{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:09Z","timestamp":1767340149860,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T00:00:00Z","timestamp":1697673600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17173-0","type":"journal-article","created":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T08:02:16Z","timestamp":1697702536000},"page":"44857-44878","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Texture driven adaptive multi-level block selection based reversible data hiding in encrypted image"],"prefix":"10.1007","volume":"83","author":[{"given":"Fang","family":"Cao","sequence":"first","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3385-8164","authenticated-orcid":false,"given":"Fengyong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,19]]},"reference":[{"issue":"7","key":"17173_CR1","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FAP Petitcolas","year":"1999","unstructured":"Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"key":"17173_CR2","doi-asserted-by":"publisher","first-page":"1227926","DOI":"10.1155\/2022\/1227926","volume":"2022","author":"F Cao","year":"2022","unstructured":"Cao F, Yujie Fu, Yao H, Zou M, Li J, Qin C (2022) Separable reversible data hiding in encrypted VQ-encoded images. Secur Commun Netw 2022:1227926","journal-title":"Secur Commun Netw"},{"key":"17173_CR3","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y-Q Shi","year":"2016","unstructured":"Shi Y-Q, Li X, Zhang X, Hao-Tian Wu, Ma B (2016) Reversible data hiding: advances in the past two decades. IEEE Access 4:3210\u20133237","journal-title":"IEEE Access"},{"issue":"3","key":"17173_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s00530-020-00739-5","volume":"27","author":"P Kong","year":"2021","unstructured":"Kong P, Di Fu, Li X, Qin C (2021) Reversible data hiding in encrypted medical DICOM image. Multimedia Syst 27(3):303\u2013315","journal-title":"Multimedia Syst"},{"key":"17173_CR5","unstructured":"Barton JM (1997) Method and apparatus for embedding authentication information within digital data. US Patent 5646997, 8 July 1997"},{"issue":"2","key":"17173_CR6","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"17173_CR7","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/TIP.2013.2257814","volume":"22","author":"W Zhang","year":"2013","unstructured":"Zhang W, Xiaocheng Hu, Li X, Nenghai Yu (2013) Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression. IEEE Trans Image Process 22(7):2775\u20132785","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"17173_CR8","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y-Q, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"17173_CR9","first-page":"55","volume":"75","author":"G Ma","year":"2019","unstructured":"Ma G, Wang J (2019) Efficient reversible data hiding in encrypted images based on multi-stage integer wavelet transform. Sig Process: Image Commun 75:55\u201363","journal-title":"Sig Process: Image Commun"},{"issue":"12","key":"17173_CR10","doi-asserted-by":"publisher","first-page":"8849","DOI":"10.1109\/TCSVT.2022.3192553","volume":"32","author":"F Li","year":"2022","unstructured":"Li F, Qi Z, Zhang X, Qin C (2022) JPEG reversible data hiding using dynamic distortion optimizing with frequency priority reassignment. IEEE Trans Circuits Syst Video Technol 32(12):8849\u20138863","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"17173_CR11","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.ins.2022.02.040","volume":"595","author":"F Li","year":"2022","unstructured":"Li F, Zhang L, Qin C, Kui Wu (2022) Reversible data hiding for jpeg images with minimum additive distortion. Inf Sci 595:142\u2013158","journal-title":"Inf Sci"},{"issue":"7","key":"17173_CR12","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13(7):1670\u20131681","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"17173_CR13","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"17173_CR14","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"HJ Kim","year":"2008","unstructured":"Kim HJ, Sachnev V, Shi YQ, Nam J, Choo H-G (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Sec 3(3):456\u2013465","journal-title":"IEEE Trans Inf Forensics Sec"},{"key":"17173_CR15","doi-asserted-by":"crossref","unstructured":"Mahasree M, Puviarasan N, Aruna P (2021) An improved reversible data hiding for encrypted images over cloud. In: 2021 5th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, Tirunelveli, India, pp 732-738","DOI":"10.1109\/ICOEI51242.2021.9452956"},{"key":"17173_CR16","first-page":"116696","volume":"105","author":"Yu Mingji","year":"2022","unstructured":"Mingji Yu, Yao H, Qin C (2022) Reversible data hiding in encrypted images without additional information transmission. Sig Process: Image Commun 105:116696","journal-title":"Sig Process: Image Commun"},{"issue":"22","key":"17173_CR17","doi-asserted-by":"publisher","first-page":"31441","DOI":"10.1007\/s11042-019-07946-x","volume":"78","author":"K Chen","year":"2019","unstructured":"Chen K, Chang C-C (2019) Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map. Multimed Tools Appl 78(22):31441\u201331465","journal-title":"Multimed Tools Appl"},{"key":"17173_CR18","doi-asserted-by":"publisher","first-page":"1288","DOI":"10.1109\/TMM.2021.3062699","volume":"24","author":"Y Wang","year":"2021","unstructured":"Wang Y, He W (2021) High capacity reversible data hiding in encrypted image based on adaptive msb prediction. IEEE Trans Multimedia 24:1288\u20131298","journal-title":"IEEE Trans Multimedia"},{"key":"17173_CR19","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.ins.2021.10.050","volume":"584","author":"C Yu","year":"2022","unstructured":"Yu C, Zhang X, Li G, Zhan S, Tang Z (2022) Reversible data hiding with adaptive difference recovery for encrypted images. Inf Sci 584:89\u2013110","journal-title":"Inf Sci"},{"key":"17173_CR20","doi-asserted-by":"publisher","first-page":"103421","DOI":"10.1016\/j.jvcir.2021.103421","volume":"82","author":"Xu Wang","year":"2022","unstructured":"Wang Xu, Chang C-C, Lin C-C, Chang C-C (2022) Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images. J Vis Commun Image Represent 82:103421","journal-title":"J Vis Commun Image Represent"},{"key":"17173_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3172226","author":"Yu Mingji","year":"2022","unstructured":"Mingji Yu, Yao H, Qin C, Zhang X (2022) A comprehensive analysis method for reversible data hiding in stream-cipher-encrypted images. IEEE Trans Circuits Syst Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2022.3172226","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"17173_CR22","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","volume":"153","author":"C Qin","year":"2018","unstructured":"Qin C, Zhang W, Cao F, Zhang X, Chang C-C (2018) Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process 153:109\u2013122","journal-title":"Signal Process"},{"issue":"4","key":"17173_CR23","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1109\/TCSVT.2021.3091319","volume":"32","author":"C Qin","year":"2022","unstructured":"Qin C, Jiang C, Mo Q, Yao H, Chang C-C (2022) Reversible data hiding in encrypted image via secret sharing based on GF(p) and GF(28). IEEE Trans Circuits Syst Video Technol 32(4):1928\u20131941","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"17173_CR24","doi-asserted-by":"publisher","first-page":"2141","DOI":"10.1007\/s11042-020-09805-6","volume":"80","author":"F Li","year":"2021","unstructured":"Li F, Zhu H, Jiang Yu, Qin C (2021) Double linear regression prediction based reversible data hiding in encrypted images. Multimed Tools Appl 80:2141\u20132159","journal-title":"Multimed Tools Appl"},{"key":"17173_CR25","doi-asserted-by":"publisher","first-page":"30749","DOI":"10.1007\/s11042-018-6187-y","volume":"77","author":"Qi Li","year":"2018","unstructured":"Li Qi, Yan B, Li H, Chen Na (2018) Separable reversible data hiding in encrypted images with improved security and capacity. Multimed Tools Appl 77:30749\u201330768","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"17173_CR26","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TCSVT.2020.2990952","volume":"30","author":"A Mohammadi","year":"2020","unstructured":"Mohammadi A, Nakhkash M, Akhaee MA (2020) A high-capacity reversible data hiding in encrypted images employing local difference predictor. IEEE Trans Circ Syst Video Technol 30(8):2366\u20132376","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"2","key":"17173_CR27","first-page":"451","volume":"32","author":"Yu Chunqiang","year":"2021","unstructured":"Chunqiang Yu, Zhang X, Zhang X, Li G, Tang Z (2021) Reversible data hiding with hierarchical embedding for encrypted images. IEEE Trans Circuits Syst Video Technol 32(2):451\u2013466","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"17173_CR28","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.chaos.2003.12.022","volume":"21","author":"G Chen","year":"2004","unstructured":"Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749\u2013761","journal-title":"Chaos, Solitons Fractals"},{"key":"17173_CR29","first-page":"115632","volume":"80","author":"D Huang","year":"2020","unstructured":"Huang D, Wang J (2020) High-capacity reversible data hiding in encrypted image based on specific encryption process. Sig Process: Image Commun 80:115632","journal-title":"Sig Process: Image Commun"},{"issue":"3","key":"17173_CR30","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Nenghai Yu, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensics Secur 8(3):553\u2013562","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"17173_CR31","first-page":"78","volume":"64","author":"S Yi","year":"2018","unstructured":"Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Sig Process: Image Commun 64:78\u201388","journal-title":"Sig Process: Image Commun"},{"issue":"8","key":"17173_CR32","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1109\/83.855427","volume":"9","author":"MJ Weinberger","year":"2000","unstructured":"Weinberger MJ, Seroussi G, Sapiro G (2000) The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. IEEE Trans Image Process 9(8):1309\u20131324","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"17173_CR33","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/TIT.1966.1053907","volume":"12","author":"S Golomb","year":"1966","unstructured":"Golomb S (1966) Run-length encodings. IEEE Trans Inf Theory 12(3):399\u2013401","journal-title":"IEEE Trans Inf Theory"},{"key":"17173_CR34","doi-asserted-by":"publisher","first-page":"6013","DOI":"10.1007\/s11042-022-13406-w","volume":"82","author":"F Li","year":"2023","unstructured":"Li F, Zhu H, Qin C (2023) Reversible data hiding in encrypted images using median prediction and bit plane cycling-XOR. Multimed Tools Appl 82:6013\u20136032","journal-title":"Multimed Tools Appl"},{"key":"17173_CR35","unstructured":"BOSSbase v1.01 (2020).\u00a0http:\/\/dde.binghamton.edu\/download\/. Accessed March 2020"},{"key":"17173_CR36","doi-asserted-by":"publisher","first-page":"11591","DOI":"10.1007\/s11042-019-08460-w","volume":"79","author":"A Malik","year":"2020","unstructured":"Malik A, Wang H-X, Chen Y, Khan AN (2020) A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multimed Tools Appl 79:11591\u201311614","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"17173_CR37","doi-asserted-by":"publisher","first-page":"25349","DOI":"10.1007\/s11042-019-07769-w","volume":"78","author":"Wu Haibin","year":"2019","unstructured":"Haibin Wu, Li F, Qin C, Wei W (2019) Separable reversible data hiding in encrypted images based on scalable blocks. Multimed Tools Appl 78(18):25349\u201325372","journal-title":"Multimed Tools Appl"},{"key":"17173_CR38","doi-asserted-by":"publisher","first-page":"9691","DOI":"10.1007\/s11042-018-6567-3","volume":"78","author":"Z Tang","year":"2019","unstructured":"Tang Z, Shijie Xu, Yao H, Qin C, Zhang X (2019) Reversible data hiding with differential compression in encrypted image. Multimed Tools Appl 78:9691\u20139715","journal-title":"Multimed Tools Appl"},{"key":"17173_CR39","doi-asserted-by":"publisher","first-page":"20307","DOI":"10.1007\/s11042-021-10698-2","volume":"80","author":"Xu Shuying","year":"2021","unstructured":"Shuying Xu, Chang C-C, Liu Y (2021) A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction. Multimed Tools Appl 80:20307\u201320325","journal-title":"Multimed Tools Appl"},{"key":"17173_CR40","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1109\/TIP.2021.3132834","volume":"31","author":"T Zhou","year":"2022","unstructured":"Zhou T, Li L, Li X, Feng C-M, Li J, Shao L (2022) Group-wise learning for weakly supervised semantic segmentation. IEEE Trans Image Process 31:799\u2013811","journal-title":"IEEE Trans Image Process"},{"key":"17173_CR41","doi-asserted-by":"crossref","unstructured":"Zhou T, Wang W, Liang Z, Shen J (2021) Face forensics in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE,\u00a0Nashville, TN, pp 5778\u20135788","DOI":"10.1109\/CVPR46437.2021.00572"},{"issue":"2","key":"17173_CR42","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TPAMI.2019.2932058","volume":"44","author":"Yu Jun","year":"2022","unstructured":"Jun Yu, Tan M, Zhang H, Rui Y, Tao D (2022) Hierarchical deep click feature prediction for fine-grained image recognition. IEEE Trans Pattern Anal Mach Intell 44(2):563\u2013578","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"7","key":"17173_CR43","doi-asserted-by":"publisher","first-page":"3952","DOI":"10.1109\/TII.2018.2884211","volume":"15","author":"C Hong","year":"2019","unstructured":"Hong C, Jun Yu, Zhang J, Jin X, Lee K-H (2019) Multimodal face-pose estimation with multitask manifold deep learning. IEEE Trans Industr Inf 15(7):3952\u20133961","journal-title":"IEEE Trans Industr Inf"},{"key":"17173_CR44","unstructured":"BOWS2 database (2021).\u00a0https:\/\/photogallery.sc.egov.usda.gov\/. Accessed July 2021"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17173-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17173-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17173-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T11:37:26Z","timestamp":1714390646000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17173-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,19]]},"references-count":44,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17173"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17173-0","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,10,19]]},"assertion":[{"value":"30 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}