{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:20:43Z","timestamp":1771705243703,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11042-022-13396-9","type":"journal-article","created":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T07:02:45Z","timestamp":1659337365000},"page":"5923-5948","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["New predictor-based schemes for reversible data hiding"],"prefix":"10.1007","volume":"82","author":[{"given":"Binbin","family":"Ni","sequence":"first","affiliation":[]},{"given":"Weihong","family":"Bi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,1]]},"reference":[{"issue":"8","key":"13396_CR1","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alatter","year":"2004","unstructured":"Alatter AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"13396_CR2","doi-asserted-by":"publisher","first-page":"2977","DOI":"10.3233\/JIFS-191478","volume":"39","author":"R Anushiadevi","year":"2020","unstructured":"Anushiadevi R, Praveenkumar P, Rayappan JBB, et al. (2020) Reversible data hiding method based on pixel expansion and homomorphic encryption. J Intell Fuzzy Syst 39(3):2977\u20132990","journal-title":"J Intell Fuzzy Syst"},{"issue":"23","key":"13396_CR3","first-page":"1","volume":"38","author":"R Anushiadevi","year":"2020","unstructured":"Anushiadevi R, Pravinkumar P, Rayappan JBB, et al. (2020) A high payload separable reversible data hiding in cipher image with good decipher image quality. J Intell Fuzzy Syst 38(23):1\u201312","journal-title":"J Intell Fuzzy Syst"},{"issue":"2","key":"13396_CR4","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"key":"13396_CR5","doi-asserted-by":"publisher","first-page":"23579","DOI":"10.1007\/s11042-017-5547-3","volume":"77","author":"Ko-Chin Chang","year":"2018","unstructured":"Chang Ko-Chin (2018) Efficient lossless watermarking algorithm using gradient sorting and selective embedding. Multimed Tools Appl 77:23579\u201323606","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"13396_CR6","first-page":"185","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goijan M, Du R (2002) Lossless data embedding-new paradigm in digital watermarking. EURASIP J Adv Signal Process 2002(1):185\u2013196","journal-title":"EURASIP J Adv Signal Process"},{"key":"13396_CR7","unstructured":"Gandhi B, Honsinger C, Rabbani M, Smith C (1995) A proposal submitted in response to call for contributions for JTC 1.29.12 [JTC1\/SC29\/WG1 N41]. ISO Working Document, ISO\/IEC JTC1\/SC29\/WG1 N204"},{"issue":"11","key":"13396_CR8","doi-asserted-by":"publisher","first-page":"2911","DOI":"10.1016\/j.sigpro.2010.04.012","volume":"90","author":"W Hong","year":"2010","unstructured":"Hong W, Chen T-S, Chang Y-P, Shiu C-W (2010) A High capacity reversible data hiding scheme using orthogonal projection and prediction error modification. Signal Process 90(11):2911\u20132922","journal-title":"Signal Process"},{"issue":"11","key":"13396_CR9","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1016\/j.jss.2009.05.051","volume":"82","author":"W Hong","year":"2009","unstructured":"Hong W, Chen T-S, Shiu C-W (2009) Reversible data hiding for high quality images using modification of prediction errors. J Syst Softw 82 (11):1833\u20131842","journal-title":"J Syst Softw"},{"issue":"12","key":"13396_CR10","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra L, Heijmans H (2005) Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process 14 (12):2082\u20132090","journal-title":"IEEE Trans Image Process"},{"key":"13396_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14:101\u2013114","journal-title":"J Real-Time Image Proc"},{"issue":"4","key":"13396_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.3390\/electronics9040644","volume":"9","author":"C Kim","year":"2020","unstructured":"Kim C, Yang CN, Leng L (2020) high-capacity data hiding for ABTC-EQ based compressed image. Electronics 9(4):644","journal-title":"Electronics"},{"key":"13396_CR13","unstructured":"Langdon GG, Speck D, Haidinyak C, Macy S (1995) Contribution to JTC 1.29.12: JSLUG. ISO working document, ISO\/IEC JTC1\/SC29\/WG1 N199"},{"issue":"2,3","key":"13396_CR14","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1093\/comjnl\/40.2_and_3.127","volume":"40","author":"N Memon","year":"1997","unstructured":"Memon N, Wu X (1997) Recent developments in Context-Based predictive techniques for lossless image compression. Computer J 40(2,3):127\u2013136","journal-title":"Computer J"},{"key":"13396_CR15","doi-asserted-by":"crossref","unstructured":"Mintzer F, Lotspiech J, Morimoto N (1997) Safeguarding digital library contents and users: digital watermarking. D-Lib Magazine","DOI":"10.1045\/december97-lotspiech"},{"issue":"3","key":"13396_CR16","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"13396_CR17","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"13396_CR18","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim H-J, Nam J, Suresh S, Shi Y-Q (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Video Technol 19(7):89\u2013999","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"13396_CR19","doi-asserted-by":"crossref","unstructured":"Sayood K (2012) Introduction to data compression, 4th edition. Morgan Kaufmann, U.S","DOI":"10.1016\/B978-0-12-415796-5.00001-6"},{"key":"13396_CR20","unstructured":"Speck D (1995) Proposal for next generation lossless compression of continuous-tone still pictures: activity level classification model (ALCM). ISO working Document, ISO\/IEC JTC1\/SC29\/WG1 N198"},{"issue":"6","key":"13396_CR21","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"W-L Tai","year":"2009","unstructured":"Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE Trans Circuits Syst Video Technol 19(6):906\u2013910","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"13396_CR22","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721\u2013730","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"13396_CR23","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"Tian J","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"6","key":"13396_CR24","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai P, Hu Y-C, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89(6):1129\u20131143","journal-title":"Signal Process"},{"key":"13396_CR25","unstructured":"Ueno I, Ono F (1995) CLARA: Continuous-tone lossless coding with edge analysis and range amplitude detection. ISO Working Document, ISO\/IEC JTC1\/SC29\/WG1 N197"},{"issue":"4","key":"13396_CR26","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1109\/26.585919","volume":"45","author":"X Wu","year":"1997","unstructured":"Wu X, Memon N (1997) Context-based, adaptive, lossless image coding. IEEE Trans Commun 45(4):437\u2013444","journal-title":"IEEE Trans Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13396-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13396-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13396-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,25]],"date-time":"2023-01-25T08:28:12Z","timestamp":1674635292000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13396-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["13396"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13396-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,1]]},"assertion":[{"value":"17 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}