{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:32:12Z","timestamp":1774974732083,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 108-2221-E-011-162-MY2"],"award-info":[{"award-number":["MOST 108-2221-E-011-162-MY2"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Various eHealth applications based on the Internet of Things (IoT) contain a considerable number of medical images and visual electronic health records, which are transmitted through the Internet everyday. Information forensics thus becomes a critical issue. This paper presents a data hiding algorithm for absolute moment block truncation coding (AMBTC) images, wherein secret data, or the authentication code, can be embedded in images to enhance security. Moreover, in view of the importance of transmission efficiency in IoT, image compression is widely used in Internet-based applications. To cope with this challenge, we present a novel compression method named gradient-based (GB) compression, which is compatible with AMBTC compression. Therefore, after applying the block classification scheme, GB compression and data hiding can be performed jointly for blocks with strong gradient effects, and AMBTC compression and data hiding can be performed jointly for the remaining blocks. From the experimental results, we demonstrate that the proposed method outperforms other state-of-the-art methods.<\/jats:p>","DOI":"10.1007\/s40747-021-00391-0","type":"journal-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T13:02:43Z","timestamp":1620478963000},"page":"2699-2711","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Security for eHealth system: data hiding in AMBTC compressed images via gradient-based coding"],"prefix":"10.1007","volume":"9","author":[{"given":"Yung-Yao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yu-Chen","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hsiang-Yun","family":"Kao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1407-2262","authenticated-orcid":false,"given":"Yu-Hsiu","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"key":"391_CR1","doi-asserted-by":"publisher","first-page":"96900","DOI":"10.1109\/ACCESS.2019.2929298","volume":"7","author":"Y Yang","year":"2019","unstructured":"Yang Y, Xiao X, Cai X, Zhang W (2019) A secure and high visual-quality framework for medical images by contrast-enhancement reversible data hiding and homomorphic encryption. IEEE Access 7:96900\u201396911","journal-title":"IEEE Access"},{"key":"391_CR2","first-page":"132","volume":"47","author":"X Wang","year":"2019","unstructured":"Wang X, Bai L, Yang Q, Wang L, Jiang F (2019) A dual privacy-preservation scheme for cloud-based ehealth systems. J Inf Secur Appl 47:132\u2013138","journal-title":"J Inf Secur Appl"},{"key":"391_CR3","doi-asserted-by":"publisher","first-page":"23209","DOI":"10.1109\/ACCESS.2020.2969252","volume":"8","author":"Y Qiu","year":"2020","unstructured":"Qiu Y, Ying Q, Lin X, Zhang Y, Qian Z (2020) Reversible data hiding in encrypted images with dual data embedding. IEEE Access 8:23209\u201323220","journal-title":"IEEE Access"},{"issue":"6","key":"391_CR4","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TDSC.2016.2634161","volume":"15","author":"Z Qian","year":"2018","unstructured":"Qian Z, Zhou H, Zhang X, Zhang W (2018) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans Depend Secure Comput 15(6):1055\u20131067","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"391_CR5","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/LSP.2020.2965826","volume":"27","author":"Y Yang","year":"2020","unstructured":"Yang Y, Xiao X, Cai X, Zhang W (2020) A secure and privacy-preserving technique based on contrast-enhancement reversible data hiding and plaintext encryption for medical images. IEEE Signal Process Lett 27:256\u2013260","journal-title":"IEEE Signal Process Lett"},{"key":"391_CR6","doi-asserted-by":"publisher","first-page":"3501","DOI":"10.1109\/TCSVT.2018.2882850","volume":"29","author":"J He","year":"2019","unstructured":"He J, Chen J, Luo W, Tang S, Huang J (2019) A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams. IEEE Trans Circuits Syst Video Technol 29:3501\u20133515","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"391_CR7","doi-asserted-by":"publisher","first-page":"3332","DOI":"10.1109\/TIFS.2019.2914557","volume":"14","author":"Y Chen","year":"2019","unstructured":"Chen Y, Hung T, Hsieh S, Shiu C (2019) A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans Inf Forens Secur 14:3332\u20133343","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"391_CR8","doi-asserted-by":"publisher","first-page":"69256","DOI":"10.1109\/ACCESS.2020.2986340","volume":"8","author":"W Chen","year":"2020","unstructured":"Chen W, Chang C, Weng S, Ou B (2020) Multi-layer mini-sudoku based high-capacity data hiding method. IEEE Access 8:69256\u201369267","journal-title":"IEEE Access"},{"key":"391_CR9","doi-asserted-by":"publisher","first-page":"2121","DOI":"10.1109\/TIFS.2019.2958758","volume":"15","author":"J He","year":"2020","unstructured":"He J, Chen J, Tang S (2020) Reversible data hiding in JPEG images based on negative influence models. IEEE Trans Inf Forensics Secur 15:2121\u20132133","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"391_CR10","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/LSP.2020.2967593","volume":"27","author":"D Xiao","year":"2020","unstructured":"Xiao D, Li F, Wang M, Zheng H (2020) A novel high-capacity data hiding in encrypted images based on compressive sensing progressive recovery. IEEE Signal Process Lett 27:296\u2013300","journal-title":"IEEE Signal Process Lett"},{"key":"391_CR11","doi-asserted-by":"publisher","first-page":"27634","DOI":"10.1109\/ACCESS.2020.2966231","volume":"8","author":"Z Yu","year":"2020","unstructured":"Yu Z, Lin C, Chang C (2020) ABMC-DH: an adaptive bit-plane data hiding method based on matrix coding. IEEE Access 8:27634\u201327648","journal-title":"IEEE Access"},{"key":"391_CR12","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1049\/cje.2017.10.004","volume":"27","author":"H Ding","year":"2018","unstructured":"Ding H, Li Z, Yang Y, You F, Liu F (2018) High quality data hiding in halftone image based on block conjugate. Chin J Electron 27:150\u2013158","journal-title":"Chin J Electron"},{"key":"391_CR13","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TIP.2018.2878290","volume":"28","author":"S Li","year":"2019","unstructured":"Li S, Zhang X (2019) Toward construction-based data hiding: from secrets to fingerprint images. IEEE Trans Image Process 28:1482\u20131497","journal-title":"IEEE Trans Image Process"},{"key":"391_CR14","doi-asserted-by":"publisher","first-page":"22345","DOI":"10.1109\/ACCESS.2020.2968577","volume":"8","author":"S Chen","year":"2020","unstructured":"Chen S, Chang C, Liao Q (2020) Fidelity preserved data hiding in encrypted images based on homomorphism and matrix embedding. IEEE Access 8:22345\u201322356","journal-title":"IEEE Access"},{"key":"391_CR15","doi-asserted-by":"publisher","first-page":"2739","DOI":"10.3390\/s20092739","volume":"20","author":"J Horng","year":"2020","unstructured":"Horng J, Xu S, Chang C, Chang C (2020) An efficient data-hiding scheme based on multidimensional mini-SuDoKu. Sensors 20:2739","journal-title":"Sensors"},{"key":"391_CR16","doi-asserted-by":"publisher","first-page":"5374","DOI":"10.1109\/ACCESS.2017.2787803","volume":"6","author":"Y Liu","year":"2018","unstructured":"Liu Y, Yang C, Sun Q (2018) Enhance embedding capacity of generalized exploiting modification directions in data hiding. IEEE Access 6:5374\u20135378","journal-title":"IEEE Access"},{"key":"391_CR17","doi-asserted-by":"publisher","first-page":"51130","DOI":"10.1109\/ACCESS.2018.2868192","volume":"6","author":"A Shukla","year":"2018","unstructured":"Shukla A, Shukla A, Singh B, Kumar A (2018) A secure and high-capacity data-hiding method using compression, encryption and optimized pixel value differencing. IEEE Access 6:51130\u201351139","journal-title":"IEEE Access"},{"key":"391_CR18","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","volume":"32","author":"M Lema","year":"1984","unstructured":"Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32:1148\u20131157","journal-title":"IEEE Trans Commun"},{"key":"391_CR19","doi-asserted-by":"publisher","first-page":"26984","DOI":"10.1109\/ACCESS.2020.2966234","volume":"8","author":"G Su","year":"2020","unstructured":"Su G, Chang C, Lin C (2020) A high capacity reversible data hiding in encrypted AMBTC-compressed images. IEEE Access 8:26984\u201327000","journal-title":"IEEE Access"},{"key":"391_CR20","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.3390\/sym11101236","volume":"11","author":"J Lin","year":"2019","unstructured":"Lin J, Lin C, Chang C (2019) Reversible steganographic scheme for AMBTC-compressed image based on (7,4) hamming code. Symmetry 11:1236","journal-title":"Symmetry"},{"key":"391_CR21","doi-asserted-by":"publisher","first-page":"13105","DOI":"10.1109\/ACCESS.2020.2963891","volume":"8","author":"W Zheng","year":"2020","unstructured":"Zheng W, Chang C, Weng S (2020) A novel adjustable rdh method for ambtc-compressed codes using one-to-many map. IEEE Access 8:13105\u201313118","journal-title":"IEEE Access"},{"key":"391_CR22","doi-asserted-by":"publisher","first-page":"149515","DOI":"10.1109\/ACCESS.2019.2944833","volume":"7","author":"C Chen","year":"2019","unstructured":"Chen C, Chang C, Lin C, Su G (2019) TSIA: a novel image authentication scheme for AMBTC-based compressed images using turtle shell based reference matrix. IEEE Access 7:149515\u2013149526","journal-title":"IEEE Access"},{"key":"391_CR23","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s11045-017-0530-8","volume":"29","author":"A Malik","year":"2018","unstructured":"Malik A, Sikka G, Verma H (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidimension Syst Signal Process 29:1801\u20131818","journal-title":"Multidimension Syst Signal Process"},{"key":"391_CR24","doi-asserted-by":"publisher","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","volume":"74","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimedia Tools Appl 74:9117\u20139139","journal-title":"Multimedia Tools Appl"},{"key":"391_CR25","first-page":"148","volume":"16","author":"A Malik","year":"2019","unstructured":"Malik A, Sikka G, Verma H (2019) A high capacity data hiding scheme using modified AMBTC compression technique. Int Arab J Inf Technol 16:148\u2013155","journal-title":"Int Arab J Inf Technol"},{"key":"391_CR26","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/sym10020036","volume":"10","author":"W Hong","year":"2018","unstructured":"Hong W (2018) Efficient data hiding based on block truncation coding using pixel pair matching technique. Symmetry 10:36","journal-title":"Symmetry"},{"key":"391_CR27","first-page":"94","volume":"47","author":"R Kumar","year":"2019","unstructured":"Kumar R, Kim D, Jung K (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inf Secur Appl 47:94\u2013103","journal-title":"J Inf Secur Appl"},{"key":"391_CR28","doi-asserted-by":"publisher","first-page":"1314","DOI":"10.3390\/sym11101314","volume":"11","author":"C Chang","year":"2019","unstructured":"Chang C, Chang X, Horng J (2019) Hybrid data hiding method for strict AMBTC format images with high-fidelity. Symmetry 11:1314","journal-title":"Symmetry"},{"key":"391_CR29","unstructured":"Osirix Database. https:\/\/www.osirix-viewer.com\/support\/knowledge-base\/"},{"key":"391_CR30","first-page":"1","volume":"1","author":"Y Chen","year":"2017","unstructured":"Chen Y, Chi K, Hua K (2017) Design of image barcodes for future mobile advertising. EURASIP J Image Video Process 1:1\u201312","journal-title":"EURASIP J Image Video Process"},{"key":"391_CR31","doi-asserted-by":"crossref","unstructured":"Chen Y, Chen W (2018) High-quality blind watermarking in halftones using random toggle approach. Multimedia Tools Appl 77:8019\u20138041","DOI":"10.1007\/s11042-017-4697-7"},{"key":"391_CR32","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.3390\/s19091974","volume":"19","author":"Y Lin","year":"2019","unstructured":"Lin Y, Hsia C, Chen B, Chen Y (2019) Visual IoT security: data hiding in AMBTC images using block-wise embedding strategy. Sensors 19:1974","journal-title":"Sensors"},{"key":"391_CR33","doi-asserted-by":"publisher","first-page":"38337","DOI":"10.1109\/ACCESS.2019.2906500","volume":"7","author":"H Wang","year":"2019","unstructured":"Wang H, Lin H, Gao X, Cheng W, Chen Y (2019) Reversible AMBTC-based data hiding with security improvement by chaotic encryption. IEEE Access 7:38337\u201338347","journal-title":"IEEE Access"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00391-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00391-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00391-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:32:44Z","timestamp":1686331964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00391-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["391"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00391-0","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,8]]},"assertion":[{"value":"9 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}