{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:32:06Z","timestamp":1763641926889,"version":"3.40.5"},"reference-count":26,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1016\/j.sigpro.2015.05.020","type":"journal-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T04:13:08Z","timestamp":1434082388000},"page":"258-269","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["High capacity reversible data hiding and content protection for radiographic images"],"prefix":"10.1016","volume":"117","author":[{"given":"Davide","family":"Cavagnino","sequence":"first","affiliation":[]},{"given":"Maurizio","family":"Lucenteforte","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2709-7864","authenticated-orcid":false,"given":"Marco","family":"Grangetto","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2008","series-title":"Digital Watermarking and Steganography","author":"Cox","key":"10.1016\/j.sigpro.2015.05.020_bib1"},{"issue":"3","key":"10.1016\/j.sigpro.2015.05.020_bib2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","article-title":"Hide and seek","volume":"1","author":"Provos","year":"2003","journal-title":"IEEE Secur. Priv."},{"issue":"6","key":"10.1016\/j.sigpro.2015.05.020_bib3","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","article-title":"Reversible image hiding scheme using predictive coding and histogram shifting","volume":"89","author":"Tsai","year":"2009","journal-title":"Signal Process."},{"issue":"3","key":"10.1016\/j.sigpro.2015.05.020_bib4","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","article-title":"A dct-domain system for robust image watermarking","volume":"66","author":"Barni","year":"1998","journal-title":"Signal Process."},{"issue":"1","key":"10.1016\/j.sigpro.2015.05.020_bib5","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.sigpro.2003.07.012","article-title":"A color image watermarking scheme based on color quantization","volume":"84","author":"Tsai","year":"2004","journal-title":"Signal Process."},{"issue":"9","key":"10.1016\/j.sigpro.2015.05.020_bib6","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","article-title":"An improved svd-based watermarking scheme for protecting rightful ownership","volume":"88","author":"Mohammad","year":"2008","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2015.05.020_bib7","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","article-title":"A recent survey of reversible watermarking techniques","volume":"279","author":"Khan","year":"2014","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.sigpro.2015.05.020_bib8","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1016\/j.sigpro.2010.07.019","article-title":"Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities","volume":"91","author":"Bravo-Solorio","year":"2011","journal-title":"Signal Process."},{"issue":"8","key":"10.1016\/j.sigpro.2015.05.020_bib9","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2015.05.020_bib10","doi-asserted-by":"crossref","unstructured":"A.M. Alattar, Reversible watermark using difference expansion of triplets, in: Proceedings of 2003 International Conference on Image Processing, ICIP 2003, vol. 1, 2003, pp. 501\u2013504.","DOI":"10.1109\/ICIP.2003.1247008"},{"key":"10.1016\/j.sigpro.2015.05.020_bib11","doi-asserted-by":"crossref","unstructured":"A.M. Alattar, Reversible watermark using difference expansion of quads, in: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP \u201904), vol. 3, 2004, pp. 377\u2013380.","DOI":"10.1109\/ICASSP.2004.1326560"},{"issue":"8","key":"10.1016\/j.sigpro.2015.05.020_bib12","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","article-title":"Reversible watermark using the difference expansion of a generalized integer transform","volume":"13","author":"Alattar","year":"2004","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"10.1016\/j.sigpro.2015.05.020_bib13","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2015.05.020_bib14","article-title":"A high capacity reversible data hiding scheme for radiographic images","volume":"4","author":"Balossino","year":"2013","journal-title":"Commun. Appl. Ind. Math."},{"key":"10.1016\/j.sigpro.2015.05.020_bib15","unstructured":"M. Fujiyoshi, H. Kiya, Generalized histogram shifting-based reversible data hiding with an adaptive binary-to-q-ary converter, in: Signal Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific, 2012, pp. 1\u20134."},{"issue":"7","key":"10.1016\/j.sigpro.2015.05.020_bib16","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"10.1016\/j.sigpro.2015.05.020_bib17","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/TCSVT.2008.918761","article-title":"Robust lossless image data hiding designed for semi-fragile image authentication","volume":"18","author":"Ni","year":"2008","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"10","key":"10.1016\/j.sigpro.2015.05.020_bib18","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1016\/j.sigpro.2009.04.015","article-title":"Reversibility improved lossless data hiding","volume":"89","author":"Gao","year":"2009","journal-title":"Signal Process."},{"issue":"7","key":"10.1016\/j.sigpro.2015.05.020_bib19","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","article-title":"A novel reversible data hiding scheme based on two-dimensional difference-histogram modification","volume":"8","author":"Li","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"10.1016\/j.sigpro.2015.05.020_bib20","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","article-title":"Watermarking techniques used in medical images","volume":"27","author":"Mousavi","year":"2014","journal-title":"J. Digit. Imaging"},{"issue":"1","key":"10.1016\/j.sigpro.2015.05.020_bib21","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jss.2010.08.055","article-title":"High capacity data hiding schemes for medical images based on difference expansion","volume":"84","author":"Al-Qershi","year":"2011","journal-title":"J. Syst. Softw."},{"issue":"1","key":"10.1016\/j.sigpro.2015.05.020_bib22","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10278-007-9012-0","article-title":"Tamper detection and restoring system for medical images using wavelet-based reversible data embedding","volume":"21","author":"Chiang","year":"2008","journal-title":"J. Digit. Imaging"},{"issue":"3","key":"10.1016\/j.sigpro.2015.05.020_bib23","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","article-title":"Security protection of dicom medical images using dual-layer reversible watermarking with tamper detection capability","volume":"24","author":"Tan","year":"2011","journal-title":"J. Digit. Imaging"},{"issue":"3","key":"10.1016\/j.sigpro.2015.05.020_bib24","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1016\/j.cmpb.2013.05.027","article-title":"Effective management of medical information through roi-lossless fragile image watermarking technique","volume":"111","author":"Das","year":"2013","journal-title":"Comput. Methods Progr. Biomed."},{"issue":"23","key":"10.1016\/j.sigpro.2015.05.020_bib25","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1088\/0031-9155\/47\/23\/201","article-title":"The physics of computed radiography","volume":"47","author":"Rowlands","year":"2002","journal-title":"Phys. Med. Biol."},{"key":"10.1016\/j.sigpro.2015.05.020_bib26","unstructured":"Imebra C++ DICOM SDK library, \u3008http:\/\/imebra.com\u3009"}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016516841500198X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016516841500198X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T18:29:23Z","timestamp":1537554563000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016516841500198X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":26,"alternative-id":["S016516841500198X"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2015.05.020","relation":{},"ISSN":["0165-1684"],"issn-type":[{"type":"print","value":"0165-1684"}],"subject":[],"published":{"date-parts":[[2015,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"High capacity reversible data hiding and content protection for radiographic images","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2015.05.020","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}