{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:47Z","timestamp":1740122867398,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["No. 2021J01865 and No.2021J01866"],"award-info":[{"award-number":["No. 2021J01865 and No.2021J01866"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Project Fund of Fujian Shipping Research Institute"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11042-022-13961-2","type":"journal-article","created":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T11:55:12Z","timestamp":1665402912000},"page":"15593-15612","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An adaptive data hiding for AMBTC compressed images with recoverability using bound shifting technique"],"prefix":"10.1007","volume":"82","author":[{"given":"Xiaoyu","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Guangsong","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2873-0190","authenticated-orcid":false,"given":"Wien","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Kia Sheng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tung-Shou","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"issue":"3","key":"13961_CR1","doi-asserted-by":"publisher","first-page":"033020","DOI":"10.1117\/1.2764466","volume":"16","author":"EE Abdallah","year":"2007","unstructured":"Abdallah EE, Hamza AB, Bhattacharya P (2007) Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms. J Electron Imaging 16(3):033020","journal-title":"J Electron Imaging"},{"key":"13961_CR2","doi-asserted-by":"crossref","unstructured":"Abdallah EE, Hamza AB, Bhattacharya P (2007) Spectral graph-theoretic approach to 3D mesh watermarking. Proceedings of graphics interface","DOI":"10.1145\/1268517.1268570"},{"key":"13961_CR3","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s11760-008-0079-y","volume":"3","author":"EE Abdallah","year":"2009","unstructured":"Abdallah EE, Hamza AB, Bhattacharya P (2009) Watermarking 3D models using spectral mesh compression. Signal Image Video Process 3:375\u2013389","journal-title":"Signal Image Video Process"},{"key":"13961_CR4","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11760-009-0114-7","volume":"4","author":"EE Abdallah","year":"2010","unstructured":"Abdallah EE, Hamza AB, Bhattacharya P (2010) Video watermarking using wavelet transform and tensor algebra. SIViP 4:233\u2013245","journal-title":"SIViP"},{"key":"13961_CR5","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral thesis, University of Buckingham"},{"key":"13961_CR6","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. International Conference on Research in Security Standardisation","DOI":"10.1007\/978-3-319-14054-4_10"},{"key":"13961_CR7","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2014) Secure steganography technique based on bitplane indexes. IEEE International Symposium on Multimedia IEEE","DOI":"10.1109\/ISM.2013.55"},{"key":"13961_CR8","unstructured":"BOWS-2 Image database. (n.d.) Available: http:\/\/bows2.ec-lille.fr\/"},{"issue":"3","key":"13961_CR9","first-page":"1","volume":"25","author":"YY Chen","year":"2017","unstructured":"Chen YY, Chi KY (2017) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimed Syst 25(3):1\u201313","journal-title":"Multimed Syst"},{"key":"13961_CR10","doi-asserted-by":"crossref","unstructured":"Y.H. Chen, C.C. Chang, C.C. Lin, and Z.M. Wang, \u201cAn adaptive reversible data hiding scheme using AMBTC and quantization level difference,\u201d Appl Sci, vo. 11, no. 2, pp. 635, 2021.","DOI":"10.3390\/app11020635"},{"issue":"4","key":"13961_CR11","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1016\/j.dsp.2013.03.008","volume":"23","author":"KS Choi","year":"2013","unstructured":"Choi KS (2013) Bit plane modification for improving MSE-near optimal DPCM-based block truncation coding. Digital Signal Process 23(4):1171\u20131180","journal-title":"Digital Signal Process"},{"key":"13961_CR12","doi-asserted-by":"publisher","first-page":"5441","DOI":"10.1007\/s11042-016-4032-8","volume":"76","author":"W Hong","year":"2017","unstructured":"Hong W, Ma Y, Wu HC, Chen TS (2017) An efficient reversible data hiding method for AMBTC compressed images. Multimed Tools Appl 76:5441\u20135460. https:\/\/doi.org\/10.1007\/s11042-016-4032-8","journal-title":"Multimed Tools Appl"},{"key":"13961_CR13","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.ins.2018.05.055","volume":"463-464","author":"W Hong","year":"2018","unstructured":"Hong W, Zhou X, Lou DC, Chen TS, Li Y (2018) Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques. Inf Sci 463-464:245\u2013260","journal-title":"Inf Sci"},{"key":"13961_CR14","doi-asserted-by":"publisher","first-page":"254","DOI":"10.3390\/sym10070254","volume":"10","author":"W Hong","year":"2018","unstructured":"Hong W, Zhou X, Weng S (2018) Joint adaptive coding and reversible data hiding for AMBTC compressed images. Symmetry 10:254","journal-title":"Symmetry"},{"key":"13961_CR15","doi-asserted-by":"publisher","first-page":"129347","DOI":"10.1109\/ACCESS.2020.3009232","volume":"8","author":"JH Horng","year":"2020","unstructured":"Horng JH, Chang CC, Li GL (2020) Steganography using quotient value differencing and LSB substitution for AMBTC compressed images. IEEE Access 8:129347\u2013129358","journal-title":"IEEE Access"},{"issue":"1","key":"13961_CR16","doi-asserted-by":"publisher","first-page":"013012","DOI":"10.1117\/1.JEI.22.1.013012","volume":"22","author":"YC Hu","year":"2013","unstructured":"Hu YC, Lo CC, Chen WL, Wen CH (2013) Joint image coding and image authentication based on absolute moment block truncation coding. J Electron Imaging 22(1):013012","journal-title":"J Electron Imaging"},{"issue":"14","key":"13961_CR17","doi-asserted-by":"publisher","first-page":"15435","DOI":"10.1007\/s11042-016-3847-7","volume":"76","author":"YC Hu","year":"2017","unstructured":"Hu YC, Choo KKR, Chen WL (2017) Tamper detection and image recovery for BTC-compressed images. Multimed Tools Appl 76(14):15435\u201315463","journal-title":"Multimed Tools Appl"},{"key":"13961_CR18","first-page":"4412","volume":"62","author":"S Kim","year":"2017","unstructured":"Kim S, Lee HJ (2017) RGBW image compression by low-complexity adaptive multi-level block truncation coding. IEEE Trans Consum Electron 62:4412\u20134419","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"13961_CR19","doi-asserted-by":"publisher","first-page":"160","DOI":"10.3934\/mbe.2020009","volume":"17","author":"C Kim","year":"2019","unstructured":"Kim C, Shin D, Yang CN (2019) High capacity data hiding with absolute moment block truncation coding image based on interpolation. Math Biosci Eng: MBE 17(1):160\u2013178","journal-title":"Math Biosci Eng: MBE"},{"issue":"3","key":"13961_CR20","first-page":"507","volume":"10","author":"M Lema","year":"1984","unstructured":"Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color image. IEEE Trans Inf Forensics Secur 10(3):507\u2013518","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"13961_CR21","doi-asserted-by":"publisher","first-page":"214732","DOI":"10.1109\/ACCESS.2020.3040048","volume":"8","author":"S Li","year":"2020","unstructured":"Li S, Hu L, Sun C, Chi L, Li H (2020) A reversible data hiding algorithm based on prediction error with large amounts of data hiding in spatial domain. IEEE Access 8:214732\u2013214741","journal-title":"IEEE Access"},{"issue":"11","key":"13961_CR22","doi-asserted-by":"publisher","first-page":"3823","DOI":"10.1007\/s11042-013-1801-5","volume":"74","author":"CC Lin","year":"2015","unstructured":"Lin CC, Liu XL, Tai WL, Yuan SM (2015) A novel reversible data hiding scheme based on AMBTC compression technique. Multimed Tools Appl 74(11):3823\u20133842","journal-title":"Multimed Tools Appl"},{"key":"13961_CR23","doi-asserted-by":"publisher","first-page":"24949","DOI":"10.1007\/s11042-021-10914-z","volume":"80","author":"YH Lin","year":"2021","unstructured":"Lin YH, Hu YC, Chen WL, Acharya B (2021) Reversible self-verifying and self-recovering technique for color image demosaicking. Multimed Tools Appl 80:24949\u201324968","journal-title":"Multimed Tools Appl"},{"key":"13961_CR24","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s11045-017-0530-8","volume":"29","author":"A Malik","year":"2018","unstructured":"Malik A, Sikka G, Verma HK (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim Syst Sign Process 29:1801\u20131818","journal-title":"Multidim Syst Sign Process"},{"issue":"7","key":"13961_CR25","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1049\/iet-ipr.2016.0618","volume":"12","author":"R Peyman","year":"2018","unstructured":"Peyman R, Gholamhossein D (2018) Two reversible data hiding schemes for VQ-compressed images based on index coding. IET Image Process 12(7):1195\u20131203","journal-title":"IET Image Process"},{"issue":"8","key":"13961_CR26","first-page":"1","volume":"45","author":"W Su","year":"2019","unstructured":"Su W, Wang X, Shen Y (2019) Reversible data hiding based on pixel-value-ordering and pixel block merging strategy. J Inf Secur Appl 45(8):1\u20139","journal-title":"J Inf Secur Appl"},{"key":"13961_CR27","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","volume":"7","author":"W Sun","year":"2013","unstructured":"Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. Signal Image Video Process 7:297\u2013306","journal-title":"Signal Image Video Process"},{"issue":"1","key":"13961_CR28","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.ijleo.2015.09.216","volume":"127","author":"M Tang","year":"2016","unstructured":"Tang M, Zeng S, Chen X, Jie H, Du Y (2016) An adaptive image steganography using AMBTC compression and interpolation technique. Optik 127(1):471\u2013477","journal-title":"Optik"},{"key":"13961_CR29","unstructured":"The USC-SIPI Image Database. (n.d.) Available: http:\/\/sipi.usc.edu\/database"},{"issue":"1","key":"13961_CR30","first-page":"1","volume":"57","author":"J Wang","year":"2017","unstructured":"Wang J, Jiang N, Zhao N (2017) A novel quantum image compression method based on JPEG. Int J Theor Phys 57(1):1\u201326","journal-title":"Int J Theor Phys"},{"issue":"11","key":"13961_CR31","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.dsp.2019.06.016","volume":"93","author":"X Wu","year":"2019","unstructured":"Wu X, Yang CN (2019) Partial reversible AMBTC-based secret image sharing with Steganography. Digi Signal Process 93(11):22\u201333","journal-title":"Digi Signal Process"},{"issue":"8","key":"13961_CR32","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.ins.2021.02.015","volume":"563","author":"H Yao","year":"2021","unstructured":"Yao H, Mao F, Qin C, Tang Z (2021) Dual-JPEG -image reversible data hiding. Inf Sci 563(8):130\u2013149","journal-title":"Inf Sci"},{"issue":"2","key":"13961_CR33","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1587\/transcom.E96.B.624","volume":"96","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Guo SZ, Zhe-Ming LU, Luo H (2013) Reversible data hiding for BTC-compressed images based on lossless coding of mean tables. IEICE Trans Commun 96(2):624\u2013631","journal-title":"IEICE Trans Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13961-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13961-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13961-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T11:41:33Z","timestamp":1679658093000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13961-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":33,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["13961"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13961-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"24 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest that is relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}