{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:53:07Z","timestamp":1774579987172,"version":"3.50.1"},"reference-count":50,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602167"],"award-info":[{"award-number":["61602167"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370225"],"award-info":[{"award-number":["61370225"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502160"],"award-info":[{"award-number":["61502160"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572182"],"award-info":[{"award-number":["61572182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017JJ3037"],"award-info":[{"award-number":["2017JJ3037"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1016\/j.dsp.2018.06.014","type":"journal-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T12:39:20Z","timestamp":1533127160000},"page":"173-185","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching"],"prefix":"10.1016","volume":"81","author":[{"given":"Jiangjin","family":"Yin","sequence":"first","affiliation":[]},{"given":"Bo","family":"Ou","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Peng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.dsp.2018.06.014_br0010","series-title":"First International Conference on Emerging Trends in Engineering and Technology","first-page":"77","article-title":"Image encryption by novel cryptosystem using matrix transformation","author":"Acharya","year":"2008"},{"issue":"19","key":"10.1016\/j.dsp.2018.06.014_br0020","doi-asserted-by":"crossref","first-page":"4331","DOI":"10.1016\/j.optcom.2011.05.028","article-title":"A robust and secure chaotic standard map based pseudorandom permutation\u2013substitution scheme for image encryption","volume":"284","author":"Patidar","year":"2011","journal-title":"Opt. Commun."},{"issue":"2","key":"10.1016\/j.dsp.2018.06.014_br0030","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1007\/s11071-014-1533-8","article-title":"Cryptanalyzing image encryption using chaotic logistic map","volume":"78","author":"Li","year":"2014","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"10.1016\/j.dsp.2018.06.014_br0040","doi-asserted-by":"crossref","first-page":"3235","DOI":"10.1007\/s11042-016-3710-x","article-title":"A selective encryption scheme for protecting H. 264\/AVC video in multimedia social network","volume":"76","author":"Peng","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.dsp.2018.06.014_br0050","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.dsp.2016.08.011","article-title":"An efficient encryption-then-compression technique for encrypted images using SVD","volume":"60","author":"Kumar","year":"2017","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.dsp.2018.06.014_br0060","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.dsp.2013.11.004","article-title":"Efficient neural chaotic generator for image encryption","volume":"25","author":"Kassem","year":"2014","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.dsp.2018.06.014_br0070","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.sigpro.2017.07.034","article-title":"Exploiting self-adaptive permutation\u2013diffusion and DNA random encoding for secure and efficient image encryption","volume":"142","author":"Chen","year":"2018","journal-title":"Signal Process."},{"issue":"6","key":"10.1016\/j.dsp.2018.06.014_br0080","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TIP.2003.810588","article-title":"Data hiding in image and video. I. Fundamental issues and solutions","volume":"12","author":"Wu","year":"2003","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"10.1016\/j.dsp.2018.06.014_br0090","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognit."},{"issue":"1","key":"10.1016\/j.dsp.2018.06.014_br0100","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-1","article-title":"Universal distortion function for steganography in an arbitrary domain","volume":"2014","author":"Holub","year":"2014","journal-title":"EURASIP J. Inf. Secur."},{"key":"10.1016\/j.dsp.2018.06.014_br0110","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.dsp.2014.12.005","article-title":"A new robust lossless data hiding scheme and its application to color medical images","volume":"38","author":"Thabit","year":"2015","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.dsp.2018.06.014_br0120","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.dsp.2015.11.007","article-title":"A novel data-hiding and compression scheme based on block classification of SMVQ indices","volume":"51","author":"Chang","year":"2016","journal-title":"Digit. Signal Process."},{"key":"10.1016\/j.dsp.2018.06.014_br0130","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.dsp.2016.02.006","article-title":"Reversible data hiding in medical images with enhanced contrast in texture area","volume":"52","author":"Yang","year":"2016","journal-title":"Digit. Signal Process."},{"issue":"11","key":"10.1016\/j.dsp.2018.06.014_br0140","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","article-title":"Efficient steganographic embedding by exploiting modification direction","volume":"10","author":"Zhang","year":"2006","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.dsp.2018.06.014_br0150","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","article-title":"Data embedding in digital images using critical functions","volume":"58","author":"Liao","year":"2017","journal-title":"Signal Process. Image Commun."},{"issue":"20","key":"10.1016\/j.dsp.2018.06.014_br0160","doi-asserted-by":"crossref","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","article-title":"Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform","volume":"76","author":"Liao","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.dsp.2018.06.014_br0170","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","article-title":"Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing","volume":"53","author":"Parah","year":"2016","journal-title":"Digit. Signal Process."},{"issue":"5","key":"10.1016\/j.dsp.2018.06.014_br0180","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","article-title":"Robust histogram shape-based method for image watermarking","volume":"25","author":"Zong","year":"2015","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.dsp.2018.06.014_br0190","series-title":"Signal Processing and Communications Applications Conference","first-page":"1","article-title":"Colour image watermarking based on wavelet and QR decomposition","author":"Rasti","year":"2017"},{"issue":"3","key":"10.1016\/j.dsp.2018.06.014_br0200","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1109\/TIFS.2011.2135853","article-title":"Secret-fragment-visible mosaic image \u2013 a new computer art and its application to information hiding","volume":"6","author":"Lai","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10.1016\/j.dsp.2018.06.014_br0210","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/38.946629","article-title":"Color transfer between images","volume":"21","author":"Reinhard","year":"2001","journal-title":"IEEE Comput. Graph. Appl."},{"issue":"1","key":"10.1016\/j.dsp.2018.06.014_br0220","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.cag.2010.11.003","article-title":"Progressive color transfer for images of arbitrary dynamic range","volume":"35","author":"Pouli","year":"2011","journal-title":"Comput. Graph."},{"issue":"1","key":"10.1016\/j.dsp.2018.06.014_br0230","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1111\/cgf.12008","article-title":"Content-based colour transfer","volume":"32","author":"Wu","year":"2013","journal-title":"Comput. Graph. Forum"},{"issue":"2","key":"10.1016\/j.dsp.2018.06.014_br0240","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s11766-017-3447-y","article-title":"Fast color transfer from multiple images","volume":"32","author":"Khan","year":"2017","journal-title":"Appl. Math. J. Chin. Univ. Ser. A"},{"issue":"4","key":"10.1016\/j.dsp.2018.06.014_br0250","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1109\/TCSVT.2013.2283431","article-title":"A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations","volume":"24","author":"Lee","year":"2014","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.dsp.2018.06.014_br0260","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1016\/j.jvcir.2016.06.018","article-title":"Image camouflage by reversible image transformation","volume":"40","author":"Hou","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"8","key":"10.1016\/j.dsp.2018.06.014_br0270","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.dsp.2018.06.014_br0280","series-title":"European Signal Processing Conference","first-page":"1688","article-title":"Improved rhombus interpolation for reversible watermarking by difference expansion","author":"Dragoi","year":"2012"},{"issue":"3","key":"10.1016\/j.dsp.2018.06.014_br0290","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","article-title":"A novel difference expansion transform for reversible data embedding","volume":"3","author":"Kim","year":"2008","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"10.1016\/j.dsp.2018.06.014_br0300","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2006.884895","article-title":"Very fast watermarking by reversible contrast mapping","volume":"14","author":"Coltuc","year":"2007","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.dsp.2018.06.014_br0310","series-title":"IEEE International Conference on Acoustics Speech and Signal Processing","first-page":"2382","article-title":"Reversible image watermarking based on a generalized integer transform","author":"Chen","year":"2010"},{"issue":"7","key":"10.1016\/j.dsp.2018.06.014_br0320","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"12","key":"10.1016\/j.dsp.2018.06.014_br0330","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","article-title":"Pairwise prediction-error expansion for efficient reversible data hiding","volume":"22","author":"Ou","year":"2013","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"10.1016\/j.dsp.2018.06.014_br0340","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","article-title":"Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection","volume":"20","author":"Li","year":"2011","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"10.1016\/j.dsp.2018.06.014_br0350","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.dsp.2018.06.014_br0360","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.neucom.2016.11.017","article-title":"High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion","volume":"226","author":"Ou","year":"2017","journal-title":"Neurocomputing"},{"issue":"3","key":"10.1016\/j.dsp.2018.06.014_br0370","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.dsp.2018.06.014_br0380","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1016\/j.sigpro.2014.10.012","article-title":"Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding","volume":"108","author":"Ou","year":"2015","journal-title":"Signal Process."},{"key":"10.1016\/j.dsp.2018.06.014_br0390","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.image.2017.05.012","article-title":"A reversible watermarking for authenticating 2D vector graphics based on bionic spider web","volume":"57","author":"Lin","year":"2017","journal-title":"Signal Process. Image Commun."},{"issue":"9","key":"10.1016\/j.dsp.2018.06.014_br0400","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.dsp.2018.06.014_br0410","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.jvcir.2016.03.011","article-title":"Improved PVO-based reversible data hiding: a new implementation based on multiple histograms modification","volume":"38","author":"Ou","year":"2016","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"7","key":"10.1016\/j.dsp.2018.06.014_br0420","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.image.2014.05.003","article-title":"Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion","volume":"29","author":"Ou","year":"2014","journal-title":"Signal Process. Image Commun."},{"issue":"1","key":"10.1016\/j.dsp.2018.06.014_br0430","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1023\/B:JMIV.0000011325.36760.1e","article-title":"An algorithm for total variation minimization and applications","volume":"20","author":"Chambolle","year":"2004","journal-title":"J. Math. Imaging Vis."},{"issue":"12","key":"10.1016\/j.dsp.2018.06.014_br0440","doi-asserted-by":"crossref","first-page":"4954","DOI":"10.1109\/TIP.2014.2360133","article-title":"A fast adaptive parameter estimation for total variation image restoration","volume":"23","author":"He","year":"2014","journal-title":"IEEE Trans. Image Process."},{"issue":"1\u20134","key":"10.1016\/j.dsp.2018.06.014_br0450","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/0167-2789(92)90242-F","article-title":"Nonlinear total variation based noise removal algorithms","volume":"60","author":"Rudin","year":"1992","journal-title":"Phys. D: Nonlinear Phenom."},{"issue":"11","key":"10.1016\/j.dsp.2018.06.014_br0460","doi-asserted-by":"crossref","first-page":"2227","DOI":"10.1109\/TIP.2008.2004615","article-title":"Fast template matching based on normalized cross correlation with adaptive multilevel winner update","volume":"17","author":"Wei","year":"2008","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.dsp.2018.06.014_br0470","series-title":"IEEE Student Conference on Research and Development","first-page":"100","article-title":"Template matching using sum of squared difference and normalized cross correlation","author":"Hisham","year":"2015"},{"key":"10.1016\/j.dsp.2018.06.014_br0480","series-title":"International Conference on Image Processing, vol. 1","first-page":"I-269","article-title":"A sufficient condition based on the Cauchy\u2013Schwarz inequality for efficient template matching","author":"Di Stefano","year":"2003"},{"key":"10.1016\/j.dsp.2018.06.014_br0490","author":"I. Wikimedia Foundation"},{"issue":"4","key":"10.1016\/j.dsp.2018.06.014_br0500","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: from error visibility to structural similarity","volume":"13","author":"Wang","year":"2004","journal-title":"IEEE Trans. Image Process."}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200418305190?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200418305190?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T06:17:12Z","timestamp":1760941032000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1051200418305190"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":50,"alternative-id":["S1051200418305190"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2018.06.014","relation":{},"ISSN":["1051-2004"],"issn-type":[{"value":"1051-2004","type":"print"}],"subject":[],"published":{"date-parts":[[2018,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching","name":"articletitle","label":"Article Title"},{"value":"Digital Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dsp.2018.06.014","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}