{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:01:21Z","timestamp":1776330081666,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T00:00:00Z","timestamp":1545264000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11554-018-0845-1","type":"journal-article","created":{"date-parts":[[2018,12,20]],"date-time":"2018-12-20T08:41:36Z","timestamp":1545295296000},"page":"661-671","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Real-time reversible data hiding based on multiple histogram modification"],"prefix":"10.1007","volume":"16","author":[{"given":"Tong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaolong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenfa","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zongming","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,20]]},"reference":[{"key":"845_CR1","volume-title":"Digital Watermarking and Steganography","author":"I Cox","year":"2007","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, San Francisco (2007)"},{"key":"845_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)"},{"issue":"2","key":"845_CR3","first-page":"142","volume":"2","author":"B Li","year":"2011","unstructured":"Li, B., He, J., Huang, J., Shi, Y.Q.: A survey on image steganography and steganalysis. J. Inf. Hiding Multimed. Signal Process. 2(2), 142\u2013172 (2011)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"845_CR4","doi-asserted-by":"publisher","unstructured":"Ma, Y., Luo, X., Li, X., Bao, Z., Zhang, Y.: Selection of rich model steganalysis features based on decision rough set \n                    \n                      \n                    \n                    $$\\alpha$$\n                    \n                      \n                        \u03b1\n                      \n                    \n                  -positive region reduction. IEEE Trans. Circuits Syst. Video Technol. (2018). \n                    https:\/\/doi.org\/10.1109\/TCSVT.2018.2799243","DOI":"10.1109\/TCSVT.2018.2799243"},{"key":"845_CR5","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"YQ Shi","year":"2016","unstructured":"Shi, Y.Q., Li, X., Zhang, X., Wu, H.T., Ma, B.: Reversible data hiding: advances in the past two decades. IEEE Access 4, 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"issue":"2","key":"845_CR6","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/TITB.2008.2007199","volume":"13","author":"G Coatrieux","year":"2009","unstructured":"Coatrieux, G., Le Guillou, C., Cauvin, J.M., Roux, C.: Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans. Inf. Technol. Biomed. 13(2), 158\u2013165 (2009)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"issue":"6","key":"845_CR7","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li, X., Li, B., Yang, B., Zeng, T.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181\u20132191 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"845_CR8","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"Li, X., Li, J., Li, B., Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1), 198\u2013205 (2013)","journal-title":"Signal Process."},{"issue":"5","key":"845_CR9","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TMM.2014.2316154","volume":"16","author":"Z Qian","year":"2014","unstructured":"Qian, Z., Zhang, X., Wang, S.: Reversible data hiding in encrypted JPEG bitstream. IEEE Trans. Multimed. 16(5), 1486\u20131491 (2014)","journal-title":"IEEE Trans. Multimed."},{"key":"845_CR10","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.sigpro.2015.01.002","volume":"111","author":"X Qu","year":"2015","unstructured":"Qu, X., Kim, H.J.: Pixel-based pixel value ordering predictor for high-fidelity reversible data hiding. Signal Process. 111, 249\u2013260 (2015)","journal-title":"Signal Process."},{"issue":"1","key":"845_CR11","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","volume":"22","author":"HT Wu","year":"2015","unstructured":"Wu, H.T., Dugelay, J.L., Shi, Y.Q.: Reversible image data hiding with contrast enhancement. IEEE Signal Process. Lett. 22(1), 81\u201385 (2015)","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"845_CR12","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/LSP.2015.2504464","volume":"23","author":"Y Qiu","year":"2016","unstructured":"Qiu, Y., Qian, Z., Yu, L.: Adaptive reversible data hiding by extending the generalized integer transformation. IEEE Signal Process. Lett. 23(1), 130\u2013134 (2016)","journal-title":"IEEE Signal Process. Lett."},{"issue":"1","key":"845_CR13","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11554-016-0618-7","volume":"14","author":"K Jung","year":"2018","unstructured":"Jung, K.: High-capacity reversible data hiding method using block expansion in digital images. J. Real Time Image Process. 14(1), 159\u2013170 (2018)","journal-title":"J. Real Time Image Process."},{"issue":"10","key":"845_CR14","doi-asserted-by":"publisher","first-page":"5087","DOI":"10.1109\/TIP.2018.2851074","volume":"27","author":"D Hou","year":"2018","unstructured":"Hou, D., Zhang, W., Yang, Y., Yu, N.: Reversible data hiding under inconsistent distortion metrics. IEEE Trans. Image Process. 27(10), 5087\u20135099 (2018)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"845_CR15","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11554-015-0548-9","volume":"14","author":"D Kim","year":"2018","unstructured":"Kim, D., Yoon, E., Kim, C., Yoo, K.: Reversible data hiding scheme with edge-direction predictor and modulo operation. J. Real Time Image Process. 14(1), 137\u2013145 (2018)","journal-title":"J. Real Time Image Process."},{"key":"845_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","volume":"153","author":"C Qin","year":"2018","unstructured":"Qin, C., Zhang, W., Cao, F., Zhang, X., Chang, C.C.: Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153, 109\u2013122 (2018)","journal-title":"Signal Process."},{"key":"845_CR17","doi-asserted-by":"publisher","unstructured":"Ou, B., Li, X., Zhang, W., Zhao, Y.: Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection. IEEE Trans. Circuits Syst. Video Technol. (2018). \n                    https:\/\/doi.org\/10.1109\/TCSVT.2018.2859792","DOI":"10.1109\/TCSVT.2018.2859792"},{"issue":"8","key":"845_CR18","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"845_CR19","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147\u20131156 (2004)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"845_CR20","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D.M., Rodr\u00edguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"845_CR21","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"H Kim","year":"2008","unstructured":"Kim, H., Sachnev, V., Shi, Y., Nam, J., Choo, H.: A novel difference expansion transform for reversible data embedding. IEEE Trans. Inf. Forensics Secur. 3(3), 456\u2013465 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"845_CR22","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Hu, Y., Lee, H.K., Li, J.: DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol. 19(2), 250\u2013260 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"845_CR23","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"11","key":"845_CR24","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.1016\/j.jss.2009.05.051","volume":"82","author":"W Hong","year":"2009","unstructured":"Hong, W., Chen, T.S., Shiu, C.W.: Reversible data hiding for high quality images using modification of prediction errors. J. Syst. Softw. 82(11), 1833\u20131842 (2009)","journal-title":"J. Syst. Softw."},{"issue":"7","key":"845_CR25","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., Suresh, S., Shi, Y.Q.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"845_CR26","first-page":"655","volume":"4","author":"HJ Hwang","year":"2010","unstructured":"Hwang, H.J., Kim, H.J., Sachnev, V., Joo, S.H.: Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. KSII Trans. Internet Inf. Syst. 4(4), 655\u2013670 (2010)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"12","key":"845_CR27","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2156803","volume":"20","author":"X Li","year":"2011","unstructured":"Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. 20(12), 3524\u20133533 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"845_CR28","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TIFS.2012.2224108","volume":"8","author":"G Coatrieux","year":"2013","unstructured":"Coatrieux, G., Pan, W., Cuppens-Boulahia, N., Cuppens, F., Roux, C.: Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans. Inf. Forensics Secur. 8(1), 111\u2013120 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"845_CR29","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Zhang, W., Gui, X., Yang, B.: A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forensics Secur. 8(7), 1091\u20131100 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"845_CR30","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"845_CR31","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109\u20131118 (2013)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"845_CR32","doi-asserted-by":"crossref","unstructured":"Xuan, G., Tong, X., Teng, J., Zhang, X., Shi, Y.Q.: Optimal histogram-pair and prediction-error based image reversible data hiding. In: The International Workshop on Digital Forensics and Watermarking 2012. pp. 368\u2013383. Springer (2013)","DOI":"10.1007\/978-3-642-40099-5_31"},{"issue":"4","key":"845_CR33","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"IC Dragoi","year":"2014","unstructured":"Dragoi, I.C., Coltuc, D.: Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23(4), 1779\u20131790 (2014)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"845_CR34","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TIFS.2015.2392556","volume":"10","author":"X Hu","year":"2015","unstructured":"Hu, X., Zhang, W., Li, X., Yu, N.: Minimum rate prediction and optimized histograms modification for reversible data hiding. IEEE Trans. Inf. Forensics Secur. 10(3), 653\u2013664 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"845_CR35","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"X Li","year":"2015","unstructured":"Li, X., Zhang, W., Gui, X., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016\u20132027 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"845_CR36","doi-asserted-by":"publisher","first-page":"1244","DOI":"10.1109\/TIP.2015.2395724","volume":"24","author":"IC Dragoi","year":"2015","unstructured":"Dragoi, I.C., Coltuc, D.: On local prediction based reversible watermarking. IEEE Trans. Image Process. 24(4), 1244\u20131246 (2015)","journal-title":"IEEE Trans. Image Process."},{"key":"845_CR37","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2015.03.022","volume":"310","author":"X Wang","year":"2015","unstructured":"Wang, X., Ding, J., Pei, Q.: A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf. Sci. 310, 16\u201335 (2015)","journal-title":"Inf. Sci."},{"issue":"5","key":"845_CR38","doi-asserted-by":"publisher","first-page":"2420","DOI":"10.1109\/TIP.2016.2549458","volume":"25","author":"IC Dragoi","year":"2016","unstructured":"Dragoi, I.C., Coltuc, D.: Adaptive pairing reversible watermarking. IEEE Trans. Image Process. 25(5), 2420\u20132422 (2016)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"845_CR39","first-page":"315","volume":"47","author":"J Wang","year":"2017","unstructured":"Wang, J., Ni, J., Zhang, X., Shi, Y.Q.: Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans. Cybern. 47(2), 315\u2013326 (2017)","journal-title":"IEEE Trans. Cybern."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-018-0845-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-018-0845-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-018-0845-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:06:11Z","timestamp":1576800371000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-018-0845-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,20]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["845"],"URL":"https:\/\/doi.org\/10.1007\/s11554-018-0845-1","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,20]]},"assertion":[{"value":"17 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}