{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:01:21Z","timestamp":1776330081493,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702332"],"award-info":[{"award-number":["61702332"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672354"],"award-info":[{"award-number":["61672354"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562007"],"award-info":[{"award-number":["61562007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11554-019-00904-8","type":"journal-article","created":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T14:02:42Z","timestamp":1565013762000},"page":"41-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A real-time reversible image authentication method using uniform embedding strategy"],"prefix":"10.1007","volume":"17","author":[{"given":"Heng","family":"Yao","sequence":"first","affiliation":[]},{"given":"Hongbin","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Chuan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Zhenjun","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,5]]},"reference":[{"key":"904_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2019.2919570)","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Wu, Q.M.J., Sun, X.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data (2019). \nhttps:\/\/doi.org\/10.1109\/tbdata.2019.2919570)","journal-title":"IEEE Trans. Big Data"},{"key":"904_CR2","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.ins.2018.11.030","volume":"480","author":"L Qi","year":"2019","unstructured":"Qi, L., Wang, R., Li, S., He, Q., Xu, X., Hu, C.: Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480, 354\u2013364 (2019)","journal-title":"Inf. Sci."},{"key":"904_CR3","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.future.2018.02.050","volume":"88","author":"L Qi","year":"2018","unstructured":"Qi, L., Zhang, X., Dou, W., Hu, C., Yang, C., Chen, J.: A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Futur. Gener. Comp. Syst. 88, 636\u2013643 (2018)","journal-title":"Futur. Gener. Comp. Syst."},{"key":"904_CR4","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin, C., Ji, P., Zhang, X.P., Dong, J., Wang, J.W.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280\u2013293 (2017)","journal-title":"Signal Process."},{"issue":"3","key":"904_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","volume":"25","author":"C Qin","year":"2018","unstructured":"Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.M.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. 25(3), 36\u201348 (2018)","journal-title":"IEEE Multimed."},{"key":"904_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.dsp.2017.11.005","volume":"73","author":"S Bravo-Solorio","year":"2018","unstructured":"Bravo-Solorio, S., Calderon, F., Li, C.T., Nandi, A.K.: Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit. Signal Process. 73, 83\u201392 (2018)","journal-title":"Digit. Signal Process."},{"key":"904_CR7","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","volume":"361","author":"C Qin","year":"2016","unstructured":"Qin, C., Chen, X., Ye, D., Wang, J., Sun, X.: A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361, 84\u201399 (2016)","journal-title":"Inf. Sci."},{"key":"904_CR8","doi-asserted-by":"publisher","first-page":"45460","DOI":"10.1109\/ACCESS.2019.2908029","volume":"7","author":"C Qin","year":"2019","unstructured":"Qin, C., Hu, Y., Yao, H., Duan, X., Gao, L.: Perceptual image hashing based on a Weber local binary pattern and color angle representation. IEEE Access. 7, 45460\u201345471 (2019)","journal-title":"IEEE Access."},{"issue":"3","key":"904_CR9","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TKDE.2018.2837745","volume":"31","author":"Z Tang","year":"2019","unstructured":"Tang, Z., Chen, L., Zhang, X., Zhang, S.: Robust image hashing with tensor decomposition. IEEE Trans. Knowl. Data Eng. 31(3), 549\u2013560 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"5","key":"904_CR10","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1109\/TMM.2018.2872863","volume":"21","author":"T Qiao","year":"2019","unstructured":"Qiao, T., Shi, R., Luo, X.Y., Xu, M., Zheng, N., Wu, Y.M.: Statistical model-based detector via texture weight map: application in re-sampling authentication. IEEE Trans. Multimed. 21(5), 1077\u20131092 (2019)","journal-title":"IEEE Trans. Multimed."},{"issue":"10","key":"904_CR11","doi-asserted-by":"publisher","first-page":"12457","DOI":"10.1007\/s11042-016-3660-3","volume":"76","author":"H Yao","year":"2017","unstructured":"Yao, H., Wang, S.Z., Zhang, X.P., Qin, C., Wang, J.W.: Detecting image splicing based on noise level inconsistency. Multimed. Tools Appl. 76(10), 12457\u201312479 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"14","key":"904_CR12","doi-asserted-by":"publisher","first-page":"18139","DOI":"10.1007\/s11042-017-5206-8","volume":"77","author":"H Yao","year":"2018","unstructured":"Yao, H., Cao, F., Tang, Z.J., Wang, J.W., Qiao, T.: Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multimed. Tools Appl. 77(14), 18139\u201318161 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"904_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2018.2867786","author":"J Wang","year":"2018","unstructured":"Wang, J., Li, T., Li, T., Luo, X., Shi, Y.Q., Jha, S.K.: Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain. IEEE Trans. Circuits Syst. Video Technol. (2018). \nhttps:\/\/doi.org\/10.1109\/tcsvt.2018.2867786","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"904_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2019.2922309","author":"J Wang","year":"2019","unstructured":"Wang, J., Wang, H., Li, J., Luo, X., Shi, Y.Q., Jha, S.K.: Detecting double JPEG compressed color images with the same quantization matrix in spherical coordinate. IEEE Trans. Circuits Syst. Video Technol. (2019). \nhttps:\/\/doi.org\/10.1109\/tcsvt.2019.2922309","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"904_CR15","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.jvcir.2018.05.011","volume":"54","author":"C Iakovidou","year":"2018","unstructured":"Iakovidou, C., Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y.: Content-aware detection of JPEG grid inconsistencies for intuitive image forensics. J. Vis. Commun. Image Represent. 54, 155\u2013170 (2018)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"904_CR16","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jvcir.2017.01.004","volume":"43","author":"H Yao","year":"2017","unstructured":"Yao, H., Qin, C., Tang, Z.J., Tian, Y.: Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43, 152\u2013163 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"904_CR17","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.ins.2016.05.030","volume":"369","author":"SW Weng","year":"2016","unstructured":"Weng, S.W., Pan, J.S., Li, L.D.: Reversible data hiding based on an adaptive pixel-embedding strategy and two-layer embedding. Inf. Sci. 369, 144\u2013159 (2016)","journal-title":"Inf. Sci."},{"issue":"12","key":"904_CR18","doi-asserted-by":"publisher","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","volume":"22","author":"B Ou","year":"2013","unstructured":"Ou, B., Li, X.L., Zhao, Y., Ni, R.R., Shi, Y.Q.: Pairwise prediction-error expansion for efficient reversible data hiding. IEEE Trans. Image Process. 22(12), 5010\u20135021 (2013)","journal-title":"IEEE Trans. Image Process."},{"key":"904_CR19","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.neucom.2016.11.017","volume":"226","author":"B Ou","year":"2017","unstructured":"Ou, B., Li, X.L., Wang, J.W., Peng, F.: High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion. Neurocomputing. 226, 23\u201334 (2017)","journal-title":"Neurocomputing."},{"issue":"9","key":"904_CR20","doi-asserted-by":"publisher","first-page":"2016","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"XL Li","year":"2015","unstructured":"Li, X.L., Zhang, W.M., Gui, X.L., Yang, B.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensic Secur. 10(9), 2016\u20132027 (2015)","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"7","key":"904_CR21","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109\u20131118 (2013)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"904_CR22","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"IC Dragoi","year":"2014","unstructured":"Dragoi, I.C., Coltuc, D.: Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23(4), 1779\u20131790 (2014)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"904_CR23","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TIP.2011.2162424","volume":"21","author":"D Coltuc","year":"2012","unstructured":"Coltuc, D.: Low distortion transform for reversible watermarking. IEEE Trans. Image Process. 21(1), 412\u2013417 (2012)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"904_CR24","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"XL Li","year":"2013","unstructured":"Li, X.L., Li, J., Li, B., Yang, B.: High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1), 198\u2013205 (2013)","journal-title":"Signal Process."},{"key":"904_CR25","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.sigpro.2013.11.028","volume":"98","author":"CC Lo","year":"2014","unstructured":"Lo, C.C., Hu, Y.C.: A novel reversible image authentication scheme for digital images. Signal Process. 98, 174\u2013185 (2014)","journal-title":"Signal Process."},{"issue":"1","key":"904_CR26","first-page":"395","volume":"10","author":"TS Nguyen","year":"2016","unstructured":"Nguyen, T.S., Chang, C.C., Shih, T.H.: A high-quality reversible image authentication scheme based on adaptive PEE for digital images. KSII Trans. Internet Inf. Syst. 10(1), 395\u2013413 (2016)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"904_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ins.2015.03.022","volume":"310","author":"X Wang","year":"2015","unstructured":"Wang, X., Ding, J., Pei, Q.Q.: A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf. Sci. 310, 16\u201335 (2015)","journal-title":"Inf. Sci."},{"issue":"5","key":"904_CR28","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1007\/s12559-016-9408-6","volume":"8","author":"ZX Yin","year":"2016","unstructured":"Yin, Z.X., Niu, X.J., Zhou, Z.L., Tang, J., Luo, B.: Improved reversible image authentication scheme. Cogn. Comput. 8(5), 890\u2013899 (2016)","journal-title":"Cogn. Comput."},{"key":"904_CR29","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/j.image.2017.07.001","volume":"58","author":"WE Hong","year":"2017","unstructured":"Hong, W.E., Chen, M.J., Chen, T.S.: An efficient reversible image authentication method using improved PVO and LSB substitution techniques. Signal Process. Image Commun. 58, 111\u2013122 (2017)","journal-title":"Signal Process. Image Commun."},{"key":"904_CR30","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.dsp.2013.11.002","volume":"25","author":"F Peng","year":"2014","unstructured":"Peng, F., Li, X.L., Yang, B.: Improved PVO-based reversible data hiding. Digit. Signal Prog. 25, 255\u2013265 (2014)","journal-title":"Digit. Signal Prog."},{"issue":"7","key":"904_CR31","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/LSP.2018.2844562","volume":"25","author":"G Gao","year":"2018","unstructured":"Gao, G., Cui, Z., Zhou, C.: Blind reversible authentication based on PEE and CS reconstruction. IEEE Signal Process. Lett. 25(7), 1099\u20131103 (2018)","journal-title":"IEEE Signal Process. Lett."},{"key":"904_CR32","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.jvcir.2016.03.011","volume":"38","author":"B Ou","year":"2016","unstructured":"Ou, B., Li, X.L., Wang, J.W.: Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification. J. Vis. Commun. Image Represent. 38, 328\u2013339 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"904_CR33","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jvcir.2016.05.005","volume":"39","author":"B Ou","year":"2016","unstructured":"Ou, B., Li, X.L., Wang, J.W.: High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion. J. Vis. Commun. Image Represent. 39, 12\u201323 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"904_CR34","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jvcir.2017.03.010","volume":"46","author":"WG He","year":"2017","unstructured":"He, W.G., Cai, J., Zhou, K., Xiong, G.Q.: Efficient PVO-based reversible data hiding using multistage blocking and prediction accuracy matrix. J. Vis. Commun. Image Represent. 46, 58\u201369 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"904_CR35","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1016\/j.ins.2018.04.088","volume":"467","author":"WG He","year":"2018","unstructured":"He, W.G., Xiong, G.Q., Weng, S.W., Cai, Z.C., Wang, Y.M.: Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion. Inf. Sci. 467, 784\u2013799 (2018)","journal-title":"Inf. Sci."},{"key":"904_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-019-00872-z","author":"CF Lee","year":"2019","unstructured":"Lee, C.F., Shen, J.J., Kao, Y.C., Agrawal, S.: Overlapping pixel value ordering predictor for high-capacity reversible data hiding. J Real-Time Image Proc (2019). \nhttps:\/\/doi.org\/10.1007\/s11554-019-00872-z","journal-title":"J Real-Time Image Proc"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00904-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00904-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00904-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,3]],"date-time":"2020-08-03T23:27:01Z","timestamp":1596497221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00904-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["904"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00904-8","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,5]]},"assertion":[{"value":"2 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}