{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:49:31Z","timestamp":1729640971338,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/icaci.2018.8377566","type":"proceedings-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T23:04:38Z","timestamp":1528758278000},"page":"813-818","source":"Crossref","is-referenced-by-count":3,"title":["Image reversible visual transformation based on MSB replacement and histogram bin mapping"],"prefix":"10.1109","author":[{"given":"Hao-Tian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Shaohua","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Jean-Luc","family":"Dugelay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.06.010"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2346989"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2514110"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2549458"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/76.735380"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.12.006"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.08.021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2006.140"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-540-74124-4_13","article-title":"A High-Capacity Data Hiding Method for Polygonal Meshes","volume":"4437","author":"wu","year":"2006","journal-title":"Proc Workshop on Information Hiding"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.903553"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2008.4665183"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.884895"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/38.946629"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2187516"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123129"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2359368"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2395724"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2569497"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2281422"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.06.018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2017.3051512"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2016.7868593"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473815"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2326954"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1109\/TCSVT.2013.2283431","article-title":"A new secure image transmission technique via secret-fragment-visible mosaic images by nearly reversible color transformations","volume":"24","author":"lee","year":"2014","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.07.006"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1109\/TIFS.2011.2135853","article-title":"Secret-fragment-visible mosaic image-A new computer art and its application to information hiding","volume":"6","author":"lai","year":"2011","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2014.7026115"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2009.2022453"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2009252"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.05.034"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","article-title":"Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection","volume":"20","author":"li","year":"2011","journal-title":"IEEE Trans Image Process"}],"event":{"name":"2018 Tenth International Conference on Advanced Computational Intelligence (ICACI )","start":{"date-parts":[[2018,3,29]]},"location":"Xiamen","end":{"date-parts":[[2018,3,31]]}},"container-title":["2018 Tenth International Conference on Advanced Computational Intelligence (ICACI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8370614\/8377463\/08377566.pdf?arnumber=8377566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T09:33:23Z","timestamp":1571477603000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8377566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icaci.2018.8377566","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}