{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:21:07Z","timestamp":1771705267206,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T00:00:00Z","timestamp":1678492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11042-023-14455-5","type":"journal-article","created":{"date-parts":[[2023,3,11]],"date-time":"2023-03-11T05:04:45Z","timestamp":1678511085000},"page":"25883-25898","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["High capacity reversible data hiding in encrypted images using block labeling"],"prefix":"10.1007","volume":"82","author":[{"given":"P","family":"Jeena","sequence":"first","affiliation":[]},{"given":"R","family":"Shreelekshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,11]]},"reference":[{"key":"14455_CR1","unstructured":"Bas P, Furon T (2017) Image database of BOWS-2. [Online]. Available: http:\/\/bows2.ec-lille.fr. Accessed: Jun. 20, 2017"},{"key":"14455_CR2","doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevny T (2011) Break our steganographic system The ins and outs of organizing BOSS,\u201d in Proc. 13th Int. Workshop Inf. Hiding, May 2011, pp. 59\u201370. Available: http:\/\/dde.binghamton.edu\/download\/","DOI":"10.1007\/978-3-642-24178-9_5"},{"issue":"22","key":"14455_CR3","doi-asserted-by":"publisher","first-page":"31441","DOI":"10.1007\/s11042-019-07946-x","volume":"78","author":"K Chen","year":"2019","unstructured":"Chen K, Chang CC (2019) Error-free separable reversible data hiding in encrypted im- ages using linear regression and prediction error map. Multimed Tools Appl 78(22):31441\u201331465","journal-title":"Multimed Tools Appl"},{"key":"14455_CR4","doi-asserted-by":"crossref","unstructured":"Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted im- ages using side match. IEEE Signal Process Lett 19(4):199\u2013202","DOI":"10.1109\/LSP.2012.2187334"},{"key":"14455_CR5","doi-asserted-by":"crossref","unstructured":"Lee CF, Chen HL (2011) Reversible data hiding based on histogram modification of prediction-error. Imaging Sci J 59(5):278\u2013292","DOI":"10.1179\/1743131X10Y.0000000018"},{"key":"14455_CR6","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.image.2015.10.001","volume":"39","author":"M Li","year":"2015","unstructured":"Li M, Xiao D, Zhang Y, Nan H (2015) Reversible data hiding in encrypted images using cross division and additive homomorphism. Signal Process Image Commun 39:234\u2013248","journal-title":"Signal Process Image Commun"},{"issue":"23","key":"14455_CR7","doi-asserted-by":"publisher","first-page":"30749","DOI":"10.1007\/s11042-018-6187-y","volume":"77","author":"Q Li","year":"2018","unstructured":"Li Q, Yan B, Li H, Chen N (2018) Separable reversible data hiding in encrypted im- ages with improved security and capacity. Multimed Tools Appl 77(23):30749\u201330768","journal-title":"Multimed Tools Appl"},{"key":"14455_CR8","doi-asserted-by":"crossref","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inform Forensics Secur 8(3):553\u2013562","DOI":"10.1109\/TIFS.2013.2248725"},{"issue":"8","key":"14455_CR9","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TCSVT.2020.2990952","volume":"30","author":"A Mohammadi","year":"2020","unstructured":"Mohammadi A, Nakhkash M, Akhaee MA (2020) A high-capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Trans Circuits Syst Video Technol 30(8):2366\u20132376","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"14455_CR10","doi-asserted-by":"crossref","unstructured":"Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inform Forensics Secur 13(7):1670\u20131681","DOI":"10.1109\/TIFS.2018.2799381"},{"key":"14455_CR11","doi-asserted-by":"crossref","unstructured":"Puteaux P, Puech W (2021) A recursive reversible data hiding in encrypted images method with a very high payload. IEEE Trans Multimed 23:636\u2013650","DOI":"10.1109\/TMM.2020.2985537"},{"key":"14455_CR12","doi-asserted-by":"crossref","unstructured":"Ren H, Niu S, Wang X (2019) Reversible data hiding in encrypted images using pob number system. IEEE Access 7:149527\u2013149541","DOI":"10.1109\/ACCESS.2019.2946929"},{"key":"14455_CR13","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/TMM.2020.2999187","volume":"23","author":"Y Wang","year":"2021","unstructured":"Wang Y, Cai Z, He W (2021) High capacity reversible data hiding in encrypted image based on intra-block lossless compression. IEEE Trans Multimed 23:1466\u20131473","journal-title":"IEEE Trans Multimed"},{"key":"14455_CR14","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","volume":"104","author":"X Wu","year":"2014","unstructured":"Wu X, Sun W (2014) High-capacity reversible data hiding in encrypted images by pre- diction error. Signal Process 104:387\u2013400","journal-title":"Signal Process"},{"issue":"8","key":"14455_CR15","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","volume":"22","author":"Y Wu","year":"2019","unstructured":"Wu Y, Xiang Y, Guo Y, Tang J, Yin Z (2019) An improved reversible data hiding in encrypted images using parametric binary tree labeling. IEEE Trans Multimed 22(8):1929\u20131938","journal-title":"IEEE Trans Multimed"},{"issue":"1","key":"14455_CR16","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TMM.2018.2844679","volume":"21","author":"S Yi","year":"2018","unstructured":"Yi S, Zhou Y (2018) Separable and reversible data hiding in encrypted images us- ing parametric binary tree labeling. IEEE Trans Multimed 21(1):51\u201364","journal-title":"IEEE Trans Multimed"},{"issue":"4","key":"14455_CR17","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"Z Yin","year":"2019","unstructured":"Yin Z, Xiang Y, Zhang X (2019) Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans Multimed 22(4):874\u2013884","journal-title":"IEEE Trans Multimed"},{"issue":"4","key":"14455_CR18","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255\u2013258","journal-title":"IEEE Signal Process Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14455-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14455-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14455-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T20:17:18Z","timestamp":1687551438000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14455-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,11]]},"references-count":18,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["14455"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14455-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,11]]},"assertion":[{"value":"18 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}