{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:38:39Z","timestamp":1769636319415,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the National High Technology Research and Development program of China (863 program)","award":["2014AA012204"],"award-info":[{"award-number":["2014AA012204"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vietnam J Comput Sci"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s40595-018-0114-z","type":"journal-article","created":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T01:46:48Z","timestamp":1527558408000},"page":"185-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A new multilevel reversible bit-planes data hiding technique based on histogram shifting of efficient compressed domain"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9092-1708","authenticated-orcid":false,"given":"Rashid","family":"Abbasi","sequence":"first","affiliation":[]},{"given":"Bin","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Gohar","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Haseeb","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Muhammad Shahid","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Lixiang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"114_CR1","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.neucom.2016.07.037","volume":"216","author":"H Zhao","year":"2016","unstructured":"Zhao, H., Wang, Z., Nie, F.: Orthogonal least squares regression for feature extraction. Neurocomputing 216, 200\u2013207 (2016)","journal-title":"Neurocomputing"},{"issue":"5","key":"114_CR2","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1007\/s12559-016-9401-0","volume":"8","author":"M Zhao","year":"2016","unstructured":"Zhao, M., Jiang, B., Luo, B., et al.: Common visual patterns discovery with an elastic matching model. Cogn. Comput 8(5), 839\u2013846 (2016)","journal-title":"Cogn. Comput"},{"issue":"3","key":"114_CR3","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X., Yang, B., et al.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"114_CR4","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., et al.: Secure spread spectrum watermarking for multimedia. Secure spread spectrum watermarking for images, audio and video. 3, 243-246 (1996)"},{"issue":"2","key":"114_CR5","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/TITB.2008.2007199","volume":"13","author":"G Coatrieux","year":"2009","unstructured":"Coatrieux, G., Guillou, C.L., Cauvin, J.M., et al.: Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans. Inf. Technol. Biomed. Publ. 13(2), 158\u2013165 (2009)","journal-title":"IEEE Trans. Inf. Technol. Biomed. Publ."},{"key":"114_CR6","unstructured":"Barton, J.M.: Method and apparatus for embedding authentication information within digital data: US, US 6047374 A[P] (2000)"},{"key":"114_CR7","doi-asserted-by":"crossref","unstructured":"Yin, Z., Niu, X., Zhou, Z, et al.: Improved reversible image authentication scheme. Cogn. Comput. 1\u201310 (2016)","DOI":"10.1016\/j.cognition.2016.02.009"},{"issue":"3","key":"114_CR8","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"Lee, S., Yoo, C.D., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inf. Forensics Secur. 2(3), 321\u2013330 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"114_CR9","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MIC.2010.86","volume":"14","author":"K Hwang","year":"2010","unstructured":"Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14\u201322 (2010)","journal-title":"IEEE Internet Comput."},{"issue":"8","key":"114_CR10","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"11","key":"114_CR11","doi-asserted-by":"crossref","first-page":"3083","DOI":"10.1016\/j.patcog.2009.04.004","volume":"42","author":"KS Kim","year":"2009","unstructured":"Kim, K.S., Lee, M.J., Lee, H.Y., et al.: Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recognit. 42(11), 3083\u20133096 (2009)","journal-title":"Pattern Recognit."},{"issue":"9","key":"114_CR12","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","volume":"10","author":"X Li","year":"2015","unstructured":"Li, X., Zhang, W., Gui, X., et al.: Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10(9), 2016\u20132027 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"114_CR13","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.ins.2010.09.022","volume":"181","author":"H Luo","year":"2011","unstructured":"Luo, H., Yu, F.X., Chen, H., et al.: Reversible data hiding based on block median preservation. Inf. Sci. 181(2), 308\u2013328 (2011)","journal-title":"Inf. Sci."},{"issue":"2","key":"114_CR14","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.csi.2008.05.009","volume":"31","author":"DC Lou","year":"2009","unstructured":"Lou, D.C., Hu, M.C., Liu, J.L.: Multiple layer data hiding scheme for medical images. Comput. Stand. Interfaces 31(2), 329\u2013335 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"7","key":"114_CR15","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1016\/j.jvcir.2011.06.005","volume":"22","author":"CC Chang","year":"2011","unstructured":"Chang, C.C., Nguyen, T.S., Lin, C.C.: A reversible data hiding scheme for VQ indices using locally adaptive coding. J. Vis. Commun. Image Represent. 22(7), 664\u2013672 (2011)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"114_CR16","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi, D.M., Rodrguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721\u2013730 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"114_CR17","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni, Z., Shi, Y.Q., Ansari, N., et al.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354\u2013362 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"114_CR18","doi-asserted-by":"crossref","first-page":"1116","DOI":"10.1016\/j.dsp.2009.10.025","volume":"20","author":"YC Li","year":"2010","unstructured":"Li, Y.C., Yeh, C.M., Chang, C.C.: Data hiding based on the similarity between neighboring pixels with reversibility. Digit. Signal Process. 20(4), 1116\u20131128 (2010)","journal-title":"Digit. Signal Process."},{"issue":"6","key":"114_CR19","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"WL Tai","year":"2009","unstructured":"Tai, W.L., Yeh, C.M., Chang, C.C.: Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19(6), 906\u2013910 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"6","key":"114_CR20","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","volume":"22","author":"X Li","year":"2013","unstructured":"Li, X., Li, B., Yang, B., et al.: General framework to histogram-shifting-based reversible data hiding. IEEE Trans. Image Process. 22(6), 2181\u20132191 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"16","key":"114_CR21","doi-asserted-by":"crossref","first-page":"2166","DOI":"10.1016\/j.patrec.2012.08.004","volume":"33","author":"C Qin","year":"2012","unstructured":"Qin, C., Chang, C.C., Liao, L.T.: An adaptive prediction-error expansion oriented reversible information hiding scheme. Pattern Recognit. Lett. 33(16), 2166\u20132172 (2012)","journal-title":"Pattern Recognit. Lett."},{"key":"114_CR22","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.sigpro.2013.12.005","volume":"98","author":"X Gui","year":"2014","unstructured":"Gui, X., Li, X., Yang, B.: A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process. 98, 370\u2013380 (2014)","journal-title":"Signal Process."},{"issue":"2","key":"114_CR23","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.jvcir.2010.11.004","volume":"22","author":"W Hong","year":"2011","unstructured":"Hong, W., Chen, T.S.: Reversible data embedding for high quality images using interpolation and reference pixel distribution mechanism. J. Vis. Commun. Image Represent. 22(2), 131\u2013140 (2011)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"1","key":"114_CR24","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s11042-013-1369-0","volume":"72","author":"TC Lu","year":"2014","unstructured":"Lu, T.C., Chang, C.C., Huang, Y.H.: High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting. Multimed. Tools Appl. 72(1), 417\u2013435 (2014)","journal-title":"Multimed. Tools Appl."},{"issue":"12","key":"114_CR25","doi-asserted-by":"crossref","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"CC Lin","year":"2008","unstructured":"Lin, C.C., Tai, W.L., Chang, C.C.: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognit. 41(12), 3582\u20133591 (2008)","journal-title":"Pattern Recognit."},{"issue":"6","key":"114_CR26","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai, P., Hu, Y.C., Yeh, H.L.: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process. 89(6), 1129\u20131143 (2009)","journal-title":"Signal Process."},{"key":"114_CR27","doi-asserted-by":"crossref","unstructured":"Liu, L., Chang, C.C., Wang, A.: Reversible data hiding scheme based on histogram shifting of n-bit planes. Multimed. Tools Appl. 1\u201316 (2015)","DOI":"10.1007\/s11042-015-2855-3"},{"issue":"7","key":"114_CR28","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1587\/elex.4.205","volume":"4","author":"M Fallahpour","year":"2007","unstructured":"Fallahpour, M., Sedaaghi, M.H.: High capacity lossless data hiding based on histogram modification. IEICE Electron Express 4(7), 205\u2013210 (2007)","journal-title":"IEICE Electron Express"},{"key":"114_CR29","doi-asserted-by":"crossref","unstructured":"Kuo, W.C., Jiang, D.J., Huang, Y.C.A.: Reversible data hiding scheme based on block division. In: IEEE Congress on Image and Signal Processing, CISP\u201908, vol. 2008, no. (1), pp. 365\u2013369 (2008)","DOI":"10.1109\/CISP.2008.730"},{"key":"114_CR30","first-page":"1","volume-title":"A Lossless Data Hiding Method by Histogram Shifting Based on an Adaptive Block Division Scheme. Pattern Recognition and Machine Vision","author":"CW Lee","year":"2010","unstructured":"Lee, C.W., Tsai, W.H.: A Lossless Data Hiding Method by Histogram Shifting Based on an Adaptive Block Division Scheme. Pattern Recognition and Machine Vision, pp. 1\u201314. River Publishers, Aalborg (2010)"},{"key":"114_CR31","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.image.2017.10.007","volume":"60","author":"W He","year":"2018","unstructured":"He, W.: Improved block redundancy mining based reversible data hiding using multi-sub-blocking. Signal Process. Image Commun. 60, 199\u2013210 (2018)","journal-title":"Signal Process. Image Commun."},{"key":"114_CR32","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/j.jvcir.2016.07.014","volume":"40","author":"W He","year":"2016","unstructured":"He, W., Xiong, G., Zhou, K., et al.: Reversible data hiding based on multilevel histogram modification and pixel value grouping. J. Vis. Commun. Image Represent. 40, 459\u2013469 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"114_CR33","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.sigpro.2016.11.003","volume":"133","author":"JC Chang","year":"2017","unstructured":"Chang, J.C., Lu, Y.Z., Wu, H.L.: A separable reversible data hiding scheme for encrypted JPEG bitstreams. Signal Process. 133, 135\u2013143 (2017)","journal-title":"Signal Process."}],"container-title":["Vietnam Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40595-018-0114-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40595-018-0114-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40595-018-0114-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T14:46:15Z","timestamp":1571409975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40595-018-0114-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["114"],"URL":"https:\/\/doi.org\/10.1007\/s40595-018-0114-z","relation":{},"ISSN":["2196-8888","2196-8896"],"issn-type":[{"value":"2196-8888","type":"print"},{"value":"2196-8896","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}