{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:33Z","timestamp":1767339513604,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"37","license":[{"start":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T00:00:00Z","timestamp":1716336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T00:00:00Z","timestamp":1716336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072325"],"award-info":[{"award-number":["62072325"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Program of Shanxi Province","award":["202103021224272","202103021224278"],"award-info":[{"award-number":["202103021224272","202103021224278"]}]},{"name":"Taiyuan University of Science and Technology scientific Research Initial Funding","award":["20212039"],"award-info":[{"award-number":["20212039"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19381-8","type":"journal-article","created":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T05:01:40Z","timestamp":1716354100000},"page":"84911-84932","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible data hiding in encrypted images with block-based bit-plane reallocation"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2082-9030","authenticated-orcid":false,"given":"Li","family":"Liu","sequence":"first","affiliation":[]},{"given":"Chaofan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yingchun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Anhong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,22]]},"reference":[{"issue":"22","key":"19381_CR1","doi-asserted-by":"publisher","first-page":"32239","DOI":"10.1007\/s11042-019-07997-0","volume":"78","author":"R Kumar","year":"2019","unstructured":"Kumar R, Jung KH (2019) A systematic survey on block truncation coding based data hiding techniques[J]. Multimedia Tools Appl 78(22):32239\u201332259","journal-title":"Multimedia Tools Appl"},{"issue":"9","key":"19381_CR2","doi-asserted-by":"publisher","first-page":"5965","DOI":"10.1007\/s11042-019-08255-z","volume":"79","author":"W Wang","year":"2020","unstructured":"Wang W (2020) A reversible data hiding algorithm based on bidirectional difference expansion [J]. Multimedia Tools Appl 79(9):5965\u20135988","journal-title":"Multimedia Tools Appl"},{"key":"19381_CR3","doi-asserted-by":"publisher","first-page":"103085","DOI":"10.1016\/j.jvcir.2021.103085","volume":"77","author":"P Puteaux","year":"2021","unstructured":"Puteaux P, Ong SY, Wong KS et al (2021) A survey of reversible data hiding in encrypted images - the first 12 years [J]. J Vis Commun Image Represent 77:103085","journal-title":"J Vis Commun Image Represent"},{"issue":"5","key":"19381_CR4","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.3390\/electronics12051222","volume":"12","author":"S KamilKhudhair","year":"2023","unstructured":"KamilKhudhair S, Sahu M, Raghunadan KR et al (2023) Secure reversible data hiding using block-wise histogram shifting[J]. Electronics 12(5):1222","journal-title":"Electronics"},{"key":"19381_CR5","first-page":"36","volume":"2","author":"M Zhao","year":"2022","unstructured":"Zhao M, Li M, Tong X et al (2022) Private data hiding system using state-switch DWT coefficients quantization on digital signal[J]. Int J Pattern Recognit Artif Intell 2:36","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"19381_CR6","first-page":"115715","volume":"81","author":"F Peng","year":"2020","unstructured":"Peng F, Zhao Y, Zhang X et al (2020) Reversible data hiding based on RSBEMD coding and adaptive multi-segment left and right histogram shifting [J]. Signal Process: Image Communication 81:115715","journal-title":"Signal Process: Image Communication"},{"key":"19381_CR7","doi-asserted-by":"publisher","first-page":"103481","DOI":"10.1016\/j.jvcir.2022.103481","volume":"84","author":"K Gao","year":"2022","unstructured":"Gao K, Horng JH, Chang CC (2022) High-capacity reversible data hiding in encrypted images based on adaptive block encoding[J]. J Vis Commun Image Represent 84:103481","journal-title":"J Vis Commun Image Represent"},{"key":"19381_CR8","doi-asserted-by":"publisher","first-page":"13445","DOI":"10.1007\/s11042-017-4960-y","volume":"77","author":"R Kumar","year":"2018","unstructured":"Kumar R, Chand S, Singh S (2018) An improved histogram-shifting-imitated reversible data hiding based on HVS characteristics[J]. Multimedia Tools Appl 77:13445\u201313457","journal-title":"Multimedia Tools Appl"},{"key":"19381_CR9","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images[J]. Signal Process 94:118\u2013127","journal-title":"Signal Process"},{"key":"19381_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.sigpro.2015.12.012","volume":"123","author":"D Xu","year":"2016","unstructured":"Xu D, Wang R (2016) Separable and error-free reversible data hiding in encrypted images. Signal Process 123:9\u201321","journal-title":"Signal Process"},{"issue":"8","key":"19381_CR11","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/TCSVT.2020.2990952","volume":"30","author":"A Mohammadi","year":"2020","unstructured":"Mohammadi A, Nakhkash M, Akhaee MA (2020) A high-capacity reversible data hiding in encrypted images employing local difference predictor[J]. IEEE Trans Circuits Syst Video Technol 30(8):2366\u20132376","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"19381_CR12","doi-asserted-by":"crossref","unstructured":"Guan B, Xu D (2020) An efficient high-capacity reversible data hiding scheme for encrypted images[J]. J Vis Commun Image Represent 66(102744)","DOI":"10.1016\/j.jvcir.2019.102744"},{"issue":"2","key":"19381_CR13","first-page":"103203","volume":"79","author":"X Wang","year":"2021","unstructured":"Wang X, Chang CC, Lin CC et al (2021) Privacy-preserving reversible data hiding based on quad-tree block encoding and integer wavelet transform[J]. J Vis Commun Image Represent 79(2):103203","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"19381_CR14","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image[J]. Signal Process Lett IEEE 18(4):255\u2013258","journal-title":"Signal Process Lett IEEE"},{"issue":"4","key":"19381_CR15","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encrypted images using side match [J]. IEEE Signal Process Lett 19(4):199\u2013202","journal-title":"IEEE Signal Process Lett"},{"issue":"8","key":"19381_CR16","doi-asserted-by":"publisher","first-page":"2285","DOI":"10.1109\/TCSVT.2018.2863029","volume":"29","author":"H Ge","year":"2018","unstructured":"Ge H, Chen Y, Qian Z, Wang J (2018) A high capacity multi-level approach for reversible data hiding in encrypted images[J]. IEEE Trans Circuits Syst Video Technology 29(8):2285\u20132295","journal-title":"IEEE Trans Circuits Syst Video Technology"},{"issue":"1","key":"19381_CR17","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.ins.2017.12.044","volume":"433","author":"ZL Liu","year":"2018","unstructured":"Liu ZL, Pun CM (2018) Reversible data-hiding in encrypted images by redundant space transfer[J]. Inf Sci 433(1):188\u2013203","journal-title":"Inf Sci"},{"key":"19381_CR18","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2019.03.008","volume":"487","author":"C Qin","year":"2019","unstructured":"Qin C, Qian X, Hong W, Zhang X (2019) An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer[J]. Inform Sci 487:176\u2013192","journal-title":"Inform Sci"},{"issue":"8","key":"19381_CR19","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.ins.2021.02.079","volume":"567","author":"X Wang","year":"2021","unstructured":"Wang X, Chang CC, Lin CC (2021) Reversible data hiding in encrypted images with block-based adaptive MSB encoding[J]. Inf Sci 567(8):375\u2013394","journal-title":"Inf Sci"},{"issue":"4","key":"19381_CR20","first-page":"846","volume":"44","author":"Y Wu","year":"2021","unstructured":"Wu Y, Huo Y, Tang J, Luo B, Yin Z (2021) Reversible data hiding in encrypted images using adaptive Huffman encoding strategy[J]. J Comput 44(4):846\u2013858","journal-title":"J Comput"},{"issue":"11","key":"19381_CR21","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1049\/ipr2.12252","volume":"15","author":"Z Tang","year":"2021","unstructured":"Tang Z, Pang M, Yu C et al (2021) Reversible data hiding for encrypted image based on adaptive prediction error coding[J]. IET Image Proc 15(11):2643\u20132655","journal-title":"IET Image Proc"},{"key":"19381_CR22","first-page":"89","volume":"584","author":"C Yu","year":"2022","unstructured":"Yu C, Zhang X, Li G et al (2022) Reversible data hiding with adaptive difference recovery for encrypted images[J]. Data Sciences 584:89\u2013110","journal-title":"Data Sciences"},{"issue":"2","key":"19381_CR23","doi-asserted-by":"publisher","first-page":"1692","DOI":"10.1109\/TCC.2022.3155744","volume":"11","author":"G Gao","year":"2022","unstructured":"Gao G, Tong S, Xia Z et al (2022) A universal reversible data hiding method in encrypted image based on msb prediction and error embedding[J]. IEEE Trans Cloud Computing 11(2):1692\u20131706","journal-title":"IEEE Trans Cloud Computing"},{"issue":"3","key":"19381_CR24","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","volume":"8","author":"K Ma","year":"2013","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption[J]. IEEE Trans Inf Forensics Secur 8(3):553\u2013562","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"19381_CR25","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","volume":"46","author":"X Cao","year":"2015","unstructured":"Cao X, Du L, Wei X et al (2015) High capacity reversible data hiding in encrypted images by patch-level sparse representation [J]. IEEE Trans Cybernet 46(5):1132\u20131143","journal-title":"IEEE Trans Cybernet"},{"issue":"7","key":"19381_CR26","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images [J]. IEEE Trans Inf Forensics Secur 13(7):1670\u20131681","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"19381_CR27","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.jvcir.2018.12.023","volume":"58","author":"K Chen","year":"2019","unstructured":"Chen K, Chang CC (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J]. J Vis Commun Image Represent 58:334\u2013344","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"19381_CR28","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","volume":"22","author":"Z Yin","year":"2020","unstructured":"Yin Z, Xiang Y, Zhang X (2020) Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding[J]. IEEE Trans Multimedia 22(4):874-8c84","journal-title":"IEEE Trans Multimedia"},{"key":"19381_CR29","doi-asserted-by":"publisher","first-page":"108146","DOI":"10.1016\/j.sigpro.2021.108146","volume":"187","author":"Z Yin","year":"2021","unstructured":"Yin Z, She X, Tang J et al (2021) Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement[J]. Signal Process 187:108146","journal-title":"Signal Process"},{"issue":"8","key":"19381_CR30","doi-asserted-by":"publisher","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","volume":"22","author":"YQ Wu","year":"2020","unstructured":"Wu YQ, Xiang YZ, Guo YT et al (2020) An improved reversible data hiding in encrypted images using parametric binary tree labeling [J]. IEEE Trans Multimedia 22(8):1929\u20131938","journal-title":"IEEE Trans Multimedia"},{"issue":"5","key":"19381_CR31","doi-asserted-by":"publisher","first-page":"6639","DOI":"10.1007\/s11042-020-09790-w","volume":"80","author":"L Liu","year":"2021","unstructured":"Liu L, Wang LF, Chang CC (2021) Separable reversible data hiding in encrypted images based on flexible preservation of the differences[J]. Multimedia Tools Appl 80(5):6639\u20136659","journal-title":"Multimedia Tools Appl"},{"key":"19381_CR32","unstructured":"Weber A (2018) The USC-SIPI image database [DB\/OL]. http:\/\/sipi.usc.edu \/database\/"},{"key":"19381_CR33","first-page":"59","volume-title":"Break our steganographic system: The ins and outs of organizing BOSS[C], Proceeding of the 13th Int Workshop on Information Hiding","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevn T (2011) Break our steganographic system: The ins and outs of organizing BOSS[C], Proceeding of the 13th Int Workshop on Information Hiding. Springer, Berlin, pp 59\u201370"},{"key":"19381_CR34","unstructured":"Bas P, Furon T. Image database of bows-2 [EB\/OL]. (2017\u201306\u201320) [2023\u201307\u201301]. http:\/\/bows2.ec-lille.fr\/"},{"key":"19381_CR35","first-page":"472","volume":"5307","author":"Schaefer G, Stich M. UCID: An uncompressed color image database [C]. Proceeding of the","year":"2003","unstructured":"Schaefer G, Stich M. UCID: An uncompressed color image database [C]. Proceeding of the (2003) Storage and retrieval methods and applications for multimedia. Bellingham, WA: SPIE 5307:472\u2013481","journal-title":"Bellingham, WA: SPIE"},{"key":"19381_CR36","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600\u2013614","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19381-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19381-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19381-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T08:11:13Z","timestamp":1731658273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19381-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,22]]},"references-count":36,"journal-issue":{"issue":"37","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["19381"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19381-8","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,5,22]]},"assertion":[{"value":"5 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflicts of interest to this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}},{"value":"The authors declared that they did not use generative AI in scientific writing.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration of generative AI in scientific writing"}}]}}