{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:29:13Z","timestamp":1740122953775,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T00:00:00Z","timestamp":1667952000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T00:00:00Z","timestamp":1667952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902448"],"award-info":[{"award-number":["61902448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"research project of the Macao Polytechnic University","award":["RP\/ESCA-03\/2021"],"award-info":[{"award-number":["RP\/ESCA-03\/2021"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11042-022-14125-y","type":"journal-article","created":{"date-parts":[[2022,11,9]],"date-time":"2022-11-09T06:02:55Z","timestamp":1667973775000},"page":"16323-16342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reversible multi-watermarking for color images with grayscale invariance"],"prefix":"10.1007","volume":"82","author":[{"given":"Ying","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7490-6695","authenticated-orcid":false,"given":"Xiaochen","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Xingrun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianqing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,9]]},"reference":[{"key":"14125_CR1","doi-asserted-by":"publisher","first-page":"19695","DOI":"10.1007\/s11042-021-10729-y","volume":"80","author":"R Anushiadevi","year":"2021","unstructured":"Anushiadevi R, Praveenkumar P, Rayappan JBB, Amirtharajan R (2021) Uncover the cover to recover the hidden secret - a separable reversible data hiding framework. Multimed Tools Appl 80:19695\u201319714","journal-title":"Multimed Tools Appl"},{"key":"14125_CR2","doi-asserted-by":"publisher","first-page":"116084","DOI":"10.1016\/j.image.2020.116084","volume":"91","author":"Y Bai","year":"2021","unstructured":"Bai Y, Jiang G, Zhu Z, Xu H, Song Y (2021) Reversible data hiding scheme for high dynamic range images based on multiple prediction error expansion. Signal Process Image Commun 91:116084","journal-title":"Signal Process Image Commun"},{"key":"14125_CR3","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A (2008) Speeded-up-robust-features-surf. Comput Vis Image Underst 110:346\u2013359","journal-title":"Comput Vis Image Underst"},{"key":"14125_CR4","doi-asserted-by":"crossref","unstructured":"Li B, Wang M, Huang JW, Li XL (2014) A new cost function for spatial image steganography. In: Proceedings of the 2014 IEEE International Conference on Image Processing (ICIP), Paris, pp 4210\u20134206","DOI":"10.1109\/ICIP.2014.7025854"},{"key":"14125_CR5","doi-asserted-by":"crossref","unstructured":"Chang CC, Wang X, Lin CC (2021) An efficient dual prediction\u2013based reversible data hiding and reduced code method for ambtc. Multimed Tools Appl 80(24):33177\u201333177","DOI":"10.1007\/s11042-021-11630-4"},{"key":"14125_CR6","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1109\/TCSVT.2006.882380","volume":"16","author":"C Chin-Chen","year":"2006","unstructured":"Chin-Chen C, Wei-Liang T, Chia-Chen L (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Vid Technol 16:1301\u20131308","journal-title":"IEEE Trans Circuits Syst Vid Technol"},{"key":"14125_CR7","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/TITB.2008.2007199","volume":"13","author":"G Coatrieux","year":"2009","unstructured":"Coatrieux G, Le Guillou C, Cauvin JM, Roux C (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 13:158\u2013165","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"14125_CR8","doi-asserted-by":"crossref","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","DOI":"10.1109\/83.650120"},{"key":"14125_CR9","doi-asserted-by":"crossref","unstructured":"Wu XS (2005) A new technique for digital image watermarking. J Comput Sci Technol 20(6):843\u2013848","DOI":"10.1007\/s11390-005-0843-1"},{"key":"14125_CR10","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1109\/TIP.2016.2549458","volume":"25","author":"IC Dragoi","year":"2016","unstructured":"Dragoi IC, Coltuc D (2016) Adaptive pairing reversible watermarking. IEEE Trans Image Process 25:2420\u20132422","journal-title":"IEEE Trans Image Process"},{"key":"14125_CR11","first-page":"404","volume":"3951","author":"TT Herbert Bay","year":"2006","unstructured":"Herbert Bay TT, Van Gool L, Zurich ETH (2006) Surf: speeded up robust features. In proc. Eur Conf Comput Vis 3951:404\u2013417","journal-title":"Eur Conf Comput Vis"},{"key":"14125_CR12","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen T-S, Wu H-Y (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19:199\u2013202","journal-title":"IEEE Signal Process Lett"},{"key":"14125_CR13","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TCSVT.2018.2803303","volume":"29","author":"D Hou","year":"2019","unstructured":"Hou D, Zhang W, Chen K, Lin S-J, Yu N (2019) Reversible data hiding in color image with grayscale invariance. IEEE Trans Circuits Syst Vid Technol 29:363\u2013374","journal-title":"IEEE Trans Circuits Syst Vid Technol"},{"key":"14125_CR14","doi-asserted-by":"publisher","first-page":"116118","DOI":"10.1016\/j.image.2020.116118","volume":"92","author":"J Hou","year":"2021","unstructured":"Hou J, Ou B, Tian H, Qin Z (2021) Reversible data hiding based on multiple histograms modification and deep neural networks. Signal Process Image Commun 92:116118","journal-title":"Signal Process Image Commun"},{"key":"14125_CR15","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIFS.2015.2392556","volume":"10","author":"X Hu","year":"2015","unstructured":"Hu X, Zhang W, Li X, Yu N (2015) Minimum rate prediction and optimized histograms modification for reversible data hiding. IEEE Trans Inf Forensic Secur 10:653\u2013664","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"14125_CR16","doi-asserted-by":"publisher","first-page":"115632","DOI":"10.1016\/j.image.2019.115632","volume":"80","author":"D Huang","year":"2020","unstructured":"Huang D, Wang J (2020) High-capacity reversible data hiding in encrypted image based on specific encryption process. Signal Process Image Commun 80:115632","journal-title":"Signal Process Image Commun"},{"key":"14125_CR17","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","volume":"26","author":"F Huang","year":"2016","unstructured":"Huang F, Qu X, Kim HJ, Huang J (2016) Reversible data hiding in jpeg images. IEEE Trans Circuits Syst Vid Technol 26:1610\u20131621","journal-title":"IEEE Trans Circuits Syst Vid Technol"},{"key":"14125_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MIC.2010.86","volume":"14","author":"K Hwang","year":"2010","unstructured":"Hwang K, Li D (2010) Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput 14:14\u201322","journal-title":"IEEE Internet Comput"},{"key":"14125_CR19","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2002) Lossless data embedding for all image formats. Secur. Watermarking Multimed. Content. SAN JOSE, CA 4675:572\u2013583","DOI":"10.1155\/S1110865702000537"},{"key":"14125_CR20","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"L Jian","year":"2015","unstructured":"Jian L, Xiaolong L, Bin Y, Xingming S (2015) Segmentation-based image copy-move forgery detection scheme. IEEE Trans Inf Forensic Secur 10:507\u2013518","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"14125_CR21","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1117\/1.482648","volume":"7","author":"F Jordan","year":"1998","unstructured":"Jordan F (1998) Digital watermarking of color images using amplitude modulation. J Electron Imaging 7:326\u2013332","journal-title":"J Electron Imaging"},{"key":"14125_CR22","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"T Jun","year":"2003","unstructured":"Jun T (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Vid Technol 13:890\u2013896","journal-title":"IEEE Trans Circuits Syst Vid Technol"},{"key":"14125_CR23","doi-asserted-by":"crossref","unstructured":"Keles O, Yilmaz MA, Tekalp AM, Korkmaz C, Dogan Z (2021) On the computation of psnr for a set of images or video. In: Proceedings of the 2021 Picture Coding Symposium (PCS), pp 286\u2013290","DOI":"10.1109\/PCS50896.2021.9477470"},{"key":"14125_CR24","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251\u2013272","journal-title":"Inf Sci"},{"key":"14125_CR25","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","volume":"20","author":"X Li","year":"2011","unstructured":"Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20:3524\u20133533","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"14125_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91\u2013110","journal-title":"Int J Comput Vis"},{"key":"14125_CR27","doi-asserted-by":"publisher","first-page":"3307","DOI":"10.1007\/s11042-020-09719-3","volume":"80","author":"A Mohammadi","year":"2021","unstructured":"Mohammadi A, Nakhkash M (2021) Sorting methods and adaptive thresholding for histogram based reversible data hiding. Multimed Tools Appl 80:3307\u20133325","journal-title":"Multimed Tools Appl"},{"key":"14125_CR28","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou B, Li X, Zhao Y, Ni R, Shi YQ (2013) Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans Image Process 22:5010\u20135021","journal-title":"IEEE Trans Image Process"},{"key":"14125_CR29","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.sigpro.2014.10.012","volume":"108","author":"B Ou","year":"2015","unstructured":"Ou B, Li X, Zhao Y, Ni R (2015) Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding. Signal Process 108:642\u2013657","journal-title":"Signal Process"},{"key":"14125_CR30","doi-asserted-by":"publisher","first-page":"115715","DOI":"10.1016\/j.image.2019.115715","volume":"81","author":"F Peng","year":"2020","unstructured":"Peng F, Zhao Y, Zhang X, Long M, Pan W-q (2020) Reversible data hiding based on rsbemd coding and adaptive multi-segment left and right histogram shifting. Signal Process Image Commun 81:115715","journal-title":"Signal Process Image Commun"},{"key":"14125_CR31","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TMM.2020.2985537","volume":"23","author":"P Puteaux","year":"2021","unstructured":"Puteaux P, Puech W (2021) A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Trans Multimed 23:636\u2013650","journal-title":"IEEE Trans Multimed"},{"key":"14125_CR32","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted jpeg bitstream. IEEE Trans Multimed 16:1486\u20131491","journal-title":"IEEE Trans Multimed"},{"key":"14125_CR33","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Hyoung Joong K, Jeho N, Suresh S, Yun Qing S (2009) Reversible watermarking algorithm using sorting and prediction. IEEE Trans Circuits Syst Vid Technol 19:989\u2013999","journal-title":"IEEE Trans Circuits Syst Vid Technol"},{"key":"14125_CR34","doi-asserted-by":"publisher","first-page":"8423","DOI":"10.1007\/s11042-020-10035-z","volume":"80","author":"DIM Setiadi","year":"2021","unstructured":"Setiadi DIM (2021) Psnr vs ssim: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423\u20138444","journal-title":"Multimed Tools Appl"},{"key":"14125_CR35","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodriguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721\u2013730","journal-title":"IEEE Trans Image Process"},{"key":"14125_CR36","doi-asserted-by":"crossref","unstructured":"Surasak T, Takahiro I, Cheng CH, Wang CE, Sheng PY (2018) Histograms of oriented gradients for human detection. In: Proceedings of the 2018 15th International Conference on Business and Industrial Research, Bangkok, pp 172\u2013176","DOI":"10.1109\/ICBIR.2018.8391187"},{"key":"14125_CR37","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai P, Hu Y-C, Yeh H-L (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 89:1129\u20131143","journal-title":"Signal Process"},{"key":"14125_CR38","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola P, Michael J (2004) Robust real-time face detection. Int J Comput Vis 57:137\u2013154","journal-title":"Int J Comput Vis"},{"key":"14125_CR39","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.jnca.2016.09.008","volume":"75","author":"NBA Warif","year":"2016","unstructured":"Warif NBA, Wahab AWA, Idris MYI, Ramli R, Salleh R, Shamshirband S, Choo KKR (2016) Copy-move forgery detection: survey, challenges and future directions. J Netw Comput Appl 75:259\u2013278","journal-title":"J Netw Comput Appl"},{"key":"14125_CR40","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"N Zhicheng","year":"2006","unstructured":"Zhicheng N, Yun-Qing S, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circuits Syst Vid Technol 16:354\u2013362","journal-title":"IEEE Trans Circuits Syst Vid Technol"},{"key":"14125_CR41","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.1109\/TMM.2014.2340695","volume":"16","author":"X Zhu","year":"2014","unstructured":"Zhu X, Ding J, Dong H, Hu K, Zhang X (2014) Normalized correlation-based quantization modulation for robust watermarking. IEEE Trans Multimed 16:1888\u20131904","journal-title":"IEEE Trans Multimed"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14125-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14125-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14125-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T09:30:00Z","timestamp":1681551000000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14125-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,9]]},"references-count":41,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["14125"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14125-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,11,9]]},"assertion":[{"value":"15 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}