{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T21:47:22Z","timestamp":1776289642380,"version":"3.50.1"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T00:00:00Z","timestamp":1775174400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003141","name":"CONAHCYT","doi-asserted-by":"publisher","award":["CVU 923616"],"award-info":[{"award-number":["CVU 923616"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003141","name":"CONAHCYT","doi-asserted-by":"publisher","award":["2017-01-7092"],"award-info":[{"award-number":["2017-01-7092"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.jisa.2026.104463","type":"journal-article","created":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T16:14:39Z","timestamp":1776269679000},"page":"104463","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Reversible image authentication with efficient block-wise tamper localization"],"prefix":"10.1016","volume":"100","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3141-2430","authenticated-orcid":false,"given":"Alejandro","family":"Pe\u00f1uelas-Angulo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9665-2203","authenticated-orcid":false,"given":"Claudia","family":"Feregrino-Uribe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9852-8422","authenticated-orcid":false,"given":"Ren\u00e9","family":"Cumplido","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3523-0809","authenticated-orcid":false,"given":"Eli\u00fa","family":"Moreno-Ram\u00edrez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2026.104463_bib0001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","article-title":"Methods for image authentication: a survey","volume":"39","author":"Haouzia","year":"2008","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2026.104463_bib0002","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.sigpro.2013.11.028","article-title":"A novel reversible image authentication scheme for digital images","volume":"98","author":"Lo","year":"2014","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0003","first-page":"395","article-title":"A high-quality reversible image authentication scheme based on adaptive pee for digital images","volume":"10","author":"Nguyen","year":"2016","journal-title":"KSII Trans Internet Inf Syst"},{"key":"10.1016\/j.jisa.2026.104463_bib0004","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1007\/s12559-016-9408-6","article-title":"Improved reversible image authentication scheme","volume":"8","author":"Yin","year":"2016","journal-title":"Cognitive Comput"},{"key":"10.1016\/j.jisa.2026.104463_bib0005","first-page":"111","article-title":"An efficient reversible image authentication method using improved pvo and lsb substitution techniques","volume":"vol. 58","author":"Hong","year":"2017","journal-title":"Signal Process: Image Commun"},{"key":"10.1016\/j.jisa.2026.104463_bib0006","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s11554-019-00904-8","article-title":"A real-time reversible image authentication method using uniform embedding strategy","volume":"17","author":"Yao","year":"2020","journal-title":"J Real-Time Image Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0007","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","article-title":"Reversible data hiding: advances in the past two decades","volume":"4","author":"Shi","year":"2016","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2026.104463_bib0008","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2026.104463_bib0009","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2026.104463_bib0010","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0011","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2026.104463_bib0012","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","article-title":"Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection","volume":"20","author":"Li","year":"2011","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0013","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","article-title":"Local-prediction-based difference expansion reversible watermarking","volume":"23","author":"Dragoi","year":"2014","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0014","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","article-title":"Pairwise prediction-error expansion for efficient reversible data hiding","volume":"22","author":"Ou","year":"2013","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0015","doi-asserted-by":"crossref","first-page":"2420","DOI":"10.1109\/TIP.2016.2549458","article-title":"Adaptive pairing reversible watermarking","volume":"25","author":"Dragoi","year":"2016","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0016","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.sigpro.2019.01.008","article-title":"Reversible data hiding based on pairwise embedding and optimal expansion path","volume":"vol. 158","author":"Xiao","year":"2019","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0017","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104463_bib0018","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1007\/s11554-018-0845-1","article-title":"Real-time reversible data hiding based on multiple histogram modification","volume":"16","author":"Zhang","year":"2019","journal-title":"J Real-Time Image Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0019","doi-asserted-by":"crossref","first-page":"2329","DOI":"10.1109\/TCSVT.2019.2921812","article-title":"High capacity reversible data hiding based on multiple histograms modification","volume":"30","author":"Ou","year":"2020","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2026.104463_bib0020","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","article-title":"High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion","volume":"vol. 93","author":"Li","year":"2013","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0021","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.dsp.2013.11.002","article-title":"Improved pvo-based reversible data hiding","volume":"25","author":"Peng","year":"2014","journal-title":"Digital Signal Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0022","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ins.2015.03.022","article-title":"A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition","volume":"310","author":"Wang","year":"2015","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2026.104463_bib0023","doi-asserted-by":"crossref","first-page":"34570","DOI":"10.1109\/ACCESS.2019.2904174","article-title":"Improved k-pass pixel value ordering based data hiding","volume":"7","author":"Weng","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2026.104463_bib0024","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.jvcir.2016.03.011","article-title":"Improved pvo-based reversible data hiding: a new implementation based on multiple histograms modification","volume":"38","author":"Ou","year":"2016","journal-title":"J Visual Commun Image Represent"},{"key":"10.1016\/j.jisa.2026.104463_bib0025","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.jvcir.2016.05.005","article-title":"High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion","volume":"39","author":"Ou","year":"2016","journal-title":"J Visual Commun Image Represent"},{"key":"10.1016\/j.jisa.2026.104463_bib0026","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1016\/j.ins.2018.04.088","article-title":"Reversible data hiding using multi-pass pixel-value-ordering and pairwise prediction-error expansion","volume":"467","author":"He","year":"2018","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2026.104463_bib0027","series-title":"ICASSP 2019 - 2019 IEEE Int. conf. acoustics, speech signal process. (ICASSP)","first-page":"2652","article-title":"Prediction-error-ordering for high-fidelity reversible data hiding","author":"Dragoi","year":"2019"},{"key":"10.1016\/j.jisa.2026.104463_bib0028","doi-asserted-by":"crossref","first-page":"2306","DOI":"10.1109\/TIFS.2019.2963766","article-title":"Location-based pvo and adaptive pairwise modification for efficient reversible data hiding","volume":"15","author":"Zhang","year":"2020","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2026.104463_bib0029","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","article-title":"Reversible image hiding scheme using predictive coding and histogram shifting","volume":"vol. 89","author":"Tsai","year":"2009","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0030","first-page":"236","article-title":"Image authentication scheme based on reversible fragile watermarking with two images","volume":"40","author":"Peng","year":"2018","journal-title":"J Inf Secur Appl"},{"key":"10.1016\/j.jisa.2026.104463_bib0031","doi-asserted-by":"crossref","first-page":"64441","DOI":"10.1007\/s11042-024-18165-4","article-title":"Reversible image authentication using a central folding strategy with two images","volume":"83","author":"Pham","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2026.104463_bib0032","doi-asserted-by":"crossref","first-page":"2799","DOI":"10.1007\/s11760-023-02950-z","article-title":"A reversible watermarking for image content authentication based on wavelet transform. signal","volume":"18","author":"Li","year":"2024","journal-title":"Image Video Process"},{"key":"10.1016\/j.jisa.2026.104463_bib0033","series-title":"Contemporary mathematics","article-title":"Reversible authentication watermarking based on improved 2d histogram and adaptive difference expansion","author":"Zhang","year":"2025"},{"key":"10.1016\/j.jisa.2026.104463_bib0034","doi-asserted-by":"crossref","first-page":"24631","DOI":"10.1007\/s11042-021-10853-9","article-title":"Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication","volume":"80","author":"Shi","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2026.104463_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2025.110072","article-title":"Secure and reversible fragile watermarking for accurate authentication and tamper localization in medical images","volume":"123","author":"Bouarroudj","year":"2025","journal-title":"Comput Electr Eng"},{"key":"10.1016\/j.jisa.2026.104463_bib0036","doi-asserted-by":"crossref","first-page":"5108","DOI":"10.1002\/cpe.5108","article-title":"Nsct domain-based secure multiple-watermarking technique through lightweight encryption for medical images","volume":"33","author":"Thakur","year":"2021","journal-title":"Concurr Comput: Pract Exper"},{"key":"10.1016\/j.jisa.2026.104463_bib0037","first-page":"262","article-title":"A reversible and secure patient information hiding system for iot driven e-health","volume":"45","author":"Kaw","year":"2019","journal-title":"Int J Inf Manage"},{"key":"10.1016\/j.jisa.2026.104463_bib0038","series-title":"Robust and secured reversible data hiding approach for medical image transmission over smart healthcare environment","first-page":"119","author":"Devi","year":"2023"},{"key":"10.1016\/j.jisa.2026.104463_bib0039","doi-asserted-by":"crossref","first-page":"5108","DOI":"10.1109\/TII.2020.3028612","article-title":"Dwfcat: dual watermarking framework for industrial image authentication and tamper localization","volume":"17","author":"Kamili","year":"2021","journal-title":"IEEE Trans Ind Inf"},{"key":"10.1016\/j.jisa.2026.104463_bib0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/7656877","article-title":"Antitamper image watermarking based on cellular network topology for iot-themed mobile forensics","volume":"2021","author":"Xie","year":"2021","journal-title":"Wireless Commun Mobile Comput"},{"key":"10.1016\/j.jisa.2026.104463_bib0041","doi-asserted-by":"crossref","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","article-title":"Multilevel reversible data hiding based on histogram modification of difference images","volume":"41","author":"Lin","year":"2008","journal-title":"Pattern Recognit"},{"key":"10.1016\/j.jisa.2026.104463_bib0042","series-title":"Proc. 2010 IEEE int. symp. circuits syst","first-page":"1137","article-title":"High capacity reversible data hiding using the histogram modification of block image","author":"Yoo","year":"2010"},{"key":"10.1016\/j.jisa.2026.104463_bib0043","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1016\/j.aeue.2011.01.014","article-title":"Reversible data hiding based on multilevel histogram modification and sequential recovery","volume":"65","author":"Zhao","year":"2011","journal-title":"AEU-Int J Electron Commun"},{"key":"10.1016\/j.jisa.2026.104463_bib0044","article-title":"An adaptive method for prevention of overflow in reversible data hiding schemes","volume":"230","author":"nuelas Angulo","year":"2023","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2026.104463_bib0045","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1016\/j.aeue.2016.05.003","article-title":"A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain","volume":"70","author":"Nguyen","year":"2016","journal-title":"AEU-Int J Electron Commun"},{"key":"10.1016\/j.jisa.2026.104463_bib0046","unstructured":"Sipi U.. The usc-sipi image database. 2016."},{"key":"10.1016\/j.jisa.2026.104463_bib0047","series-title":"Tech. Rep.","article-title":"Block-based image authentication algorithm using reversible watermarking","author":"Yeo","year":"2012"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000931?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212626000931?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T21:00:13Z","timestamp":1776286813000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212626000931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":47,"alternative-id":["S2214212626000931"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104463","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Reversible image authentication with efficient block-wise tamper localization","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2026.104463","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104463"}}