{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T14:11:40Z","timestamp":1768918300725,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19752-1","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T07:02:31Z","timestamp":1720594951000},"page":"18395-18417","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3401-8742","authenticated-orcid":false,"given":"Jui-Chuan","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4552-336X","authenticated-orcid":false,"given":"Yijie","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7723-4591","authenticated-orcid":false,"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin\u2010Chen","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"issue":"1","key":"19752_CR1","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1049\/cit2.12171","volume":"8","author":"VS Gaur","year":"2023","unstructured":"Gaur VS, Sharma V, McAllister J (2023) Abusive adversarial agents and attack strategies in cyber-physical systems. CAAI Trans Intell Technol 8(1):149\u2013165. https:\/\/doi.org\/10.1049\/cit2.12171","journal-title":"CAAI Trans Intell Technol"},{"key":"19752_CR2","doi-asserted-by":"publisher","unstructured":"Ehis AMT (2023) Optimization of Security Information and Event Management (SIEM) Infrastructures, and Events Correlation\/Regression Analysis for Optimal Cyber Security Posture. Archives Adv Eng Sci 1-10. https:\/\/doi.org\/10.47852\/bonviewAAES32021068","DOI":"10.47852\/bonviewAAES32021068"},{"issue":"1","key":"19752_CR3","doi-asserted-by":"publisher","first-page":"181801","DOI":"10.1007\/s11704-022-2193-3","volume":"18","author":"A Singh","year":"2024","unstructured":"Singh A, Kumar A, Namasudra S (2024) DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography. Front Comput Sci 18(1):181801","journal-title":"Front Comput Sci"},{"issue":"4","key":"19752_CR4","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1049\/cit2.12164","volume":"8","author":"D Zhang","year":"2023","unstructured":"Zhang D, Shafiq M, Wang L, Srivastava G, Yin S (2023) Privacy-preserving remote sensing images recognition based on limited visual cryptography. CAAI Trans Intell Technol 8(4):1166\u20131177. https:\/\/doi.org\/10.1049\/cit2.12164","journal-title":"CAAI Trans Intell Technol"},{"key":"19752_CR5","doi-asserted-by":"publisher","unstructured":"Namasudra S, Nath S, Majumder A. (2014) Profile based access control model in cloud computing environment. In 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE) (pp. 1-5). IEEE. https:\/\/doi.org\/10.1109\/ICGCCEE.2014.6921420","DOI":"10.1109\/ICGCCEE.2014.6921420"},{"key":"19752_CR6","doi-asserted-by":"crossref","unstructured":"Ahmad BM, Ahmed SM, Sylvanus DE (2023) Enhancing Phishing Awareness Strategy Through Embedded Learning Tools: A Simulation Approach. Archives Adv Eng Sci 1-14","DOI":"10.47852\/bonviewAAES32021392"},{"key":"19752_CR7","doi-asserted-by":"crossref","unstructured":"Namasudra S (2018) Taxonomy of DNA-based security models. In Advances of DNA computing in cryptography (pp. 37-52). Chapman and Hall\/CRC","DOI":"10.1201\/9781351011419-3"},{"issue":"1","key":"19752_CR8","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.ijleo.2015.09.216","volume":"127","author":"MW Tang","year":"2016","unstructured":"Tang MW, Zeng SK, Chen XL, Hu J, Du YJ (2016) An adaptive image steganography using AMBTC compression and interpolation technique. Optik 127(1):471\u2013477. https:\/\/doi.org\/10.1016\/j.ijleo.2015.09.216","journal-title":"Optik"},{"key":"19752_CR9","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/ICIP.2003.1247008","volume":"3","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using difference expansion of quads. Proc IEEE Int Conf Acoust Speech Signal Process 3:377\u2013380. https:\/\/doi.org\/10.1109\/ICIP.2003.1247008","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process"},{"key":"19752_CR10","doi-asserted-by":"publisher","unstructured":"Li F, Bharanitharan K, Chang CC, Mao Q (2016) Bi-stretch reversible data hiding algorithm for absolute moment block truncation coding compressed images. Multimed Tools Appl.https:\/\/doi.org\/10.1007\/s11042-015-2924-7","DOI":"10.1007\/s11042-015-2924-7"},{"key":"19752_CR11","doi-asserted-by":"publisher","first-page":"3823","DOI":"10.1007\/s11042-013-1801-5","volume":"74","author":"CC Lin","year":"2015","unstructured":"Lin CC, Liu XL, Tai WL, Yuan SM (2015) A novel reversible data hiding scheme based on AMBTC compression technique. Multimed Tools Appl 74:3823\u20133842. https:\/\/doi.org\/10.1007\/s11042-013-1801-5","journal-title":"Multimed Tools Appl"},{"key":"19752_CR12","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","volume":"7","author":"W Sun","year":"2013","unstructured":"Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. Signal Image Video Process 7:297\u2013306. https:\/\/doi.org\/10.1007\/s11760-011-0238-4","journal-title":"Signal Image Video Process"},{"key":"19752_CR13","doi-asserted-by":"publisher","first-page":"9039","DOI":"10.1007\/s11042-017-4800-0","volume":"77","author":"CC Chang","year":"2018","unstructured":"Chang CC, Chen TS, Wang YK, Liu YJ (2018) A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator. Multimed Tools Appl 77:9039\u20139053. https:\/\/doi.org\/10.1007\/s11042-017-4800-0","journal-title":"Multimed Tools Appl"},{"key":"19752_CR14","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1093\/ietisy\/e88-d.9.2159","volume":"9","author":"CC Chang","year":"2005","unstructured":"Chang CC, Wu WC (2005) A stegangraphic method for hiding secret data using side match vector quantization. IEEE Trans Info Syst 9:2159\u20132167. https:\/\/doi.org\/10.1093\/ietisy\/e88-d.9.2159","journal-title":"IEEE Trans Info Syst"},{"issue":"1","key":"19752_CR15","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-019-06393-z","volume":"108","author":"AK Sahu","year":"2019","unstructured":"Sahu AK, Swain G (2019) An optimal information hiding approach based on pixel value differencing and modulus function. Wirel Pers Commun 108(1):159\u2013174. https:\/\/doi.org\/10.1007\/s11277-019-06393-z","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"19752_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-019-0262-y","volume":"21","author":"AK Sahu","year":"2020","unstructured":"Sahu AK, Swain G (2020) Reversible image steganography using dual-layer LSB matching. Sens Imaging 21(1):1\u201321. https:\/\/doi.org\/10.1007\/s11220-019-0262-y","journal-title":"Sens Imaging"},{"issue":"1","key":"19752_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-017-0163-8","volume":"2017","author":"WC Wu","year":"2017","unstructured":"Wu WC (2017) Quantization-based image authentication scheme using QR error correction. EURASIP J Image Video Process 2017(1):1\u201312. https:\/\/doi.org\/10.1186\/s13640-017-0163-8","journal-title":"EURASIP J Image Video Process"},{"issue":"3","key":"19752_CR18","doi-asserted-by":"publisher","first-page":"277","DOI":"10.4304\/jmm.6.3.277-284","volume":"6","author":"CF Lee","year":"2011","unstructured":"Lee CF, Chen KN, Chang CC, Tsai MC (2011) A hierarchical fragile watermarking with VQ index recovery. J Multimed 6(3):277\u2013284. https:\/\/doi.org\/10.4304\/jmm.6.3.277-284","journal-title":"J Multimed"},{"issue":"2","key":"19752_CR19","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TMM.2014.2368696","volume":"17","author":"P Korus","year":"2015","unstructured":"Korus P, Bialas J, Dziech A (2015) Towards practical self-embedding for JPEG-compressed digital images. IEEE Trans Multimedia 17(2):157\u2013170. https:\/\/doi.org\/10.1109\/TMM.2014.2368696","journal-title":"IEEE Trans Multimedia"},{"key":"19752_CR20","doi-asserted-by":"publisher","first-page":"38337","DOI":"10.1109\/ACCESS.2019.2906500","volume":"7","author":"HY Wang","year":"2019","unstructured":"Wang HY, Lin HJ, Gao XY, Cheng WH, Chen YY (2019) Reversible AMBTC-based data hiding with security improvement by chaotic encryption. IEEE Access 7:38337\u201338347. https:\/\/doi.org\/10.1109\/ACCESS.2019.2906500","journal-title":"IEEE Access"},{"issue":"2","key":"19752_CR21","doi-asserted-by":"publisher","first-page":"e0212802","DOI":"10.1371\/journal.pone.0212802","volume":"14","author":"W Hong","year":"2019","unstructured":"Hong W, Zhou X, Lou DC (2019) A recoverable AMBTC authentication scheme using similarity embedding strategy. Plos ONE 14(2):e0212802. https:\/\/doi.org\/10.1371\/journal.pone.0212802","journal-title":"Plos ONE"},{"issue":"1","key":"19752_CR22","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s11042-015-3059-6","volume":"76","author":"CC Lin","year":"2017","unstructured":"Lin CC, Huang Y, Tai WL (2017) A novel hybrid image authentication scheme based on absolute moment block truncation coding. Multimed Tools Appl 76(1):463\u2013488. https:\/\/doi.org\/10.1007\/s11042-015-3059-6","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"19752_CR23","doi-asserted-by":"publisher","first-page":"318","DOI":"10.3390\/sym10080318","volume":"10","author":"W Hong","year":"2018","unstructured":"Hong W, Zhou X, Lou DC, Peng C (2018) Detectability improved tamper detection scheme for absolute moment block truncation coding compressed images. Symmetry 10(8):318. https:\/\/doi.org\/10.3390\/sym10080318","journal-title":"Symmetry"},{"issue":"10","key":"19752_CR24","doi-asserted-by":"publisher","first-page":"12979","DOI":"10.1007\/s11042-017-4927-z","volume":"77","author":"TH Chen","year":"2018","unstructured":"Chen TH, Chang TC (2018) On the security of a BTC-based-compression image authentication scheme. Multimed Tools Appl 77(10):12979\u201312989. https:\/\/doi.org\/10.1007\/s11042-017-4927-z","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"19752_CR25","first-page":"362","volume":"7","author":"H Zhong","year":"2016","unstructured":"Zhong H, Liu H, Chang CC, Lin CC (2016) A novel fragile watermark-based image authentication scheme for AMBTC-compressed images. J Inf Hiding Multimed Signal Process 7(2):362\u2013375","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"8","key":"19752_CR26","doi-asserted-by":"publisher","first-page":"4771","DOI":"10.1007\/s11042-015-2502-z","volume":"75","author":"W Li","year":"2016","unstructured":"Li W, Lin CC, Pan JS (2016) Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimed Tools Appl 75(8):4771\u20134793. https:\/\/doi.org\/10.1007\/s11042-015-2502-z","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"19752_CR27","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/83.136594","volume":"1","author":"T Kim","year":"1992","unstructured":"Kim T (1992) Side match and overlap match vector quantizers for images. IEEE Trans Image Process 1(2):170\u2013185. https:\/\/doi.org\/10.1109\/83.136594","journal-title":"IEEE Trans Image Process"},{"key":"19752_CR28","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","volume":"32","author":"MD Lema","year":"1984","unstructured":"Lema MD, Mitchell OR (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans comm COM 32:1148\u20131157. https:\/\/doi.org\/10.1109\/TCOM.1984.1095973","journal-title":"IEEE Trans comm COM"},{"key":"19752_CR29","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.sigpro.2014.09.036","volume":"108","author":"IC Chang","year":"2015","unstructured":"Chang IC, Hu YC, Chen WL, Lo CC (2015) High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process 108:376\u2013388. https:\/\/doi.org\/10.1016\/j.sigpro.2014.09.036","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19752-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19752-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19752-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T08:41:30Z","timestamp":1748076090000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19752-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":29,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["19752"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19752-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"28 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}