{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:13:24Z","timestamp":1763810004310,"version":"3.37.3"},"reference-count":21,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T00:00:00Z","timestamp":1547683200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802212","61872203","61502241","J18KA331"],"award-info":[{"award-number":["61802212","61872203","61502241","J18KA331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802212","61872203","61502241","J18KA331"],"award-info":[{"award-number":["61802212","61872203","61502241","J18KA331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802212","61872203","61502241","J18KA331"],"award-info":[{"award-number":["61802212","61872203","61502241","J18KA331"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Project of Shandong Province Higher Educational Science and Technology Program","award":["61802212","61872203","61502241","J18KA331"],"award-info":[{"award-number":["61802212","61872203","61502241","J18KA331"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,1,17]]},"abstract":"<jats:p>In this paper, a new reversible data hiding (RDH) scheme based on Code Division Multiplexing (CDM) and machine learning algorithms for medical image is proposed. The original medical image is firstly converted into frequency domain with integer-to-integer wavelet transform (IWT) algorithm, and then the secret data are embedded into the medium frequency subbands of medical image robustly with CDM and machine learning algorithms. According to the orthogonality of different spreading sequences employed in CDM algorithm, the secret data are embedded repeatedly, most of the elements of spreading sequences are mutually canceled, and the proposed method obtained high data embedding capacity at low image distortion. Simultaneously, the to-be-embedded secret data are represented by different spreading sequences, and only the receiver who has the spreading sequences the same as the sender can extract the secret data and original image completely, by which the security of the RDH is improved effectively. Experimental results show the feasibility of the proposed scheme for data embedding in medical image comparing with other state-of-the-art methods.<\/jats:p>","DOI":"10.1155\/2019\/4732632","type":"journal-article","created":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T18:39:35Z","timestamp":1547750375000},"page":"1-9","source":"Crossref","is-referenced-by-count":7,"title":["Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7649-6696","authenticated-orcid":true,"given":"Bin","family":"Ma","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Qilu University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0796-8415","authenticated-orcid":true,"given":"Bing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Qilu University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7030-4291","authenticated-orcid":true,"given":"Xiao-Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Qilu University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3742-5614","authenticated-orcid":true,"given":"Chun-Peng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Qilu University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4791-2934","authenticated-orcid":true,"given":"Jian","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Qilu University of Technology, China"}]},{"given":"Yun-Qing","family":"Shi","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, New Jersey, USA"}]}],"member":"311","reference":[{"issue":"2","key":"2","first-page":"255","volume":"55","year":"2018","journal-title":"Computer, Materials & Continua"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2566261"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1049\/el:20021131"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1587\/elex.4.205"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2004.1436530"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2261062"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2003.815962"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2006.891046"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2009.2020257"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2010.2046930"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2011.2150233"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2007.905146"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2009.0226"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.884895"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19321-2_32"},{"issue":"1","key":"21","first-page":"1","volume":"14","year":"2018","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)"},{"issue":"2","key":"22","first-page":"91","volume":"53","year":"2017","journal-title":"Computers, Materials and Continua"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.028"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2724940"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-009-9253-1"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4732632.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4732632.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/4732632.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T18:39:42Z","timestamp":1547750382000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/4732632\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,17]]},"references-count":21,"alternative-id":["4732632","4732632"],"URL":"https:\/\/doi.org\/10.1155\/2019\/4732632","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,1,17]]}}}