{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T04:29:46Z","timestamp":1778560186531,"version":"3.51.4"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-026-21315-5","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:09:43Z","timestamp":1768853383000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel RDH scheme utilizes multi-pair value shifting for AMBTC-compressed images"],"prefix":"10.1007","volume":"85","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5261-271X","authenticated-orcid":false,"given":"Tuan Duc","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Thanh Tinh","family":"Dao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,19]]},"reference":[{"key":"21315_CR1","doi-asserted-by":"publisher","first-page":"13105","DOI":"10.1109\/access.2020.2963891","volume":"8","author":"W Zheng","year":"2020","unstructured":"Zheng W, Chang C-C, Weng S (2020) A novel adjustable rdh method for ambtc-compressed codes using one-to-many map. IEEE Access 8:13105\u201313118. https:\/\/doi.org\/10.1109\/access.2020.2963891","journal-title":"IEEE Access"},{"issue":"10","key":"21315_CR2","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","volume":"32","author":"M Lema","year":"1984","unstructured":"Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32(10):1148\u20131157","journal-title":"IEEE Trans Commun"},{"key":"21315_CR3","doi-asserted-by":"publisher","first-page":"103697","DOI":"10.1016\/j.jisa.2023.103697","volume":"81","author":"X Zhang","year":"2024","unstructured":"Zhang X, Pan Z, Zhou Q, Fan G, Dong J (2024) A reversible data hiding method based on bitmap prediction for ambtc compressed hyperspectral images. J Inf Secur Appl 81:103697. https:\/\/doi.org\/10.1016\/j.jisa.2023.103697","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"21315_CR4","doi-asserted-by":"publisher","first-page":"2430","DOI":"10.1109\/jiot.2024.3467152","volume":"12","author":"Y Lin","year":"2025","unstructured":"Lin Y, Lin C-C, Chang C-C, Chang C-C (2025) An iot-based electronic health protection mechanism with ambtc compressed images. IEEE Internet Things J 12(3):2430\u20132444. https:\/\/doi.org\/10.1109\/jiot.2024.3467152","journal-title":"IEEE Internet Things J"},{"key":"21315_CR5","doi-asserted-by":"publisher","first-page":"123844","DOI":"10.1016\/j.eswa.2024.123844","volume":"250","author":"W He","year":"2024","unstructured":"He W, Wang L, Wang Y, Cai Z, Xiong G (2024) Reversible data hiding using morphology based pixel classification. Expert Syst Appl 250:123844. https:\/\/doi.org\/10.1016\/j.eswa.2024.123844","journal-title":"Expert Syst Appl"},{"issue":"1","key":"21315_CR6","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1109\/tcsvt.2023.3282649","volume":"34","author":"Y Wu","year":"2024","unstructured":"Wu Y, Hu R, Xiang S (2024) Pvo-based reversible data hiding using global sorting and fixed 2d mapping modification. IEEE Trans Circuits Syst Video Technol 34(1):618\u2013631. https:\/\/doi.org\/10.1109\/tcsvt.2023.3282649","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"21315_CR7","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s00371-023-02778-1","volume":"40","author":"Z Garcia-Nonoal","year":"2023","unstructured":"Garcia-Nonoal Z, Mata-Mendoza D, Cedillo-Hernandez M, Nakano-Miyatake M (2023) Secure management of retinal imaging based on deep learning, zero-watermarking and reversible data hiding. Vis Comput 40(1):245\u2013260. https:\/\/doi.org\/10.1007\/s00371-023-02778-1","journal-title":"Vis Comput"},{"key":"21315_CR8","doi-asserted-by":"publisher","unstructured":"Nalavade JE, Patil A, Buchade A, Jadhav N (2023) Deep neural network and gan-based reversible data hiding in encrypted images: a privacy-preserving approach. SN Comput Sci 5(1). https:\/\/doi.org\/10.1007\/s42979-023-02347-2","DOI":"10.1007\/s42979-023-02347-2"},{"key":"21315_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19752-1","author":"J-C Liu","year":"2024","unstructured":"Liu J-C, Lin Y, Chang C-C, Chang C (2024) A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-19752-1","journal-title":"Multimed Tools Appl"},{"issue":"24","key":"21315_CR10","doi-asserted-by":"publisher","first-page":"33157","DOI":"10.1007\/s11042-021-11048-y","volume":"80","author":"C-C Chang","year":"2021","unstructured":"Chang C-C, Wang X, Lin C-C (2021) An efficient dual prediction based reversible data hiding and reduced code method for ambtc. Multimed Tools Appl 80(24):33157\u201333176. https:\/\/doi.org\/10.1007\/s11042-021-11048-y","journal-title":"Multimed Tools Appl"},{"key":"21315_CR11","doi-asserted-by":"publisher","unstructured":"Hui Z, Zhou Q (2020) A reversible data hiding method for AMBTC compressed image without expansion inside stego format. Transactions on Internet and Information Systems 14(11). https:\/\/doi.org\/10.3837\/tiis.2020.11.011. Accessed 09 Sept 2024","DOI":"10.3837\/tiis.2020.11.011"},{"key":"21315_CR12","doi-asserted-by":"publisher","first-page":"38337","DOI":"10.1109\/access.2019.2906500","volume":"7","author":"H-Y Wang","year":"2019","unstructured":"Wang H-Y, Lin H-J, Gao X-Y, Cheng W-H, Chen Y-Y (2019) Reversible ambtc-based data hiding with security improvement by chaotic encryption. IEEE Access 7:38337\u201338347. https:\/\/doi.org\/10.1109\/access.2019.2906500","journal-title":"IEEE Access"},{"key":"21315_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.dsp.2019.06.016","volume":"93","author":"X Wu","year":"2019","unstructured":"Wu X, Yang C-N (2019) Partial reversible ambtc-based secret image sharing with steganography. Digit Signal Process 93:22\u201333. https:\/\/doi.org\/10.1016\/j.dsp.2019.06.016","journal-title":"Digit Signal Process"},{"issue":"14","key":"21315_CR14","doi-asserted-by":"publisher","first-page":"18067","DOI":"10.1007\/s11042-017-4957-6","volume":"77","author":"Z Yin","year":"2017","unstructured":"Yin Z, Niu X, Zhang X, Tang J, Luo B (2017) Reversible data hiding in encrypted ambtc images. Multimed Tools Appl 77(14):18067\u201318083. https:\/\/doi.org\/10.1007\/s11042-017-4957-6","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"21315_CR15","doi-asserted-by":"publisher","first-page":"255","DOI":"10.53106\/160792642022032302006","volume":"23","author":"T-S Nguyen","year":"2022","unstructured":"Nguyen T-S, Chang C-C, Lin C-C (2022) High capacity reversible data hiding scheme based on ambtc for encrypted images. J Internet Technol 23(2):255\u2013266. https:\/\/doi.org\/10.53106\/160792642022032302006","journal-title":"J Internet Technol"},{"issue":"2","key":"21315_CR16","first-page":"77","volume":"5","author":"W Zheng","year":"2020","unstructured":"Zheng W, Chang CC, Horng JH, Lin J, Shi Y (2020) An adjustable rdh method for ambtc-compressed images using unilateral pixel value modification strategy. J Netw Intell 5(2):77\u201392","journal-title":"J Netw Intell"},{"issue":"3","key":"21315_CR17","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s11045-019-00698-9","volume":"31","author":"R Bhardwaj","year":"2020","unstructured":"Bhardwaj R, Aggarwal A (2020) Hiding clinical information in medical images: an enhanced encrypted reversible data hiding algorithm grounded on hierarchical absolute moment block truncation coding. Multidim Syst Signal Process 31(3):1051\u20131074. https:\/\/doi.org\/10.1007\/s11045-019-00698-9","journal-title":"Multidim Syst Signal Process"},{"issue":"5","key":"21315_CR18","doi-asserted-by":"publisher","first-page":"5767","DOI":"10.1007\/s11042-017-4487-2","volume":"77","author":"N-T Huynh","year":"2017","unstructured":"Huynh N-T, Bharanitharan K, Chang C-C, Liu Y (2017) Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images. Multimedia Tool Appl 77(5):5767\u20135783. https:\/\/doi.org\/10.1007\/s11042-017-4487-2","journal-title":"Multimedia Tool Appl"},{"issue":"1","key":"21315_CR19","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2016","unstructured":"Kim C, Shin D, Leng L, Yang C-N (2016) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101\u2013114. https:\/\/doi.org\/10.1007\/s11554-016-0641-8","journal-title":"J Real-Time Image Proc"},{"issue":"9","key":"21315_CR20","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TCOM.1979.1094560","volume":"27","author":"E Delp","year":"1979","unstructured":"Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335\u20131342","journal-title":"IEEE Trans Commun"},{"key":"21315_CR21","unstructured":"Weber A (1997) The USC-SIPI image database. Signal and Image Processing Institute of the University of Southern California. https:\/\/sipi.usc.edu\/database\/"},{"key":"21315_CR22","unstructured":"Patrick\u00a0Bas TP (2008) Tomas\u00a0Filler: BOWS-2 image database. http:\/\/bows2.ec-lille.fr\/BOWS2OrigEp3.tgz"},{"key":"21315_CR23","unstructured":"Kodak: The Kodak Color Image Dataset. Online (1999). https:\/\/r0k.us\/graphics\/kodak\/"},{"issue":"7","key":"21315_CR24","doi-asserted-by":"publisher","first-page":"9039","DOI":"10.1007\/s11042-017-4800-0","volume":"77","author":"C-C Chang","year":"2017","unstructured":"Chang C-C, Chen T-S, Wang Y-K, Liu Y (2017) A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive or operator. Multimedia Tool Appl 77(7):9039\u20139053. https:\/\/doi.org\/10.1007\/s11042-017-4800-0","journal-title":"Multimedia Tool Appl"},{"key":"21315_CR25","doi-asserted-by":"publisher","first-page":"26984","DOI":"10.1109\/access.2020.2966234","volume":"8","author":"G-D Su","year":"2020","unstructured":"Su G-D, Chang C-C, Lin C-C (2020) A high capacity reversible data hiding in encrypted ambtc-compressed images. IEEE Access 8:26984\u201327000. https:\/\/doi.org\/10.1109\/access.2020.2966234","journal-title":"IEEE Access"},{"issue":"5","key":"21315_CR26","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1016\/j.jvcir.2014.01.008","volume":"25","author":"A Tanchenko","year":"2014","unstructured":"Tanchenko A (2014) Visual-psnr measure of image quality. J Vis Commun Image Represent 25(5):874\u2013878. https:\/\/doi.org\/10.1016\/j.jvcir.2014.01.008","journal-title":"J Vis Commun Image Represent"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21315-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-026-21315-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-026-21315-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:09:44Z","timestamp":1768853384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-026-21315-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,19]]},"references-count":26,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["21315"],"URL":"https:\/\/doi.org\/10.1007\/s11042-026-21315-5","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,19]]},"assertion":[{"value":"26 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The Author(s) declare(s) that there is no conflict of interest.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"8"}}