{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T14:19:01Z","timestamp":1771510741938,"version":"3.50.1"},"reference-count":16,"publisher":"World Scientific Pub Co Pte Lt","issue":"03","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2010,5]]},"abstract":"<jats:p>The stego-images generated by many existing hiding techniques are not economic in size, and hence need compression. Unfortunately, compression usually destroys the secret content hidden inside. To solve this dilemma, some hiding methods based on compression code (rather than the image itself) are reported. This paper proposes a high-capacity and high-hiding-ratio \"reversible\" steganography method based on JPEG-compression code. In the proposed method, the JPEG compression code of an image is used as the cover media. An 8\u00d78 hiding-capacity table is firstly evaluated, which is then utilized to modify the quantization table attached to the given JPEG code. The two quantization tables (modified and original) together can map the DCT coefficients of each block to some larger DCT coefficients, with secret data hidden inside these larger DCT coefficients. In the decoding process, after lossless extraction of the hidden secret data, the proposed method can also recover the original JPEG-compression code. Experimental results show that our method outperforms other JPEG-based hiding methods (reversible or not) regarding both hiding-ratio and stego-image's quality.<\/jats:p>","DOI":"10.1142\/s0218001410007968","type":"journal-article","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T10:40:30Z","timestamp":1277808030000},"page":"433-456","source":"Crossref","is-referenced-by-count":14,"title":["REVERSIBLE JPEG-BASED HIDING METHOD WITH HIGH HIDING-RATIO"],"prefix":"10.1142","volume":"24","author":[{"given":"LEE SHU-TENG","family":"CHEN","sequence":"first","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Chiao Tung University, 1001 Ta Hsueh Rd., Hsinchu, Taiwan, 300, R.O.C."}]},{"given":"SIAN-JHENG","family":"LIN","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Chiao Tung University, 1001 Ta Hsueh Rd., Hsinchu, Taiwan, 300, R.O.C."}]},{"given":"JA-CHEN","family":"LIN","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Chiao Tung University, 1001 Ta Hsueh Rd., Hsinchu, Taiwan, 300, R.O.C."}]}],"member":"219","published-online":{"date-parts":[[2011,11,21]]},"reference":[{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00194-3"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.019"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001402001770"},{"key":"rf9","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001404003526"},{"key":"rf10","first-page":"929","volume":"87","author":"Iwata M.","journal-title":"IEICE Trans. Fund."},{"key":"rf11","first-page":"45","volume":"6","author":"Kessler G. C.","journal-title":"Forensic Sci. Commun."},{"key":"rf12","first-page":"1469","volume":"2","author":"Kobayashi H.","journal-title":"IEICE Trans. Inform. Syst."},{"key":"rf14","unstructured":"H.\u00a0Malik, R.\u00a0Chandramouli and K. P.\u00a0Subbalakshmi, Multimedia Forensics and Security, ed. C. T.\u00a0Li (Idea Group Publishing, 2008)\u00a0p. 257."},{"key":"rf15","volume-title":"JPEG Still Image Data Compression Standard","author":"Pennebaker W. B.","year":"1993"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203220"},{"key":"rf20","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(03)00221-8"},{"key":"rf21","doi-asserted-by":"crossref","first-page":"127","DOI":"10.15388\/Informatica.2004.050","volume":"15","author":"Tseng H. W.","journal-title":"Informatica"},{"key":"rf23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.07.015"},{"key":"rf24","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.04.059"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20059022"}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001410007968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T06:46:58Z","timestamp":1591426018000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218001410007968"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":16,"journal-issue":{"issue":"03","published-online":{"date-parts":[[2011,11,21]]},"published-print":{"date-parts":[[2010,5]]}},"alternative-id":["10.1142\/S0218001410007968"],"URL":"https:\/\/doi.org\/10.1142\/s0218001410007968","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"value":"0218-0014","type":"print"},{"value":"1793-6381","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,5]]}}}