{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:22:38Z","timestamp":1774552958793,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T00:00:00Z","timestamp":1560902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T00:00:00Z","timestamp":1560902400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872203"],"award-info":[{"award-number":["61872203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502241"],"award-info":[{"award-number":["61502241"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010909","name":"Young Scientists Fund","doi-asserted-by":"publisher","award":["61802212"],"award-info":[{"award-number":["61802212"]}],"id":[{"id":"10.13039\/501100010909","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11554-019-00891-w","type":"journal-article","created":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T22:02:18Z","timestamp":1560981738000},"page":"821-834","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Adaptive error prediction method based on multiple linear regression for reversible data hiding"],"prefix":"10.1007","volume":"16","author":[{"given":"Bin","family":"Ma","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunpeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunqing","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,19]]},"reference":[{"issue":"4","key":"891_CR1","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"2016","author":"YQ Shi","year":"2016","unstructured":"Shi, Y.Q., Li, X., Zhang, X., et al.: Reversible data hiding: advances in the past two decades. IEEE Access 2016(4), 3210\u20133237 (2016)","journal-title":"IEEE Access"},{"issue":"9","key":"891_CR2","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1109\/TIFS.2016.2566261","volume":"11","author":"B Ma","year":"2016","unstructured":"Ma, B., Shi, Y.Q.: A reversible data hiding scheme based on code division multiplexing [J]. IEEE Trans. Inf. Forensics Secur. 11(9), 1914\u20131927 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"891_CR3","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang, C., Wang, X., Xia, Z., et al.: Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm [J]. Inf. Sci. 470, 109\u2013120 (2019)","journal-title":"Inf. Sci."},{"issue":"3","key":"891_CR4","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin, C., Chang, C.-C., Chiu, Y.-P.: A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans. Image Process. 23(3), 969\u2013978 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"891_CR5","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","volume":"153","author":"C Qin","year":"2018","unstructured":"Qin, C., Zhang, W., Cao, F., Zhang, X., Chang, C.-C.: Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153, 109\u2013122 (2018)","journal-title":"Signal Process."},{"issue":"2","key":"891_CR6","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TCSVT.2018.2881118","volume":"29","author":"J Tao","year":"2019","unstructured":"Tao, J., Li, S., Zhang, X., et al.: Towards robust image steganography [J]. IEEE Trans. Circuits Syst. Video Technol. 29(2), 594\u2013600 (2019)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"891_CR7","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TIP.2018.2878290","volume":"28","author":"S Li","year":"2019","unstructured":"Li, S., Zhang, X.: Toward construction-based data hiding: from secrets to fingerprint images [J]. IEEE Trans. Image Process. 28(3), 1482\u20131497 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"891_CR8","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J. J., Du, R.: Distortion-free data embedding for images. In: Proc. 4th Inf. Hiding Workshop, pp.\u00a027\u201341 (2001)","DOI":"10.1007\/3-540-45496-9_3"},{"key":"891_CR9","unstructured":"Fridrich, J., Goljan, M., Du, R.: Invertible authentication. In: Security and Watermarking of Multimedia contents III, vol. 4314, pp. 197\u2013209. International Society for Optics and Photonics (2001)"},{"key":"891_CR10","unstructured":"Celik, M. U., Sharma, G., Tekalp, A. M., et al.: Reversible data hiding. International conference on image processing. proceedings (vol.\u00a02, pp\u00a0157\u2013160). IEEE, 2002"},{"issue":"8","key":"891_CR11","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"20","key":"891_CR12","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1587\/elex.5.870","volume":"5","author":"M Fallahpour","year":"2008","unstructured":"Fallahpour, M.: Reversible image data hiding based on gradient adjusted prediction. IEICE Electron. Exp. 5(20), 870\u2013876 (2008)","journal-title":"IEICE Electron. Exp."},{"issue":"12","key":"891_CR13","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X.L., Zhao, Y., Ni, R.R., Shi, Y.Q.: Pair-wise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"891_CR14","doi-asserted-by":"publisher","first-page":"1244","DOI":"10.1109\/TIP.2015.2395724","volume":"24","author":"IC Dragoi","year":"2015","unstructured":"Dragoi, I.C., Coltuc, D.: On local prediction based reversible watermarking. IEEE Trans. Image Process. 24(4), 1244\u20131246 (2015)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"891_CR15","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., et al.: Reversible data hiding [J]. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"25","key":"891_CR16","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1049\/el:20021131","volume":"38","author":"G Xuan","year":"2003","unstructured":"Xuan, G., Zhu, J., Chen, J., et al.: Distortionless data hiding based on integer wavelet transform [J]. Electron. Lett. 38(25), 1646\u20131648 (2003)","journal-title":"Electron. Lett."},{"issue":"7","key":"891_CR17","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1587\/elex.4.205","volume":"4","author":"M Fallahpour","year":"2007","unstructured":"Fallahpour, M., Sedaaghi, M.H.: High capacity lossless data hiding based on histogram medication. IEICE Electron. Exp. 4(7), 205\u2013210 (2007)","journal-title":"IEICE Electron. Exp."},{"key":"891_CR18","unstructured":"Xuan, G., Shi, Y.Q.: Reversible data hiding. IEEE Press, US 8175324 B2[P], 2012"},{"issue":"7","key":"891_CR19","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Zhang, W., Gui, X., Yang, B.: A novel reversible data hiding scheme based on two-dimensional difference-histogram modification. IEEE Trans. Inf. Forensics Secur. 8(7), 1091\u20131100 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"891_CR20","unstructured":"Thodi, D. M., Rodriguez, J. J.: Prediction-error based reversible watermarking\/\/image processing, 2004. ICIP\u201904. 2004 International Conference on. IEEE, 2004, vol.\u00a03, pp\u00a01549\u20131552 (2004)"},{"issue":"8","key":"891_CR21","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1109\/83.855427","volume":"9","author":"MJ Weinberger","year":"2000","unstructured":"Weinberger, M.J., Seroussi, G., Sapiro, G.: The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS. Image Process IEEE Trans 9(8), 1309\u20131324 (2000)","journal-title":"Image Process IEEE Trans"},{"issue":"20","key":"891_CR22","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1587\/elex.5.870","volume":"5","author":"M Fallahpour","year":"2008","unstructured":"Fallahpour, M.: Reversible image data hiding based on gradient adjusted prediction. IEICE Electron. Exp. 5(20), 870\u2013876 (2008)","journal-title":"IEICE Electron. Exp."},{"issue":"3","key":"891_CR23","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/TIFS.2011.2145372","volume":"6","author":"D Coltuc","year":"2011","unstructured":"Coltuc, D.: Improved embedding for prediction-based reversible watermarking. Inf. Forensics Security IEEE Trans. 6(3), 873\u2013882 (2011)","journal-title":"Inf. Forensics Security IEEE Trans."},{"key":"891_CR24","doi-asserted-by":"crossref","unstructured":"Fujiyoshi, M., Sato, S., Jin, H. L., Kiya, H.: A location-map free reversible data hiding method using block-based single parameter. Proc. IEEE ICIP, pp\u00a0257\u2013260 (2007)","DOI":"10.1109\/ICIP.2007.4379295"},{"issue":"4","key":"891_CR25","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1049\/iet-ipr.2009.0316","volume":"4","author":"CH Yang","year":"2010","unstructured":"Yang, C.H., Yang, M.H.: Improving histogram-based reversible data hiding by interleaving prediction. Iet Image Process. 4(4), 223\u2013234 (2010)","journal-title":"Iet Image Process."},{"issue":"7","key":"891_CR26","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H.J., Nam, J., et al.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circ. Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"1","key":"891_CR27","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo, L., Chen, Z., Chen, M., et al.: Reversible image watermarking using interpolation technique. IEEE Trans. Inf. Forensics Security 5(1), 187\u2013193 (2010)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"4","key":"891_CR28","first-page":"655","volume":"4","author":"HJ Hwang","year":"2010","unstructured":"Hwang, H.J., Kim, H.J., Sachnev, V., et al.: Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. TIIS 4(4), 655\u2013670 (2010)","journal-title":"TIIS"},{"issue":"3","key":"891_CR29","doi-asserted-by":"publisher","first-page":"410","DOI":"10.4218\/etrij.12.0111.0075","volume":"34","author":"S Kang","year":"2010","unstructured":"Kang, S., Hwang, H.J., Kim, H.J.: Reversible watermark using an accurate predictor and sorter based on payload balancing. ETRI J. 34(3), 410\u2013420 (2010)","journal-title":"ETRI J."},{"issue":"82","key":"891_CR30","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.neucom.2011.10.028","volume":"2012","author":"G Feng","year":"2012","unstructured":"Feng, G., Qian, Z., Dai, N.: Reversible watermarking via extreme learning machine prediction [J]. Neurocomputing 2012(82), 62\u201368 (2012)","journal-title":"Neurocomputing"},{"issue":"3","key":"891_CR31","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/JSTSP.2010.2049222","volume":"4","author":"M Chen","year":"2010","unstructured":"Chen, M., Chen, Z., Zeng, X., Xiong, Z.: Model order selection in reversible image watermarking. Select. Top. Signal Process. IEEE J. 4(3), 592\u2013604 (2010)","journal-title":"Select. Top. Signal Process. IEEE J."},{"issue":"12","key":"891_CR32","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2156803","volume":"20","author":"X Li","year":"2011","unstructured":"Li, X., Yang, B., Zeng, T.: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. Image Process. IEEE Trans. 20(12), 3524\u20133533 (2011)","journal-title":"Image Process. IEEE Trans."},{"key":"891_CR33","doi-asserted-by":"publisher","first-page":"2572","DOI":"10.1587\/transfun.E92.A.2572","volume":"E92-A","author":"S Han","year":"2009","unstructured":"Han, S., Fujiyoshi, M., Kiya, H.: A reversible image authentication method without memorization of hiding parameters. IEICE Trans. Fundament. E92-A, 2572\u20132579 (2009)","journal-title":"IEICE Trans. Fundament."},{"issue":"23","key":"891_CR34","doi-asserted-by":"publisher","first-page":"1702","DOI":"10.1587\/elex.7.1702","volume":"7","author":"M Fujiyoshi","year":"2010","unstructured":"Fujiyoshi, M., Tsuneyoshi, T., Kiya, H.: A parameter memorization-free lossless data hiding method with flexible payload size. IEICE Electron. Express 7(23), 1702\u20131708 (2010)","journal-title":"IEICE Electron. Express"},{"issue":"2","key":"891_CR35","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TMM.2012.2229262","volume":"15","author":"X Zhang","year":"2013","unstructured":"Zhang, X.: Reversible data hiding with optimal value transfer. Multimed. IEEE Trans. 15(2), 316\u2013325 (2013)","journal-title":"Multimed. IEEE Trans."},{"issue":"1","key":"891_CR36","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TIP.2011.2162424","volume":"21","author":"D Coltuc","year":"2012","unstructured":"Coltuc, D.: Low distortion transform for reversible watermarking. IEEE Trans. Image Process. 21(1), 412\u2013417 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"891_CR37","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"IC Dragoi","year":"2014","unstructured":"Dragoi, I.C., Coltuc, D.: Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. A Publ. IEEE Signal Process. Soc. 23(4), 1779 (2014)","journal-title":"IEEE Trans. Image Process. A Publ. IEEE Signal Process. Soc."},{"issue":"4","key":"891_CR38","doi-asserted-by":"publisher","first-page":"974","DOI":"10.5370\/JEET.2016.11.4.974","volume":"11","author":"BY Lee","year":"2016","unstructured":"Lee, B.Y., Hwang, H.J., Kim, H.J.: Reversible data hiding using a piecewise autoregressive predictor based on two-stage embedding. J. Electr. Eng. Technol. 11(4), 974\u2013986 (2016)","journal-title":"J. Electr. Eng. Technol."},{"key":"891_CR39","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1186\/s13640-016-0144-3","volume":"1","author":"HJ Hwang","year":"2016","unstructured":"Hwang, H.J., Kim, S.H., Kim, H.J.: Reversible data hiding using least square predictor via the LASSO. EURASIP J. Image Video Process. 1, 42 (2016)","journal-title":"EURASIP J. Image Video Process."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00891-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00891-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00891-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,17]],"date-time":"2020-06-17T23:26:32Z","timestamp":1592436392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00891-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,19]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["891"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00891-w","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,19]]},"assertion":[{"value":"28 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}