{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:37:47Z","timestamp":1771706267298,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:00:00Z","timestamp":1563235200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T00:00:00Z","timestamp":1563235200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802203"],"award-info":[{"award-number":["61802203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["61802212"],"award-info":[{"award-number":["61802212"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["61502241"],"award-info":[{"award-number":["61502241"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Province Higher Educational Science and Technology Program","award":["J18KA331"],"award-info":[{"award-number":["J18KA331"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11554-019-00884-9","type":"journal-article","created":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T13:03:12Z","timestamp":1563282192000},"page":"857-869","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images"],"prefix":"10.1007","volume":"16","author":[{"given":"Bin","family":"Ma","sequence":"first","affiliation":[]},{"given":"Bing","family":"li","sequence":"additional","affiliation":[]},{"given":"Xiao-Yu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chun-Peng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,16]]},"reference":[{"key":"884_CR1","doi-asserted-by":"crossref","unstructured":"Rodrguezcoln, R., Claudia, F.U., Trinidadblas, G.D.J.: Data hiding scheme for medical images. In: 17th International Conference on Electronics, Communications and Computers. CONIELECOMP \u201807, IEEE, pp. 32\u201332 (2007)","DOI":"10.1109\/CONIELECOMP.2007.14"},{"issue":"3","key":"884_CR2","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TIP.2018.2878290","volume":"28","author":"S Li","year":"2019","unstructured":"Li, S., Zhang, X.: Toward construction based data hiding: from secrets to fingerprint images. IEEE Trans. Image Process. 28(3), 1482\u20131497 (2019)","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"884_CR3","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TCSVT.2018.2881118","volume":"29","author":"J Tao","year":"2019","unstructured":"Tao, J., Li, S., Zhang, X., Wang, Z.: Towards robust image steganography. IEEE Trans. Circuits Syst. Video Technol. 29(2), 594\u2013600 (2019). \n                              https:\/\/doi.org\/10.1109\/tcsvt.2018.2881118","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"884_CR4","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Proc. SPIE, Security and Watermarking of Multimedia Contents, pp. 197\u2013208. San Jose, CA (2001)"},{"issue":"9","key":"884_CR5","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9), 1914\u20131927 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"884_CR6","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J.J., Du, R.: Distortion-free data embedding for images. In: Proceedings on 4th Information Hiding Workshop, pp. 27\u201341 (2001)","DOI":"10.1007\/3-540-45496-9_3"},{"key":"884_CR7","unstructured":"Celik, M.U., Sharma, G., Tekalp, A.M., et al.: Reversible data hiding. In: Proceedings on International Conference on Image Processing, vol. 2, pp. 157\u2013160. IEEE (2002)"},{"issue":"3","key":"884_CR8","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., et al.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"25","key":"884_CR9","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1049\/el:20021131","volume":"38","author":"G Xuan","year":"2003","unstructured":"Xuan, G., Zhu, J., Chen, J., et al.: Distortionless data hiding based on integer wavelet transform. Electron. Lett. 38(25), 1646\u20131648 (2003)","journal-title":"Electron. Lett."},{"issue":"7","key":"884_CR10","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1587\/elex.4.205","volume":"4","author":"M Fallahpour","year":"2007","unstructured":"Fallahpour, M., Sedaaghi, M.H.: High capacity lossless data hiding based on histogram medication. IEICE Electron. Express 4(7), 205\u2013210 (2007)","journal-title":"IEICE Electron. Express"},{"key":"884_CR11","volume-title":"Reversible Data Hiding","author":"G Xuan","year":"2012","unstructured":"Xuan, G., Shi, Y.Q.: Reversible Data Hiding. IEEE Press, Piscataway (2012). (US 8175324 B2[P])"},{"issue":"7","key":"884_CR12","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Zhang, W., Gui, X., Yang, B.: A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forensics Secur. 8(7), 1091\u20131100 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"884_CR13","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"20","key":"884_CR14","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1587\/elex.5.870","volume":"5","author":"M Fallahpour","year":"2008","unstructured":"Fallahpour, M.: Reversible image data hiding based on gradient adjusted prediction. IEICE Electron. Express 5(20), 870\u2013876 (2008)","journal-title":"IEICE Electron. Express"},{"issue":"12","key":"884_CR15","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X.L., Zhao, Y., Ni, R.R., Shi, Y.Q.: Pair-wise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"884_CR16","doi-asserted-by":"publisher","first-page":"1244","DOI":"10.1109\/TIP.2015.2395724","volume":"24","author":"IC Dragoi","year":"2015","unstructured":"Dragoi, I.C., Coltuc, D.: On local prediction based reversible watermarking. IEEE Trans. Image Process. 24(4), 1244\u20131246 (2015)","journal-title":"IEEE Trans. Image Process."},{"issue":"7","key":"884_CR17","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., et al.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"884_CR18","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.ins.2014.03.030","volume":"308","author":"W Hong","year":"2015","unstructured":"Hong, W., Chen, T.S., Chen, J.: Reversible data hiding using Delaunay triangulation and selective embedment. Inf. Sci. 308, 140\u2013154 (2015)","journal-title":"Inf. Sci."},{"key":"884_CR19","doi-asserted-by":"crossref","unstructured":"Wang X., Li X., Yang B., et al.: Efficient generalized integer transform for reversible watermarking. In: IEEE Signal Processing Letters vol. 17, no. 6, pp. 567\u2013570 (2010)","DOI":"10.1109\/LSP.2010.2046930"},{"issue":"12","key":"884_CR20","first-page":"3524","volume":"20","author":"X Li","year":"2011","unstructured":"Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process. Publ. IEEE Signal Process. Soc. 20(12), 3524\u20133533 (2011)","journal-title":"IEEE Trans. Image Process. Publ. IEEE Signal Process. Soc."},{"key":"884_CR21","unstructured":"Coatrieux, G., Puentes, J., Roux, C., et al.: A low distorsion and reversible watermark application. In: Conference Proceedings: Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Conference on IEEE Engineering in Medicine and Biology Society, vol. 3, no. 7, p. 2224 (2007)"},{"issue":"6","key":"884_CR22","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/s10278-008-9120-5","volume":"22","author":"X Guo","year":"2008","unstructured":"Guo, X., Zhuang, T.G.: Lossless watermarking for verifying the integrity of medical images with tamper localization. J. Digit. Imaging 22(6), 620 (2008)","journal-title":"J. Digit. Imaging"},{"issue":"3","key":"884_CR23","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan, C.K., et al.: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J. Digit. Imaging 24(3), 528\u2013540 (2011)","journal-title":"J. Digit. Imaging"},{"issue":"1","key":"884_CR24","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"O Al-qershi","year":"2011","unstructured":"Al-qershi, O., Khoo, B.: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J. Digit. Imaging 24(1), 114\u2013125 (2011)","journal-title":"J. Digit. Imaging"},{"issue":"7A","key":"884_CR25","first-page":"4521","volume":"8","author":"PY Pai","year":"2012","unstructured":"Pai, P.Y., Chang, C.C., Chan, Y.K.: An ROI-based medical image hiding method. Int. J. Innov. Comput. Inf. Control 8(7A), 4521\u20134533 (2012)","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"issue":"3","key":"884_CR26","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1016\/j.jss.2012.11.024","volume":"86","author":"LC Huang","year":"2013","unstructured":"Huang, L.C., Tseng, L.Y., Hwang, M.S.: A reversible data hiding method by his-togram shifting in high quality medical images. J. Syst. Softw. 86(3), 716\u2013727 (2013)","journal-title":"J. Syst. Softw."},{"issue":"1","key":"884_CR27","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi, O.M., Khoo, B.E.: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J. Digit. Imaging 24(1), 114\u2013125 (2011)","journal-title":"J. Digit. Imaging"},{"key":"884_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.06.010","volume-title":"A reversible data hiding method with contrast enhancement for medical images","author":"HT Wu","year":"2015","unstructured":"Wu, H.T., Huang, J., Shi, Y.Q.: A reversible data hiding method with contrast enhancement for medical images. Academic Press, Inc., Cambridge (2015)"},{"issue":"11","key":"884_CR29","doi-asserted-by":"publisher","first-page":"2078","DOI":"10.1109\/LSP.2015.2459055","volume":"22","author":"G Gao","year":"2015","unstructured":"Gao, G., Shi, Y.Q.: Reversible data hiding using controlled contrast enhancement and integer wavelet transform. IEEE Signal Process. Lett. 22(11), 2078\u20132082 (2015)","journal-title":"IEEE Signal Process. Lett."},{"key":"884_CR30","first-page":"2016","volume":"1\u20135","author":"S Agrawal","year":"2016","unstructured":"Agrawal, S., Kumar, M.: Reversible data hiding for medical images using integer-to-integer wavelet transform. Electr. Electron. Comput. Sci. IEEE 1\u20135, 2016 (2016)","journal-title":"Electr. Electron. Comput. Sci. IEEE"},{"key":"884_CR31","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah, S.A., Ahad, F., Sheikh, J.A., et al.: Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J. Biomed. Inf. 66, 214\u2013230 (2017)","journal-title":"J. Biomed. Inf."},{"issue":"3","key":"884_CR32","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"Chuan Qin","year":"2014","unstructured":"Qin, Chuan, Chang, Chin-Chen, Chiu, Yi-Ping: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969\u2013978 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"884_CR33","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","volume":"153","author":"Chuan Qin","year":"2018","unstructured":"Qin, Chuan, Zhang, Wei, Cao, Fang, Zhang, Xinpeng, Chang, Chin-Chen: Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153, 109\u2013122 (2018)","journal-title":"Signal Process."},{"key":"884_CR34","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang, C., Wang, X., Xia, Z., Zhang, C.: Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf. Sci. 470, 109\u2013120 (2019)","journal-title":"Inf. Sci."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00884-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00884-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00884-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T23:18:46Z","timestamp":1594768726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00884-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,16]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["884"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00884-9","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,16]]},"assertion":[{"value":"21 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}