{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:02Z","timestamp":1750309262612,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3613917.3613919","type":"proceedings-article","created":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T17:10:26Z","timestamp":1695229826000},"page":"19-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Data Hiding Scheme for JPEG Images Based on EMD with Coefficient Selection Strategy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9261-8208","authenticated-orcid":false,"given":"Xiaoyu","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Ocean Information Engineering, Jimei University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1489-9841","authenticated-orcid":false,"given":"Guangsong","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Ocean Information Engineering, Jimei University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5307-1043","authenticated-orcid":false,"given":"Tung-Shou","family":"Chen","sequence":"additional","affiliation":[{"name":"Computer Science and Information Engineering, National Taichung University of Science and Technology, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5901-1396","authenticated-orcid":false,"given":"Guan-Zhong","family":"Su","sequence":"additional","affiliation":[{"name":"Computer Science and Information Engineering, National Taichung University of Science and Technology, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2873-0190","authenticated-orcid":false,"given":"Wien","family":"Hong","sequence":"additional","affiliation":[{"name":"Computer Science and Information Engineering, National Taichung University of Science and Technology, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2023,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2281422"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Bender W. Gruhl D. Morimoto N. and Lu A. 1996. Techniques for data hiding. IBM Systems Journal 35(3.4) 313-336.","DOI":"10.1147\/sj.353.0313"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2155062"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.060863"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/30.125072"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2473235"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Improved reversible data hiding in JPEG images based on new coefficient selection strategy","author":"Wedaj F. T.","year":"2017","unstructured":"Wedaj F. T., Kim S., Kim H. J., and Huang F. 2017. Improved reversible data hiding in JPEG images based on new coefficient selection strategy. EURASIP Journal on Image and Video Processing, 1-11.","journal-title":"EURASIP Journal on Image and Video Processing"},{"volume-title":"International Conference on Security with Intelligent Computing and Big-data Services, 895","author":"Dong T.","key":"e_1_3_2_1_10_1","unstructured":"Dong T., Hong Z., and Yin Z. 2018. High-fidelity reversible data hiding in JPEG images based on two-dimensional histogram. International Conference on Security with Intelligent Computing and Big-data Services, 895."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920178"},{"key":"e_1_3_2_1_12_1","first-page":"151","article-title":"Extended exploiting-modification-direction data hiding with high capacity","author":"Liuand Y.","year":"2017","unstructured":"Liuand Y., Chang C. C., and Huang P.C. 2017. Extended exploiting-modification-direction data hiding with high capacity. Association for Computing Machinery, 151-155.","journal-title":"Association for Computing Machinery"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7252-x"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1853055"},{"key":"e_1_3_2_1_15_1","unstructured":"The USC-SIPI image database. Available online: http:\/\/sipi.usc.edu\/database\/"}],"event":{"name":"ICMSSP 2023: 2023 8th International Conference on Multimedia Systems and Signal Processing","acronym":"ICMSSP 2023","location":"Shenzhen China"},"container-title":["Proceedings of the 2023 8th International Conference on Multimedia Systems and Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613917.3613919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613917.3613919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:10Z","timestamp":1750291030000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613917.3613919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":15,"alternative-id":["10.1145\/3613917.3613919","10.1145\/3613917"],"URL":"https:\/\/doi.org\/10.1145\/3613917.3613919","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-09-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}