{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:32Z","timestamp":1750220192108,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011710","name":"Shaanxi Provincial Science and Technology Department","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011710","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3574067","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"592-600","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["High capacity reversible information hiding algorithm based on asymmetric prediction error histogram"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8442-4251","authenticated-orcid":false,"given":"Fang","family":"Ren","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4944-1811","authenticated-orcid":false,"given":"Wei","family":"Hou","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6730-7478","authenticated-orcid":false,"given":"Mingyu","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9292-665X","authenticated-orcid":false,"given":"Cong","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Xi'an University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"issue":"03","key":"e_1_3_2_1_1_1","first-page":"268","article-title":"A novel robust-reversible data hiding scheme based on histogram shifting[J].","volume":"51","author":"Yu S, LI J","year":"2018","unstructured":"Yu S, LI J. A novel robust-reversible data hiding scheme based on histogram shifting[J].Engineering Journal of Wuhan University. 2018,51(03):268-275+282.","journal-title":"Engineering Journal of Wuhan University"},{"key":"e_1_3_2_1_2_1","first-page":"3236","volume":"2019","author":"Kim S","unstructured":"Kim S, Qu X C, Sachnev V, Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions.[J]. IEEE Trans. Circuits Syst. Video Techn.,2019, 29(11):3236-3246.","journal-title":"IEEE Trans. Circuits Syst. Video Techn."},{"key":"e_1_3_2_1_3_1","first-page":"763","article-title":"A reversible data hiding scheme using pixel location.[J]","volume":"2018","author":"Kuma R","unstructured":".Kuma R, Chand S, Singh S. A reversible data hiding scheme using pixel location.[J]. Int. Arab J. Inf. Technol.,2018,15(4): 763-768.","journal-title":"Int. Arab J. Inf. Technol."},{"unstructured":"Ren F Xue F Y Yao X M. Four-round embedding reversible information hiding algorithm based on median prediction[J\/OL]. Computer Engineering: 1-11[2022-01-27].","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.26917\/d.cnki.ganhu.2020.000861"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/TIP.2006.891046"},{"key":"e_1_3_2_1_7_1","first-page":"989","volume":"2009","author":"Sachnev V","unstructured":"Sachnev V, Kim H J, Nam J, Reversible Watermarking Algorithm Using Sorting and Prediction.[J]. IEEE Trans. Circuits Syst. Video Techn.,2009,19(7):989-999.","journal-title":"IEEE Trans. Circuits Syst. Video Techn."},{"key":"e_1_3_2_1_8_1","first-page":"354","article-title":"Reversible data hiding.[J]","volume":"2006","author":"Ni Z C","unstructured":"Ni Z C, Shi Y Q, Nirwan A, Reversible data hiding.[J]. IEEE Trans. Circuits Syst. Video Techn.,2006,16(3):354 -362","journal-title":"IEEE Trans. Circuits Syst. Video Techn."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/TCSVT.2003.815962"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1016\/j.sigpro.2008.12.017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.jss.2013.04.086"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1016\/j.jss.2015.04.085"},{"key":"e_1_3_2_1_13_1","first-page":"15","article-title":"Digital camera zooming based on unified CFA image processing steps[J]","volume":"2004","author":"Lukac R","unstructured":"Lukac R, Martin K, Platanoitis K.N. Digital camera zooming based on unified CFA image processing steps[J]. IEEE Transactions on Consumer Electronics,2004,50(1):15-24","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"e_1_3_2_1_14_1","first-page":"392","article-title":"Reversible data hiding of high payload using local edge sensing prediction[J]","volume":"2011","author":"Feng G R","unstructured":"Feng G R, Fan L Y. Reversible data hiding of high payload using local edge sensing prediction[J]. The Journal of Systems & Software,2011,85(2):392-399","journal-title":"The Journal of Systems & Software"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1155\/2017\/6359248"},{"issue":"05","key":"e_1_3_2_1_16_1","first-page":"69","article-title":"Reversible data hiding scheme based on asymmetric histogram modification[J]","volume":"4","author":"Lyu Z H, LIU L, CHEN S","year":"2018","unstructured":"Lyu Z H, LIU L, CHEN S, Reversible data hiding scheme based on asymmetric histogram modification[J]. Chinese Journal of Network and Information Security, 2018,4(05):69-75","journal-title":"Chinese Journal of Network and Information Security"},{"issue":"05","key":"e_1_3_2_1_17_1","first-page":"80","article-title":"Reversible data hiding algorithm based on asymmetric histogram shifting[J]","volume":"5","author":"He Y F, YIN Z X, TANG J","year":"2019","unstructured":"He Y F, YIN Z X, TANG J, Reversible data hiding algorithm based on asymmetric histogram shifting[J]. Chinese Journal of Network and Information Security, 2019,5(05):80-89.","journal-title":"Chinese Journal of Network and Information Security"},{"key":"e_1_3_2_1_18_1","first-page":"397","article-title":"A Reversible Watermarking Scheme for Vector Maps Based on Multilevel Histogram Modification[J]","volume":"2018","author":"Hou X","unstructured":"Hou X, Min L Q, Yang H. A Reversible Watermarking Scheme for Vector Maps Based on Multilevel Histogram Modification[J]. Symmetry,2018,10(9):397-397.","journal-title":"Symmetry"}],"event":{"acronym":"AIPR 2022","name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","location":"Xiamen China"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574067","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3574067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:32Z","timestamp":1750186952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574067"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":18,"alternative-id":["10.1145\/3573942.3574067","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3574067","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}