{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T09:41:05Z","timestamp":1685007665828},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11042-022-14032-2","type":"journal-article","created":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T02:02:14Z","timestamp":1665367334000},"page":"21205-21241","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A separable and dual data hiding algorithm based on adaptive ternary segmentation coding and ZN-shape space-filling curve"],"prefix":"10.1007","volume":"82","author":[{"given":"Shi","family":"Hui","sequence":"first","affiliation":[]},{"given":"Ma","family":"Sai","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Jian","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Zhiyu","sequence":"additional","affiliation":[]},{"given":"Huang","family":"Dan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"key":"14032_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.sigpro.2019.02.016","volume":"160","author":"M Alawida","year":"2019","unstructured":"Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45\u201358","journal-title":"Signal Process"},{"key":"14032_CR2","doi-asserted-by":"publisher","first-page":"3263902","DOI":"10.1155\/2019\/3263902","volume":"2019","author":"M Al-Zubaidie","year":"2019","unstructured":"Al-Zubaidie M, Zhang Z, Ji Z (2019) RAMHU: a new robust lightweight scheme for mutual users authentication in healthcare applications. Secur Commun Netw 2019:3263902\u20133263926","journal-title":"Secur Commun Netw"},{"key":"14032_CR3","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.sigpro.2016.03.021","volume":"128","author":"A Belazi","year":"2016","unstructured":"Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155\u2013170","journal-title":"Signal Process"},{"key":"14032_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.sigpro.2017.08.020","volume":"143","author":"C Cao","year":"2018","unstructured":"Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122\u2013133","journal-title":"Signal Process"},{"key":"14032_CR5","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.optlaseng.2016.10.006","volume":"90","author":"R Enayatifar","year":"2017","unstructured":"Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146\u2013154","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"14032_CR6","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11042-020-09677-w","volume":"80","author":"LH Gong","year":"2021","unstructured":"Gong LH, Tian C, Zou WP, Zhou NR (2021) Robust and imperceptible watermarking scheme based on canny edge detection and svd in the contourlet domain. Multimed Tools Appl 80(1):439\u2013461","journal-title":"Multimed Tools Appl"},{"key":"14032_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s00530-020-00732-y","volume":"27","author":"A-N Heba","year":"2021","unstructured":"Heba A-N, Ali AH (2021) Reversible data hiding in adjacent zeros. Multimed Syst 27:229\u2013245","journal-title":"Multimed Syst"},{"key":"14032_CR8","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1007\/s00371-021-02168-5","volume":"37","author":"K Hu","year":"2021","unstructured":"Hu K, Wang XC, Hu JP, Wang H, Qin H (2021) A novel robust zero-watermarking algorithm for medical images. Vis Comput 37:2841\u20132853","journal-title":"Vis Comput"},{"key":"14032_CR9","unstructured":"Jiang XY, Li S (2018) Beetle antennae search without parameter tuning ( BAS-WPT ) for multi-objective optimization[EB\/OL]. [2018-06-25]. Https: \/ \/arxiv. Org \/abs\/1811. 02395"},{"key":"14032_CR10","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s11045-020-00748-7","volume":"32","author":"G Kaur","year":"2021","unstructured":"Kaur G, Singh S, Rani R (2021) PVO based reversible data hiding technique for roughly textured images. Multidim Syst Sign Process 32:533\u2013558","journal-title":"Multidim Syst Sign Process"},{"key":"14032_CR11","unstructured":"Kodak lossless true color image suite [Online], (2016) Available from: http:\/\/r0k.us\/graphics\/kodak\/"},{"key":"14032_CR12","doi-asserted-by":"crossref","unstructured":"Li L, Luo Y, Liu J, et al (2020) A robust watermarking scheme with high security and low computational complexity. In: International Conference on Security and Privacy in Communication Systems, 439\u2013454","DOI":"10.1007\/978-3-030-63095-9_28"},{"key":"14032_CR13","doi-asserted-by":"publisher","first-page":"107618","DOI":"10.1016\/j.asoc.2021.107618","volume":"110","author":"Q Li","year":"2021","unstructured":"Li Q, Wang XY, Ma B, Wang X, Wang C, Xia Z, Shi Y (2021) Image steganography based on style transfer and quaternion exponent moments. Appl Soft Comput 110:107618","journal-title":"Appl Soft Comput"},{"key":"14032_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2020.12.002","volume":"553","author":"Q Li","year":"2021","unstructured":"Li Q, Wang XY, Wang XY, Ma B, Wang C, Shi Y (2021) An encrypted coverless information hiding method based on generative models. Inf Sci 553:19\u201330","journal-title":"Inf Sci"},{"issue":"6","key":"14032_CR15","doi-asserted-by":"publisher","first-page":"4037","DOI":"10.1007\/s11063-021-10582-y","volume":"53","author":"Q Li","year":"2021","unstructured":"Li Q, Wang XY, Wang XY, Shi Y (2021) CCCIH: content-consistency coverless information hiding method based on generative models. Neural Process Lett 53(6):4037\u20134046","journal-title":"Neural Process Lett"},{"key":"14032_CR16","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1109\/TCSVT.2021.3138795","volume":"32","author":"Q Li","year":"2022","unstructured":"Li Q, Wang XY, Wang XY et al (2022) Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans Circuits Syst Video Technol 32:5695\u20135706. https:\/\/doi.org\/10.1109\/TCSVT.2021.3138795","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"03","key":"14032_CR17","first-page":"0325","volume":"24","author":"XK Liang","year":"2019","unstructured":"Liang XK, Tao LM, Hu B (2019) Image hybrid encryption based on a generalized chaotic mapping and matrix nonlinear transformation. J Imaging Graph 24(03):0325\u20130333","journal-title":"J Imaging Graph"},{"key":"14032_CR18","doi-asserted-by":"publisher","first-page":"700","DOI":"10.3390\/app9040700","volume":"9","author":"J Liu","year":"2019","unstructured":"Liu J, Li J, Ma J, Sadiq N, Bhatti U, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Appl Sci-Basel 9:700","journal-title":"Appl Sci-Basel"},{"key":"14032_CR19","doi-asserted-by":"publisher","first-page":"9129","DOI":"10.1007\/s13369-021-05716-2","volume":"46","author":"RF Mansour","year":"2021","unstructured":"Mansour RF, Parah SA (2021) Reversible data hiding for electronic patient information security for telemedicine applications. Arab J Sci Eng 46:9129\u20139144","journal-title":"Arab J Sci Eng"},{"key":"14032_CR20","doi-asserted-by":"publisher","first-page":"13099","DOI":"10.1007\/s11042-020-10347-0","volume":"80","author":"TD Nguyen","year":"2021","unstructured":"Nguyen TD, Le HD (2021) A reversible data hiding scheme based on (5, 3) hamming code using extra information on overlapped pixel blocks of grayscale images. Multimed Tools Appl 80:13099\u201313120","journal-title":"Multimed Tools Appl"},{"key":"14032_CR21","doi-asserted-by":"publisher","first-page":"21651","DOI":"10.1007\/s11042-021-10651-3","volume":"80","author":"P Pal","year":"2021","unstructured":"Pal P, Jana B, Bhaumik J (2021) A secure reversible color image watermarking scheme based on LBP, Lagrange interpolation polynomial and weighted matrix. Multimed Tools Appl 80:21651\u201321678","journal-title":"Multimed Tools Appl"},{"key":"14032_CR22","doi-asserted-by":"publisher","first-page":"2464","DOI":"10.1007\/s00034-020-01585-6","volume":"40","author":"C Priya","year":"2021","unstructured":"Priya C, Ramya C (2021) Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection. Circuits Syst Signal Process 40:2464\u20132493","journal-title":"Circuits Syst Signal Process"},{"key":"14032_CR23","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.sigpro.2015.10.005","volume":"120","author":"ZH Shao","year":"2016","unstructured":"Shao ZH, Shang YY, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images. Signal Process 120:522\u2013531","journal-title":"Signal Process"},{"key":"14032_CR24","unstructured":"UCID-uncompressed colour image database [Online], (2016) Available from: http:\/\/homepages.lboro.ac.uk\/\u223ccogs\/datasets\/UCID\/ucid.html"},{"key":"14032_CR25","unstructured":"USC-SIPI image database [Online], (2016) Available from: http:\/\/sipi.usc.edu\/database\/"},{"issue":"3","key":"14032_CR26","doi-asserted-by":"publisher","first-page":"1291","DOI":"10.1109\/TCSI.2021.3133318","volume":"69","author":"XY Wang","year":"2022","unstructured":"Wang XY, Liu PB (2022) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst 69(3):1291\u20131301","journal-title":"IEEE Trans Circuits Syst"},{"key":"14032_CR27","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2021.07.096","volume":"579","author":"XY Wang","year":"2021","unstructured":"Wang XY, Zhang MZ (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128\u2013149","journal-title":"Inf Sci"},{"issue":"1","key":"14032_CR28","first-page":"1","volume":"23","author":"JL Wang","year":"2018","unstructured":"Wang JL, Sun X, Feng XQ (2018) Adaptive reversible image data hiding using pixel permutation. J Image Graph 23(1):1\u20138","journal-title":"J Image Graph"},{"key":"14032_CR29","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"CP Wang","year":"2019","unstructured":"Wang CP, Wang XY, Xia ZQ, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"issue":"12","key":"14032_CR30","doi-asserted-by":"publisher","first-page":"4440","DOI":"10.1109\/TCSVT.2019.2960507","volume":"30","author":"CP Wang","year":"2020","unstructured":"Wang CP, Wang XY, Xia ZQ, Ma B, Shi YQ (2020) Image description with polar harmonic fourier moments. IEEE Trans Circuits Syst Video Technol 30(12):4440\u20134452","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"14032_CR31","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","volume":"574","author":"XY Wang","year":"2021","unstructured":"Wang XY, Liu C, Jiang DH (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505\u2013527","journal-title":"Inf Sci"},{"key":"14032_CR32","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/LSP.2021.3080181","volume":"28","author":"XY Wang","year":"2021","unstructured":"Wang XY, Wang XY, Ma B, Li Q, Shi YQ (2021) High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Signal Process Lett 28:1125\u20131129","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"14032_CR33","first-page":"31","volume":"1","author":"Y Wu","year":"2021","unstructured":"Wu Y, Noonan JP, Agaian S (2021) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip J Sci Technol, J Sel Areas Telecommun 1(2):31\u201338","journal-title":"Cyber J: Multidiscip J Sci Technol, J Sel Areas Telecommun"},{"key":"14032_CR34","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10489-021-02476-2","volume":"52","author":"ZQ Xia","year":"2022","unstructured":"Xia ZQ, Wang XY, Wang CP, Wang C, Ma B, Li Q, Wang M, Zhao T (2022) A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl Intell 52:607\u2013621","journal-title":"Appl Intell"},{"issue":"6","key":"14032_CR35","doi-asserted-by":"publisher","first-page":"4028","DOI":"10.1109\/TCSVT.2021.3108767","volume":"32","author":"YJ Xian","year":"2022","unstructured":"Xian YJ, Wang XY, Teng L (2022) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol 32(6):4028\u20134037","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"01","key":"14032_CR36","first-page":"1","volume":"24","author":"ZJ Xiao","year":"2019","unstructured":"Xiao ZJ, Jiang D, Zhang H et al (2019) Adaptive zero-watermarking algorithm based on boost normed singular value decomposition. J Image Graph 24(01):1\u201312","journal-title":"J Image Graph"},{"key":"14032_CR37","doi-asserted-by":"publisher","first-page":"21679","DOI":"10.1007\/s11042-021-10717-2","volume":"80","author":"M Yamni","year":"2021","unstructured":"Yamni M, Karmouni H, Sayyouri M, Qjidaa H (2021) Robust zero-watermarking scheme based on novel quaternion radial fractional Charlier moments. Multimed Tools Appl 80:21679\u201321708","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"14032_CR38","first-page":"956","volume":"16","author":"XP Zhang","year":"2005","unstructured":"Zhang XP, Wang SZ (2005) Lossless information hiding based on pix- el-value exchange. J Optoelectron\u00b7Laser 16(8):956\u2013960","journal-title":"J Optoelectron\u00b7Laser"},{"key":"14032_CR39","doi-asserted-by":"crossref","unstructured":"Zhou Z, Zhu J, Su Y et al (2021) Geometric correction code-based robust image watermarking. IET Image Process:1\u201310","DOI":"10.1049\/ipr2.12143"},{"key":"14032_CR40","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","volume":"2","author":"TR Zong","year":"2015","unstructured":"Zong TR, Xiang Y, Natgunanathan I (2015) Robust histogram shape-based method for image watermarking. IEEE Trans Circuits Syst Video Technol 2:717\u2013729","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14032-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14032-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14032-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T09:13:11Z","timestamp":1685005991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14032-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":40,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["14032"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14032-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"7 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have ExternalRef removed financial and personal relationships with other people or organizations that can inappropriately influence our work, there is ExternalRef removed professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled \u201cA separable and dual data hiding algorithm based on adaptive Ternary Segmentation Coding and ZN-shape space-filling curve\u201d.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}