2627","volume":"9","author":"YS Kim","year":"2015","unstructured":"Kim YS, Kang K, Lim DW (2015) New reversible data hiding scheme for encrypted images using lattices. Appl Math Inf Sci 9(5):2627","journal-title":"Appl Math Inf Sci"},{"key":"10722_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21\u201327","journal-title":"J Vis Commun Image Represent"},{"key":"10722_CR11","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.sigpro.2015.03.017","volume":"115","author":"TC Lu","year":"2015","unstructured":"Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Sig Process 115:195\u2013213","journal-title":"Sig Process"},{"issue":"4","key":"10722_CR12","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1007\/s11235-011-9529-x","volume":"52","author":"CF Lee","year":"2013","unstructured":"Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52 (4):2237\u20132247","journal-title":"Telecommun Syst"},{"issue":"22","key":"10722_CR13","doi-asserted-by":"publisher","first-page":"23903","DOI":"10.1007\/s11042-016-4135-2","volume":"76","author":"TC Lu","year":"2017","unstructured":"Lu TC, Chi LP, Wu CH, Chang HP (2017) Reversible data hiding in dual stego-images using frequency-based encoding strategy. Multimed Tools Appl 76(22):23903\u201323929","journal-title":"Multimed Tools Appl"},{"key":"10722_CR14","first-page":"408","volume":"10","author":"J Lin","year":"2019","unstructured":"Lin J, Chen Y u, Chang C, Hu Y (2019) Reversible data hiding in encrypted images based on bit-plane block embedding. J Inf Hiding Multimed Sig Process 10:408\u2013421","journal-title":"J Inf Hiding Multimed Sig Process"},{"issue":"1","key":"10722_CR15","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s11042-019-08074-2","volume":"79","author":"AW Luo","year":"2020","unstructured":"Luo AW, Gong LH, Zhou NR, Zou WP (2020) Adaptive and blind watermarking scheme based on optimal SVD blocks selection. Multimed Tools Appl 79(1):243\u2013261","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10722_CR16","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","volume":"32","author":"M Lema","year":"1984","unstructured":"Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32(10):1148\u20131157","journal-title":"IEEE Trans Commun"},{"issue":"12","key":"10722_CR17","doi-asserted-by":"publisher","first-page":"14151","DOI":"10.1007\/s11042-016-3815-2","volume":"76","author":"A Malik","year":"2017","unstructured":"Malik A, Sikka G, Verma HK (2017) A high payload data hiding scheme based on modified AMBTC technique. Multimed Tools Appl 76(12):14151\u201314167","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10722_CR18","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s11045-017-0530-8","volume":"29","author":"A Malik","year":"2018","unstructured":"Malik A, Sikka G, Verma HK (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim Syst Sign Process 29(4):1801\u20131818","journal-title":"Multidim Syst Sign Process"},{"issue":"3","key":"10722_CR19","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensic Secur 8(3):553\u2013562","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"10722_CR20","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"21","key":"10722_CR21","doi-asserted-by":"publisher","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","volume":"74","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed Tools Appl 74(21):9117\u20139139","journal-title":"Multimed Tools Appl"},{"unstructured":"Pascal P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 223\u2013238","key":"10722_CR22"},{"issue":"21","key":"10722_CR23","doi-asserted-by":"publisher","first-page":"13749","DOI":"10.1007\/s11042-015-2760-9","volume":"75","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhang X, Ren Y, Feng G (2016) Block cipher based separable reversible data hiding in encrypted images. Multimed Tools Appl 75(21):13749\u201313763","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Shi YQ (2004) Reversible data hiding. In: International workshop on digital watermarking. Springer, pp 1\u201312","key":"10722_CR24","DOI":"10.1007\/978-3-540-31805-7_1"},{"issue":"8","key":"10722_CR25","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circ Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"10722_CR26","doi-asserted-by":"publisher","first-page":"7515","DOI":"10.1007\/s11042-019-08530-z","volume":"79","author":"C Tian","year":"2020","unstructured":"Tian C, Wen RH, Zou WP, Gong LH (2020) Robust and blind watermarking algorithm based on DCT and SVD in the contourlet domain. Multimed Tools Appl 79:7515\u20137541","journal-title":"Multimed Tools Appl"},{"issue":"31","key":"10722_CR27","doi-asserted-by":"publisher","first-page":"22727","DOI":"10.1007\/s11042-020-08987-3","volume":"79","author":"JY Wu","year":"2020","unstructured":"Wu JY, Huang WL, Xia-Hou WM, Zou WP, Gong LH (2020) Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition. Multimed Tools Appl 79(31):22727\u201322747","journal-title":"Multimed Tools Appl"},{"key":"10722_CR28","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","volume":"104","author":"X Wu","year":"2014","unstructured":"Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by prediction error. Sig Process 104:387\u2013400","journal-title":"Sig Process"},{"doi-asserted-by":"crossref","unstructured":"Xiao B, Ying L, Huang Y (2010) Reversible data hiding using histogram shifting in small blocks. In: 2010 IEEE International conference on communications (ICC). IEEE, pp 1\u20136","key":"10722_CR29","DOI":"10.1109\/ICC.2010.5502414"},{"issue":"14","key":"10722_CR30","doi-asserted-by":"publisher","first-page":"18067","DOI":"10.1007\/s11042-017-4957-6","volume":"77","author":"Z Yin","year":"2018","unstructured":"Yin Z, Niu X, Zhang X, Tang J, Luo B (2018) Reversible data hiding in encrypted AMBTC images. Multimed Tools Appl 77(14):18067\u201318083","journal-title":"Multimed Tools Appl"},{"key":"10722_CR31","doi-asserted-by":"publisher","first-page":"107652","DOI":"10.1016\/j.sigpro.2020.107652","volume":"175","author":"HS Ye","year":"2020","unstructured":"Ye HS, Zhou NR, Gong LH (2020) Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Sig Process 175:107652","journal-title":"Sig Process"},{"key":"10722_CR32","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.sigpro.2016.12.029","volume":"135","author":"H Yao","year":"2017","unstructured":"Yao H, Qin C, Tang Z, Tian Y (2017) Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels\u2019 coordinates with minimum distortion. Sign Process 135:26\u201335","journal-title":"Sign Process"},{"issue":"4","key":"10722_CR33","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Sig Process Lett 18(4):255\u2013258","journal-title":"IEEE Sig Process Lett"},{"issue":"2","key":"10722_CR34","first-page":"77","volume":"5","author":"W Zheng","year":"2020","unstructured":"Zheng W, Chang CC, Horng JH, Lin J, Shi Y (2020) An adjustable RDH method for AMBTC-compressed images using unilateral pixel value modification strategy. J Netw Intell 5(2):77\u201392","journal-title":"J Netw Intell"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10722-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10722-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10722-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T06:18:29Z","timestamp":1625552309000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10722-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,29]]},"references-count":34,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10722"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10722-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,4,29]]},"assertion":[{"value":"2 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}