{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T11:36:58Z","timestamp":1768995418478,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National NSF of China","award":["61872095"],"award-info":[{"award-number":["61872095"]}]},{"name":"National NSF of China","award":["61571139"],"award-info":[{"award-number":["61571139"]}]},{"name":"National NSF of China","award":["61872128"],"award-info":[{"award-number":["61872128"]}]},{"name":"International Scientific and Technological Cooperation of Guangdong Province","award":["2019A050513012"],"award-info":[{"award-number":["2019A050513012"]}]},{"name":"Open Project Program of Shenzhen Key Laboratory of Media Security","award":["ML-2018-03"],"award-info":[{"award-number":["ML-2018-03"]}]},{"name":"Fujian Science Fund for Distinguished Young Scholars","award":["2020J06043"],"award-info":[{"award-number":["2020J06043"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tmm.2022.3198877","type":"journal-article","created":{"date-parts":[[2022,8,25]],"date-time":"2022-08-25T18:35:42Z","timestamp":1661452542000},"page":"5747-5762","source":"Crossref","is-referenced-by-count":26,"title":["General Framework to Reversible Data Hiding for JPEG Images With Multiple Two-Dimensional Histograms"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1037-7699","authenticated-orcid":false,"given":"Shaowei","family":"Weng","sequence":"first","affiliation":[{"name":"Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, Fujian, China"}]},{"given":"Ye","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou, Fujian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9151-3175","authenticated-orcid":false,"given":"Tiancong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, Fujian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9556-1788","authenticated-orcid":false,"given":"Mengyao","family":"Xiao","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8581-9554","authenticated-orcid":false,"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Beijing Jiaotong University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.03.083"},{"key":"ref35","article-title":"USC-SIPI image database","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1117\/12.465317"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.02.040"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.02.005"},{"key":"ref37","article-title":"Kodak lossless true color image database","year":"1999"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2035227"},{"key":"ref36","article-title":"Uncompressed colour image database","year":"2004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107476"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08109-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2985537"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3101424"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2019.2909080"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3027391"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3006494"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2797897"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2316154"},{"key":"ref18","first-page":"1420","article-title":"High capacity lossless data hiding in JPEG bitstream based on general VLC mapping","volume":"19","author":"du","year":"2022","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2958758"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.12.007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107647"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.2969463"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-017-0206-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16946-6_10"},{"key":"ref21","first-page":"945","article-title":"Reversible data hiding in JPEG images using ordered embedding","volume":"11","author":"qian","year":"2017","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2473235"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3044186"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.002"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2012.2229262"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2514110"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.891046"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"ni","year":"2006","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2281422"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2008.2001984"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6046\/10016790\/09861671.pdf?arnumber=9861671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T20:06:48Z","timestamp":1701115608000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9861671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/tmm.2022.3198877","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"value":"1520-9210","type":"print"},{"value":"1941-0077","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}