{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:34:51Z","timestamp":1764333291617},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T00:00:00Z","timestamp":1682640000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T00:00:00Z","timestamp":1682640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-15514-7","type":"journal-article","created":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T01:02:20Z","timestamp":1682643740000},"page":"44123-44146","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Large-capacity image data hiding based on table look-up"],"prefix":"10.1007","volume":"82","author":[{"given":"Wenjia","family":"Ding","sequence":"first","affiliation":[]},{"given":"Huyin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Reulke","sequence":"additional","affiliation":[]},{"given":"Yulin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,28]]},"reference":[{"key":"15514_CR1","doi-asserted-by":"publisher","first-page":"23393","DOI":"10.1007\/s11042-020-10224-w","volume":"80","author":"A Abdel Raouf","year":"2021","unstructured":"Abdel Raouf A (2021) A new data hiding approach for image steganography based on visual color sensitivity. Multimed Tools Appl 80:23393\u201323417. https:\/\/doi.org\/10.1007\/s11042-020-10224-w","journal-title":"Multimed Tools Appl"},{"key":"15514_CR2","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-017-3714-8","volume":"90","author":"A Akgul","year":"2017","unstructured":"Akgul A, Kacar S, Aricioglu B (2017) A new two-level data hiding algorithm for high security based on a nonlinear system. Nonlinear Dynam 90:1123\u20131140. https:\/\/doi.org\/10.1007\/s11071-017-3714-8","journal-title":"Nonlinear Dynam"},{"key":"15514_CR3","doi-asserted-by":"publisher","first-page":"9701","DOI":"10.1109\/ACCESS.2023.3238575","volume":"11","author":"E Akhtarkavan","year":"2023","unstructured":"Akhtarkavan E, Majidi B, Mandegari A (2023) Secure Medical Image Communication Using Fragile Data Hiding Based on Discrete Wavelet Transform and Lattice Vector Quantization. IEEE Access 11:9701\u20139715. https:\/\/doi.org\/10.1109\/ACCESS.2023.3238575","journal-title":"IEEE Access"},{"key":"15514_CR4","doi-asserted-by":"publisher","first-page":"29199","DOI":"10.1007\/s11042-020-09441-0","volume":"79","author":"L Alshehri","year":"2020","unstructured":"Alshehri L, Hussain M, Aboalsamh H, at al. (2020) Fragile watermarking for image authentication using BRINT and ELM. Multimed Tools Appl 79:29199\u201329223. https:\/\/doi.org\/10.1007\/s11042-020-09441-0","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"15514_CR5","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TCSS.2021.3125025","volume":"9","author":"A Anand","year":"2022","unstructured":"Anand A, Singh AK (2022) SDH: Secure Data Hiding in Fused Medical Image for Smart Healthcare. IEEE Trans Comput Soc Syst 9(4):1265\u20131273. https:\/\/doi.org\/10.1109\/TCSS.2021.3125025","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"4","key":"15514_CR6","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3923\/ajit.2012.151.152","volume":"11","author":"NM Asad","year":"2012","unstructured":"Asad NM, Salameh HI (2012) A Modification of Odd and Even Digital Watermark Technique. Asian J Inform Technol 11(4):151\u2013152","journal-title":"Asian J Inform Technol"},{"key":"15514_CR7","doi-asserted-by":"publisher","first-page":"39995","DOI":"10.1007\/s11042-022-12557-0","volume":"81","author":"S Basu","year":"2022","unstructured":"Basu S, Debnath A, Basu A et al (2022) An image data hiding technique using Differential Evolution. Multimed Tools Appl 81:39995\u201340012. https:\/\/doi.org\/10.1007\/s11042-022-12557-0","journal-title":"Multimed Tools Appl"},{"key":"15514_CR8","doi-asserted-by":"publisher","unstructured":"Bose A, Maity SP (2022) Secure sparse watermarking on DWT-SVD for digital images. J Inform Sec Appl 68. https:\/\/doi.org\/10.1016\/j.jisa.2022.103255","DOI":"10.1016\/j.jisa.2022.103255"},{"issue":"1","key":"15514_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C-K Chan","year":"2004","unstructured":"Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(1):469\u2013474","journal-title":"Pattern Recogn"},{"key":"15514_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.sigpro.2016.11.003","volume":"133","author":"J-C Chang","year":"2017","unstructured":"Chang J-C, Lu Y-Z, Wu H-L (2017) A separable reversible data hiding scheme for encrypted JPEG bit streams. Signal Process 133:135\u2013143","journal-title":"Signal Process"},{"key":"15514_CR11","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s00530-017-0560-y","volume":"25","author":"Y-Y Chen","year":"2019","unstructured":"Chen Y-Y, Chi K-Y (2019) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimedia Systems 25:551\u2013563. https:\/\/doi.org\/10.1007\/s00530-017-0560-y","journal-title":"Multimedia Systems"},{"key":"15514_CR12","doi-asserted-by":"publisher","unstructured":"Chen Y-Y, Hsia C-H, Jhong S-Y et al (2018) Data hiding method for AMBTC compressed images, Journal of Ambient Intelligence and Humanized. Comput. https:\/\/doi.org\/10.1007\/s12652-018-1048-0","DOI":"10.1007\/s12652-018-1048-0"},{"key":"15514_CR13","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1007\/s11042-022-13266-4","volume":"82","author":"B Chen","year":"2023","unstructured":"Chen B, Yin X, Lu W et al (2023) Reversible data hiding in encrypted domain by signal reconstruction. Multimed Tools Appl 82:1203\u20131222. https:\/\/doi.org\/10.1007\/s11042-022-13266-4","journal-title":"Multimed Tools Appl"},{"key":"15514_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2020.3006382","volume":"16","author":"IC Dragoi","year":"2021","unstructured":"Dragoi IC, Coltuc D (2021) On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction. IEEE Trans Inform Foren Sec 16:187\u2013189. https:\/\/doi.org\/10.1109\/TIFS.2020.3006382","journal-title":"IEEE Trans Inform Foren Sec"},{"key":"15514_CR15","first-page":"315","volume":"2015","author":"H-S Huang","year":"2015","unstructured":"Huang H-S (2015) A combined image steganographic method using multi-way pixel value differencing, the Sixth International Conference on Graphic and Image Pro\u00adcessing, ICGIP 2015. Int Soc Optics Phot 2015:315\u2013319","journal-title":"Int Soc Optics Phot"},{"issue":"9","key":"15514_CR16","doi-asserted-by":"publisher","first-page":"5888","DOI":"10.1109\/TCSVT.2022.3164013","volume":"32","author":"C-L Jhong","year":"2022","unstructured":"Jhong C-L, Wu H-L (2022) Grayscale-Invariant Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Trans Circuits Syst Video Technol 32(9):5888\u20135901. https:\/\/doi.org\/10.1109\/TCSVT.2022.3164013","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2010","key":"15514_CR17","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1179\/136821910X12651933390584","volume":"58","author":"K-H Jung","year":"2010","unstructured":"Jung K-H (2010) High-capacity steganographic method based on pixel-value differencing and LSB replacement methods. Imaging Sci J 58(2010):213\u2013221","journal-title":"Imaging Sci J"},{"issue":"2015","key":"15514_CR18","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s11042-013-1832-y","volume":"74","author":"K-H Jung","year":"2015","unstructured":"Jung K-H, Yoo K-Y (2015) Steganographic method based on interpolation and LSB substitution of digital images. Multimed Tools Appl 74(2015):2143\u20132155","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"15514_CR19","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.1109\/TII.2020.3028612","volume":"17","author":"A Kamili","year":"2021","unstructured":"Kamili A, Hurrah NN, Parah SA et al (2021) DWFCAT: Dual Watermarking Framework for Industrial Image Authentication and Tamper Localization. IEEE Trans Industr Inform 17(7):5108\u20135117. https:\/\/doi.org\/10.1109\/TII.2020.3028612","journal-title":"IEEE Trans Industr Inform"},{"key":"15514_CR20","doi-asserted-by":"publisher","unstructured":"Khadse DB, Swain G (2022) Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-022-06961-9","DOI":"10.1007\/s13369-022-06961-9"},{"key":"15514_CR21","doi-asserted-by":"publisher","first-page":"6917","DOI":"10.1007\/s11042-022-13623-3","volume":"82","author":"LS Khan","year":"2023","unstructured":"Khan LS, Khan M, Hazzazi MM et al (2023) A novel combination of information confidentiality and data hiding mechanism. Multimed Tools Appl 82:6917\u20136941. https:\/\/doi.org\/10.1007\/s11042-022-13623-3","journal-title":"Multimed Tools Appl"},{"issue":"2012","key":"15514_CR22","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1049\/iet-ipr.2011.0059","volume":"6","author":"M Khodaei","year":"2012","unstructured":"Khodaei M, Faez K (2012) New adaptive steganographic method using least significant bit substitution and pixel-value differencing. IET Image Process 6(2012):677\u2013686","journal-title":"IET Image Process"},{"issue":"8","key":"15514_CR23","doi-asserted-by":"publisher","first-page":"2605","DOI":"10.1016\/j.sigpro.2010.02.007","volume":"90","author":"HW Kim","year":"2010","unstructured":"Kim HW, Choi D, Kim T (2010) Selective correlation detector for additive spread spectrum watermarking in transform domain. Signal Process 90(8):2605\u20132610","journal-title":"Signal Process"},{"key":"15514_CR24","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11554-015-0548-9","volume":"14","author":"D-S Kim","year":"2018","unstructured":"Kim D-S, Yoon E-J, Kim C et al (2018) Reversible data hiding scheme with edge-direction predictor and modulo operation. J Real-Time Image Proc 14:137\u2013145. https:\/\/doi.org\/10.1007\/s11554-015-0548-9","journal-title":"J Real-Time Image Proc"},{"key":"15514_CR25","doi-asserted-by":"publisher","first-page":"7373","DOI":"10.1007\/s10489-021-02789-2","volume":"52","author":"S Kumar","year":"2022","unstructured":"Kumar S, Gupta A, Walia GS (2022) Reversible data hiding: A contemporary survey of state-of-the-art, opportunities and challenges. Appl Intell 52:7373\u20137406. https:\/\/doi.org\/10.1007\/s10489-021-02789-2","journal-title":"Appl Intell"},{"key":"15514_CR26","doi-asserted-by":"publisher","unstructured":"Leelavathi R, Prasad MNG (2022) A high capacity reversible data hiding scheme in efficient LZW compression. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-13765-4","DOI":"10.1007\/s11042-022-13765-4"},{"key":"15514_CR27","doi-asserted-by":"publisher","unstructured":"Lef\u00e8vre P, Carr\u00e9 P, Fontaine C et al (2022) Efficient image tampering localization using semi-fragile watermarking and error control codes. Signal Process 190. https:\/\/doi.org\/10.1016\/j.sigpro.2021.108342","DOI":"10.1016\/j.sigpro.2021.108342"},{"key":"15514_CR28","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1007\/s11042-017-4388-4","volume":"77","author":"F Li","year":"2018","unstructured":"Li F, Mao Q, Chang C-C (2018) Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed Tools Appl 77:5149\u20135168. https:\/\/doi.org\/10.1007\/s11042-017-4388-4","journal-title":"Multimed Tools Appl"},{"key":"15514_CR29","doi-asserted-by":"publisher","first-page":"32226","DOI":"10.1109\/ACCESS.2020.2973179","volume":"8","author":"Y Li","year":"2020","unstructured":"Li Y, Chang C-C, He M (2020) High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique. IEEE Access 8:32226\u201332245. https:\/\/doi.org\/10.1109\/ACCESS.2020.2973179","journal-title":"IEEE Access"},{"issue":"5","key":"15514_CR30","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1016\/j.csi.2013.12.013","volume":"36","author":"Y-K Lin","year":"2014","unstructured":"Lin Y-K (2014) A data hiding scheme based upon DCT coefficient modification. Comput Stand Inter 36(5):855\u2013862","journal-title":"Comput Stand Inter"},{"issue":"3","key":"15514_CR31","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.csi.2005.07.001","volume":"28","author":"J-L Liu","year":"2006","unstructured":"Liu J-L, Lou D-C, Tso H-K (2006) A robust watermarking scheme using self-reference image. Comput Stand Interf 28(3):356\u2013367","journal-title":"Comput Stand Interf"},{"issue":"5","key":"15514_CR32","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/TIFS.2018.2871748","volume":"14","author":"Z Liu","year":"2019","unstructured":"Liu Z, Huang Y, Huang J (2019) Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks. IEEE Trans Inform Forensics Sec 14(5):1171\u20131180","journal-title":"IEEE Trans Inform Forensics Sec"},{"key":"15514_CR33","doi-asserted-by":"publisher","unstructured":"Luo Y, Li L, Liu J, at al.. (2021) A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Syst Appl 168. https:\/\/doi.org\/10.1016\/j.eswa.2020.114272","DOI":"10.1016\/j.eswa.2020.114272"},{"issue":"2018","key":"15514_CR34","doi-asserted-by":"publisher","first-page":"15803","DOI":"10.1007\/s11042-017-5156-1","volume":"77","author":"A Malik","year":"2018","unstructured":"Malik A, Singh S, Kumar R (2018) Recovery based high capacity reversible data hiding scheme using even-odd embedding. Multimed Tools Appl 77(2018):15803\u201315827","journal-title":"Multimed Tools Appl"},{"issue":"2017","key":"15514_CR35","first-page":"234","volume":"122","author":"J Mandal","year":"2017","unstructured":"Mandal J, Das D (2017) Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow\/underflow. Signal Process 122(2017):234\u2013244","journal-title":"Signal Process"},{"key":"15514_CR36","doi-asserted-by":"publisher","unstructured":"Moad MS, Kafi MR, Khaldi A (2022) A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocess Microsyst 90. https:\/\/doi.org\/10.1016\/j.micpro.2022.104490","DOI":"10.1016\/j.micpro.2022.104490"},{"key":"15514_CR37","doi-asserted-by":"publisher","first-page":"7181","DOI":"10.1007\/s11042-018-6465-8","volume":"78","author":"AA Mohammad","year":"2019","unstructured":"Mohammad AA, Ali A-H, Farfoura M (2019) An improved capacity data hiding technique based on image interpolation. Multimed Tools Appl 78:7181\u20137205. https:\/\/doi.org\/10.1007\/s11042-018-6465-8","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"15514_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMM.2003.819759","volume":"6","author":"DP Mukherjee","year":"2004","unstructured":"Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans Multim 6(1):1\u201315","journal-title":"IEEE Trans Multim"},{"key":"15514_CR39","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s00530-020-00735-9","volume":"27","author":"R Patel","year":"2021","unstructured":"Patel R, Lad K, Patel M et al (2021) A hybrid DST-SBPNRM approach for compressed video steganography. Multimedia Systems 27:417\u2013428. https:\/\/doi.org\/10.1007\/s00530-020-00735-9","journal-title":"Multimedia Systems"},{"key":"15514_CR40","doi-asserted-by":"publisher","first-page":"20897","DOI":"10.1007\/s11042-020-08715-x","volume":"79","author":"S Prasad","year":"2020","unstructured":"Prasad S, Pal AK (2020) Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed Tools Appl 79:20897\u201320928. https:\/\/doi.org\/10.1007\/s11042-020-08715-x","journal-title":"Multimed Tools Appl"},{"key":"15514_CR41","doi-asserted-by":"publisher","unstructured":"Raj NR, Shreelekshmi R (2022) Fragile watermarking scheme for tamper localization in images using logistic map and singular value decomposition. J Visual Commun Imag Represent 85. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103500","DOI":"10.1016\/j.jvcir.2022.103500"},{"key":"15514_CR42","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s00371-021-02312-1","volume":"39","author":"R Roselin Kiruba","year":"2023","unstructured":"Roselin Kiruba R, Sharmila TS (2023) A novel data hiding by image interpolation using edge quad-tree block complexity. Vis Comput 39:59\u201372. https:\/\/doi.org\/10.1007\/s00371-021-02312-1","journal-title":"Vis Comput"},{"issue":"2","key":"15514_CR43","first-page":"359","volume":"2","author":"D Singla","year":"2012","unstructured":"Singla D, Syal R (2012) Data Security Using LSB & DCT Steganography In Images. Int J Comput Engin Res 2(2):359\u2013364","journal-title":"Int J Comput Engin Res"},{"key":"15514_CR44","doi-asserted-by":"publisher","unstructured":"Sisaudia V, Vishwakarma VP (2022) A secure gray-scale image watermarking technique in fractional DCT domain using zig-zag scrambling. J Inform Sec Appli 69. https:\/\/doi.org\/10.1016\/j.jisa.2022.103296","DOI":"10.1016\/j.jisa.2022.103296"},{"key":"15514_CR45","doi-asserted-by":"publisher","first-page":"18807","DOI":"10.1007\/s11042-022-12684-8","volume":"81","author":"C-S Tsai","year":"2022","unstructured":"Tsai C-S, Zhang Y-S, Weng C-Y (2022) Separable reversible data hiding in encrypted images based on Paillier cryptosystem. Multimed Tools Appl 81:18807\u201318827. https:\/\/doi.org\/10.1007\/s11042-022-12684-8","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"15514_CR46","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1016\/j.patrec.2004.06.012","volume":"25","author":"Y Wang","year":"2004","unstructured":"Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recogn Lett 25(15):1681\u20131689","journal-title":"Pattern Recogn Lett"},{"issue":"2012","key":"15514_CR47","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.ins.2010.07.011","volume":"192","author":"Z-H Wang","year":"2012","unstructured":"Wang Z-H, Chang C-C, Li M-C (2012) Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf Sci 192(2012):98\u2013108","journal-title":"Inf Sci"},{"issue":"12","key":"15514_CR48","doi-asserted-by":"publisher","first-page":"6560","DOI":"10.1109\/TII.2019.2924083","volume":"15","author":"J Wang","year":"2019","unstructured":"Wang J, Zhang L-Y, Chen J et al (2019) Compressed Sensing Based Selective Encryption With Data Hiding Capability. IEEE Trans Indust Inform 15(12):6560\u20136571. https:\/\/doi.org\/10.1109\/TII.2019.2924083","journal-title":"IEEE Trans Indust Inform"},{"key":"15514_CR49","doi-asserted-by":"publisher","first-page":"6477","DOI":"10.1007\/s11042-021-11704-3","volume":"81","author":"Z Xia","year":"2022","unstructured":"Xia Z, Zhang W, Duan H et al (2022) Fragile watermarking scheme in spatial domain based on prime number distribution theory. Multimed Tools Appl 81:6477\u20136496. https:\/\/doi.org\/10.1007\/s11042-021-11704-3","journal-title":"Multimed Tools Appl"},{"key":"15514_CR50","doi-asserted-by":"publisher","unstructured":"Yadav GS, Mangal P, Parmar G et al (2023) Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-14322-9","DOI":"10.1007\/s11042-022-14322-9"},{"issue":"2009","key":"15514_CR51","first-page":"509","volume":"18","author":"H Yang","year":"2019","unstructured":"Yang H, Sun X, Sun G (2019) A high-capacity image data hiding scheme using adaptive LSB substitution. Radio Eng 18(2009):509\u2013516","journal-title":"Radio Eng"},{"issue":"1","key":"15514_CR52","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/TMM.2018.2844679","volume":"21","author":"S Yi","year":"2019","unstructured":"Yi S, Zhou Y (2019) Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling. IEEE Trans Multimed 21(1):51\u201364. https:\/\/doi.org\/10.1109\/TMM.2018.2844679","journal-title":"IEEE Trans Multimed"},{"issue":"4","key":"15514_CR53","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"Z Yin","year":"2020","unstructured":"Yin Z, Xiang Y, Zhang X (2020) Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding. IEEE Trans Multimed 22(4):874\u2013884. https:\/\/doi.org\/10.1109\/TMM.2019.2936314","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"15514_CR54","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/TCSVT.2022.3207270","volume":"33","author":"M Yu","year":"2023","unstructured":"Yu M, Yao H, Qin C et al (2023) Reversible Data Hiding in Palette Images. IEEE Trans Circuits Syst Video Technol 33(2):648\u2013660. https:\/\/doi.org\/10.1109\/TCSVT.2022.3207270","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2009","key":"15514_CR55","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s11760-008-0094-z","volume":"3","author":"AO Zaid","year":"2009","unstructured":"Zaid AO, Makhloufi A, Bouallegue A (2009) Improved QIM-based watermarking integrated to JPEG2000 coding scheme. Sign, Image Video Proc 3(2009):197\u2013207","journal-title":"Sign, Image Video Proc"},{"key":"15514_CR56","doi-asserted-by":"publisher","unstructured":"Zhang H, Sun S, Hu L et al (2022) A novel data hiding scheme based on improved diamond encoding in IWT domain. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-14235-7","DOI":"10.1007\/s11042-022-14235-7"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15514-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15514-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15514-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T06:11:05Z","timestamp":1698473465000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15514-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,28]]},"references-count":56,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["15514"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15514-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,28]]},"assertion":[{"value":"25 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, and there is no professional or other personal interest of any nature or kind in any product, service, and\/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}