{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:31:37Z","timestamp":1740115897374,"version":"3.37.3"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,24]]},"DOI":"10.1109\/iccvit63928.2024.10872556","type":"proceedings-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T18:33:35Z","timestamp":1739471615000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["High-Capacity Reversible Data Hiding Algorithm for Medical Images"],"prefix":"10.1109","author":[{"given":"Zhaojun","family":"Yu","sequence":"first","affiliation":[{"name":"Urumqi Campus of Engineering University of PAP,Urumqi,China"}]},{"given":"Haining","family":"Luo","sequence":"additional","affiliation":[{"name":"Engineering University of PAP,School of Cryptography Engineering,Xi&#x2019;an,China"}]},{"given":"Tingting","family":"Su","sequence":"additional","affiliation":[{"name":"Engineering University of PAP,School of Cryptography Engineering,Xi&#x2019;an,China"}]},{"given":"Yan","family":"Ke","sequence":"additional","affiliation":[{"name":"Engineering University of PAP and Research Institute of Hi-Tech Key Laboratory of Counter-Terrorism Command &#x0026; Information Engineering, Ministry of Education,School of Cryptography Engineering,Xi&#x2019;an,China"}]},{"given":"Yangjie","family":"Zhong","sequence":"additional","affiliation":[{"name":"Engineering University of PAP,School of Cryptography Engineering,Xi&#x2019;an,China"}]},{"given":"Haofeng","family":"Li","sequence":"additional","affiliation":[{"name":"Engineering University of PAP,School of Cryptography Engineering,Xi&#x2019;an,China"}]}],"member":"263","reference":[{"volume-title":"Method and apparatus for embedding authentication information within digital data: US, Patent","year":"1997","author":"Barton","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.465317"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2004.840686"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.863053"},{"issue":"1","key":"ref5","first-page":"25","article-title":"Research progress on reversible information hiding in image null domain[J]","volume":"27","author":"WU","year":"2022","journal-title":"Chinese Journal of Image Graphics"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2003.815962"},{"journal-title":"Reversible Watermarking using Difference Expansion Technique[J]","year":"2019","author":"Swathi","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/bigdataservice52369.2021.00033"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.03.022"},{"issue":"003","key":"ref10","first-page":"020","article-title":"Reversible Data Hiding Based on Greedy Pairing Prediction-Error Expansion[J]","author":"Lin","year":"2022","journal-title":"Journal of Electronic Science and Technology: English Edition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.11.002"},{"key":"ref12","article-title":"A PVO Reversible Data Hiding Algorithm Based on Sequence Dynamic Selection [J]","author":"Yongjun","year":"2019","journal-title":"Journal of Zhengzhou University (Natural Science Edition)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2020.116084"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42058-1_48"},{"issue":"6","key":"ref15","first-page":"4","article-title":"Texture feature extraction based on grey scale covariance matrix[J]","author":"Chengcheng","year":"2010","journal-title":"Computer System Applications"}],"event":{"name":"2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT)","start":{"date-parts":[[2024,11,24]]},"location":"Huaibei, China","end":{"date-parts":[[2024,11,27]]}},"container-title":["2024 2nd International Conference on Computer, Vision and Intelligent Technology (ICCVIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10871946\/10872409\/10872556.pdf?arnumber=10872556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T19:52:21Z","timestamp":1740081141000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10872556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,24]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccvit63928.2024.10872556","relation":{},"subject":[],"published":{"date-parts":[[2024,11,24]]}}}