{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T07:10:06Z","timestamp":1748589006320,"version":"3.41.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T00:00:00Z","timestamp":1747094400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s11760-025-04163-y","type":"journal-article","created":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T15:39:12Z","timestamp":1747150752000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive coefficient sorting and selection for high capacity data hiding in JPEG images"],"prefix":"10.1007","volume":"19","author":[{"given":"Jeanne","family":"Chen","sequence":"first","affiliation":[]},{"given":"Guan-Zhong","family":"Su","sequence":"additional","affiliation":[]},{"given":"Wien","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Tung-Shou","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,13]]},"reference":[{"key":"4163_CR1","first-page":"103407","volume":"72","author":"R Anushiadevi","year":"2023","unstructured":"Anushiadevi, R., Amirtharajan, R.: Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram. J. Inf. Secur. Appl. 72, 103407 (2023)","journal-title":"J. Inf. Secur. Appl."},{"issue":"102822","key":"4163_CR2","first-page":"2020","volume":"71","author":"J Yang","year":"2020","unstructured":"Yang, J., Liao, X.: An embedding strategy on fusing multiple image features for data hiding in multiple images. J. Vis. Commun. Image Represent. 71(102822), 2020 (2020)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"4163_CR3","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao, X., Li, K., Yin, J.: Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed. Tools Appl. 76, 20739\u201320753 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"4163_CR4","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"4163_CR5","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"4163_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469\u2013474 (2004)","journal-title":"Pattern Recogn."},{"issue":"1","key":"4163_CR7","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2011","unstructured":"Hong, W., Chen, T.S.: A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensics Secur. 7(1), 176\u2013184 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"4163_CR8","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781\u2013783 (2006)","journal-title":"IEEE Commun. Lett."},{"key":"4163_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-16888-4","volume":"83","author":"HS Leng","year":"2023","unstructured":"Leng, H.S., Hu, Y.C., Tseng, H.W.: A high payload block-based data hiding scheme using multi-encoding methods. Multimed. Tools Appl. 83, 1\u201318 (2023)","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"4163_CR10","doi-asserted-by":"publisher","first-page":"3869","DOI":"10.1007\/s12652-021-03365-9","volume":"13","author":"AK Sahu","year":"2022","unstructured":"Sahu, A.K.: A logistic map based blind and fragile watermarking for tamper detection and localization in images. J. Ambient. Intell. Humaniz. Comput. 13(8), 3869\u20133881 (2022)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"8","key":"4163_CR11","doi-asserted-by":"publisher","first-page":"5822","DOI":"10.1016\/j.jksuci.2022.02.009","volume":"34","author":"A Aminuddin","year":"2022","unstructured":"Aminuddin, A., Ernawan, F.: AuSR1: authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking. J. King Saud Univ. Comput. Inf. Sci. 34(8), 5822\u20135840 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"16","key":"4163_CR12","doi-asserted-by":"publisher","first-page":"24069","DOI":"10.1007\/s11042-022-13630-4","volume":"82","author":"AK Sahu","year":"2023","unstructured":"Sahu, A.K., Hassaballah, M., Rao, R.S., Suresh, G.: Logistic-map based fragile image watermarking scheme for tamper detection and localization. Multimed. Tools Appl. 82(16), 24069\u201324100 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"4163_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-9803-6","volume-title":"Multimedia Watermarking: Latest Developments and Trends","author":"AK Sahu","year":"2024","unstructured":"Sahu, A.K.: Multimedia Watermarking: Latest Developments and Trends. Springer Nature, Cham (2024)"},{"issue":"8","key":"4163_CR14","doi-asserted-by":"publisher","first-page":"5240","DOI":"10.1016\/j.jksuci.2022.05.013","volume":"34","author":"K Datta","year":"2022","unstructured":"Datta, K., Jana, B., Chakraborty, M.D.: Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion. J. King Saud Univ.Comput. Inf. Sci. 34(8), 5240\u20135260 (2022)","journal-title":"J. King Saud Univ.Comput. Inf. Sci."},{"issue":"3","key":"4163_CR15","first-page":"5167","volume":"71","author":"YY Chen","year":"2022","unstructured":"Chen, Y.Y., Hu, Y.C., Yang, T.K., Wang, Y.A.: Data Hiding in AMBTC Images Using Selective XOR Hiding Scheme. Comput. Mater. Contin. 71(3), 5167 (2022)","journal-title":"Comput. Mater. Contin."},{"key":"4163_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.ins.2018.05.055","volume":"463","author":"W Hong","year":"2018","unstructured":"Hong, W., Zhou, X., Lou, D.C., Chen, T.S., Li, Y.: Joint image coding and lossless data hiding in VQ indices using adaptive coding techniques. Inf. Sci. 463, 245\u2013260 (2018)","journal-title":"Inf. Sci."},{"key":"4163_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jvcir.2018.12.018","volume":"59","author":"CT Huang","year":"2019","unstructured":"Huang, C.T., Lin, L.C., Yang, C.H., Wang, S.J.: Dynamic embedding strategy of VQ-based information hiding approach. J. Vis. Commun. Image Represent. 59, 14\u201332 (2019)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"4","key":"4163_CR18","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1080\/09540091.2021.1900073","volume":"33","author":"CC Chang","year":"2021","unstructured":"Chang, C.C., Horng, J.H., Shih, C.S., Wang, X.: VQ-oriented data hiding based on adjustable error compensation strategy. Connect. Sci. 33(4), 835\u2013853 (2021)","journal-title":"Connect. Sci."},{"key":"4163_CR19","doi-asserted-by":"publisher","first-page":"11443","DOI":"10.1007\/s11042-018-6651-8","volume":"78","author":"XZ Xie","year":"2019","unstructured":"Xie, X.Z., Lin, C.C., Chang, C.C.: A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients. Multimed. Tools Appl. 78, 11443\u201311462 (2019)","journal-title":"Multimed. Tools Appl."},{"issue":"12","key":"4163_CR20","doi-asserted-by":"publisher","first-page":"7212","DOI":"10.1109\/TCSVT.2023.3278284","volume":"33","author":"N Mao","year":"2023","unstructured":"Mao, N., He, H., Chen, F., Yuan, Y., Qu, L.: Reversible data hiding of JPEG image based on adaptive frequency band length. IEEE Trans. Circuits Syst. Video Technol. 33(12), 7212\u20137223 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"4163_CR21","doi-asserted-by":"publisher","first-page":"105555","DOI":"10.1016\/j.bspc.2023.105555","volume":"87","author":"N Mao","year":"2024","unstructured":"Mao, N., He, H., Chen, F., Bellavista, P., Yang, Y.: Reversible data hiding of JPEG images based on block sorting and segmented embedding. Biomed. Signal Process. Control 87, 105555 (2024)","journal-title":"Biomed. Signal Process. Control"},{"key":"4163_CR22","doi-asserted-by":"publisher","first-page":"73573","DOI":"10.1109\/ACCESS.2019.2920178","volume":"7","author":"Y Li","year":"2019","unstructured":"Li, Y., Yao, S., Yang, K., Tan, Y.A., Zhang, Q.: A high-imperceptibility and histogram-shifting data hiding scheme for JPEG images. IEEE Access 7, 73573\u201373582 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"4163_CR23","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1080\/09540091.2020.1853055","volume":"33","author":"XZ Xie","year":"2021","unstructured":"Xie, X.Z., Chang, C.C., Horng, J.H.: An EMD-based data hiding scheme for JPEG images. Connect. Sci. 33(3), 515\u2013531 (2021)","journal-title":"Connect. Sci."},{"issue":"4","key":"4163_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/103085.103089","volume":"34","author":"GK Wallace","year":"1991","unstructured":"Wallace, G.K.: The JPEG still picture compression standard. Commun. ACM 34(4), 30\u201344 (1991)","journal-title":"Commun. ACM"},{"key":"4163_CR25","volume-title":"The Data Compression Book","author":"M Nelson","year":"1995","unstructured":"Nelson, M., Gailly, J.L.: The Data Compression Book. M & T Books, New York (1995)"},{"key":"4163_CR26","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.sigpro.2018.02.002","volume":"148","author":"D Hou","year":"2018","unstructured":"Hou, D., Wang, H., Zhang, W., Yu, N.: Reversible data hiding in JPEG image based on DCT frequency and block selection. Signal Process. 148, 41\u201347 (2018)","journal-title":"Signal Process."},{"key":"4163_CR27","unstructured":"The USC-SIPI image database. Available online: http:\/\/sipi.usc.edu\/database. Accessed 10 Dec 2024"},{"key":"4163_CR28","unstructured":"The BOSS image database. Available online: http:\/\/agents.fel.cvut.cz\/boss. Accessed 10 Dec. 2024"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04163-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-04163-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04163-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T06:41:24Z","timestamp":1748587284000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-04163-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,13]]},"references-count":28,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["4163"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-04163-y","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,5,13]]},"assertion":[{"value":"19 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest that is relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"584"}}