{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:44:41Z","timestamp":1767987881316,"version":"3.49.0"},"reference-count":45,"publisher":"Vilnius University Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.15388\/20-infor422","type":"journal-article","created":{"date-parts":[[2020,6,22]],"date-time":"2020-06-22T05:47:02Z","timestamp":1592804822000},"page":"69-84","source":"Crossref","is-referenced-by-count":8,"title":["A Reversible Data Hiding Based on Histogram Shifting of Prediction Errors for Two-Tier Medical Images"],"prefix":"10.15388","author":[{"given":"Li-Chin","family":"Huang","sequence":"first","affiliation":[]},{"given":"Shu-Fen","family":"Chiou","sequence":"additional","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"6097","published-online":{"date-parts":[[2020,6,22]]},"reference":[{"key":"2021031607532786566_j_infor422_ref_001","first-page":"385"},{"key":"2021031607532786566_j_infor422_ref_002","doi-asserted-by":"crossref","first-page":"1132","DOI":"10.1109\/TCYB.2015.2423678","article-title":"High capacity reversible data hiding in encrypted images by patch-level sparse representation","volume":"46","year":"2016","journal-title":"IEEE Transactions on Cybernetics"},{"key":"2021031607532786566_j_infor422_ref_003","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1016\/j.aeue.2012.01.008","article-title":"Prediction-based reversible data hiding using the difference of neighboring pixels","volume":"66","year":"2012","journal-title":"International Journal of Electronics and Communications"},{"key":"2021031607532786566_j_infor422_ref_004","first-page":"126","article-title":"Reversible data hiding scheme based on fully exploiting the orientation combinations of dual stego-images","volume":"22","year":"2020","journal-title":"International Journal of Network Security"},{"key":"2021031607532786566_j_infor422_ref_005","volume-title":"Medical Devices: Surgical and Image-Guided Technologies","year":"2012"},{"key":"2021031607532786566_j_infor422_ref_006","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TIP.2015.2395724","article-title":"On local prediction based reversible watermarking","volume":"24","year":"2015","journal-title":"IEEE Transactions on Image Processing"},{"key":"2021031607532786566_j_infor422_ref_007","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1587\/elex.4.205","article-title":"High capacity lossless data hiding based on histogram modification","volume":"4","year":"2007","journal-title":"IEICE Electronics Express"},{"key":"2021031607532786566_j_infor422_ref_008","doi-asserted-by":"crossref","first-page":"2078","DOI":"10.1109\/LSP.2015.2459055","article-title":"Reversible data hiding using controlled contrast enhancement and integer wavelet transform","volume":"22","year":"2015","journal-title":"IEEE Signal Processing Letters"},{"key":"2021031607532786566_j_infor422_ref_009","first-page":"578","article-title":"Reversible data hiding based on histogram shifting of predict errors","volume":"2","year":"2008","journal-title":"International Workshop on Geoscience and Remote Sensing"},{"key":"2021031607532786566_j_infor422_ref_010","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.ins.2014.03.030","article-title":"Reversible data hiding using Delaunay triangulation and selective embedment","volume":"308","year":"2015","journal-title":"Information Sciences"},{"key":"2021031607532786566_j_infor422_ref_011","first-page":"77","article-title":"Study of an intrusion detection system","volume":"10","year":"2012","journal-title":"Journal of Electronic Science and Technology"},{"key":"2021031607532786566_j_infor422_ref_012","first-page":"243","article-title":"The study of data hiding in medical image","volume":"14","year":"2012","journal-title":"International Journal of Network Security"},{"key":"2021031607532786566_j_infor422_ref_013","doi-asserted-by":"crossref","first-page":"132","DOI":"10.3837\/tiis.2013.01.009","article-title":"Reversible and high-capacity data hiding in high quality medical images","volume":"7","year":"2013","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"2021031607532786566_j_infor422_ref_014","first-page":"230","article-title":"Reversible data hiding for medical images in cloud computing environments based on Chaotic H\u00e9non map","volume":"11","year":"2013","journal-title":"Journal of Electronic Science and Technology"},{"key":"2021031607532786566_j_infor422_ref_015","doi-asserted-by":"crossref","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","article-title":"Reversible data hiding in JPEG images","volume":"26","year":"2016","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"2021031607532786566_j_infor422_ref_016","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/02564602.2016.1141078","article-title":"A new lossless embedding techniques based on HDWT","volume":"34","year":"2017","journal-title":"IETE Technical Review"},{"key":"2021031607532786566_j_infor422_ref_017","first-page":"633","article-title":"Dual-Image based reversible data hiding scheme using pixel value difference expansion","volume":"18","year":"2016","journal-title":"International Journal of Network Security"},{"key":"2021031607532786566_j_infor422_ref_018","doi-asserted-by":"crossref","first-page":"3083","DOI":"10.1016\/j.patcog.2009.04.004","article-title":"Reversible data hiding exploiting spatial correlation between sub-sampled images","volume":"42","year":"2009","journal-title":"Pattern Recognit"},{"key":"2021031607532786566_j_infor422_ref_019"},{"key":"2021031607532786566_j_infor422_ref_020","first-page":"1321","volume-title":"Proceedings of the IEEE International Conference on Multimedia and Expo","year":"2006"},{"key":"2021031607532786566_j_infor422_ref_021","first-page":"410","article-title":"A reversible data hiding scheme based on IWT and the Sudoku method","volume":"18","year":"2016","journal-title":"International Journal of Network Security"},{"key":"2021031607532786566_j_infor422_ref_022","first-page":"65","article-title":"Generalized PVO-K embedding technique for reversible data hiding","volume":"20","year":"2018","journal-title":"International Journal of Network Security"},{"key":"2021031607532786566_j_infor422_ref_023","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.ins.2010.09.022","article-title":"Reversible data hiding based on block median preservation","volume":"181","year":"2011","journal-title":"Information Sciences"},{"key":"2021031607532786566_j_infor422_ref_024"},{"key":"2021031607532786566_j_infor422_ref_025","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","year":"2006","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"2021031607532786566_j_infor422_ref_026","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/LSP.2015.2504464","article-title":"Adaptive reversible data hiding by extending the generalized integer transformation","volume":"23","year":"2016","journal-title":"IEEE Signal Processing Letters"},{"key":"2021031607532786566_j_infor422_ref_027","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1109\/TIFS.2011.2177087","article-title":"Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering","volume":"7","year":"2012","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2021031607532786566_j_infor422_ref_028","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","article-title":"Reversible data hiding: Advances in the past two decades","volume":"4","year":"2016","journal-title":"IEEE Access"},{"key":"2021031607532786566_j_infor422_ref_029","first-page":"113","article-title":"Sensitive digital image watermarking for copyright protection","volume":"15","year":"2013","journal-title":"International Journal of Network Security"},{"key":"2021031607532786566_j_infor422_ref_030","first-page":"721","article-title":"Expansion embedding techniques for reversible watermarking","volume":"6","year":"2007","journal-title":"IEEE Transactions on Image Processing"},{"key":"2021031607532786566_j_infor422_ref_031","first-page":"679","volume-title":"Proceedings SPIE 4675, Security and Watermarking of Multimedia Contents","volume":"IV","year":"2002"},{"key":"2021031607532786566_j_infor422_ref_032","first-page":"2583","volume-title":"Proceedings of the International Conference on Machine Learning and Cybernetics","volume":"5","year":"2010"},{"key":"2021031607532786566_j_infor422_ref_033","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TMM.2003.809729","article-title":"Circular interpretation of bijective transformations in lossless watermarking for media asset management","volume":"5","year":"2003","journal-title":"IEEE Transactions on Multimedia"},{"key":"2021031607532786566_j_infor422_ref_034","doi-asserted-by":"crossref","first-page":"1965","DOI":"10.1016\/j.jss.2013.03.083","article-title":"A high capacity lossless data hiding scheme for JPEG images","volume":"86","year":"2013","journal-title":"Journal of Systems and Software"},{"key":"2021031607532786566_j_infor422_ref_035","first-page":"858","article-title":"An improved dual image-based reversible hiding technique using LSB matching","volume":"19","year":"2017","journal-title":"International Journal of Network Security"},{"key":"2021031607532786566_j_infor422_ref_036","first-page":"1","article-title":"A survey of reversible data hiding for VQ-compressed images","volume":"20","year":"2018","journal-title":"International Journal of Network Security"},{"key":"2021031607532786566_j_infor422_ref_037","first-page":"1","volume-title":"Proceedings of the IEEE Visual Communications and Image Processing","year":"2011"},{"key":"2021031607532786566_j_infor422_ref_038","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1179\/174313109X459887","article-title":"A new approach to the secret image sharing with steganography and authentication","volume":"57","year":"2009","journal-title":"Imaging Science Journal"},{"key":"2021031607532786566_j_infor422_ref_039","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","article-title":"Reversible image data hiding with contrast enhancement","volume":"22","year":"2015","journal-title":"IEEE Transactions on Signal Processing"},{"key":"2021031607532786566_j_infor422_ref_040","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.jvcir.2015.06.010","article-title":"A reversible data hiding method with contrast enhancement for medical images","volume":"31","year":"2015","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"2021031607532786566_j_infor422_ref_041"},{"key":"2021031607532786566_j_infor422_ref_042","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","article-title":"Reversible data hiding in encrypted image","volume":"18","year":"2011","journal-title":"IEEE Signal Processing Letters"},{"key":"2021031607532786566_j_infor422_ref_043","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","article-title":"Separable reversible data hiding in encrypted image","volume":"7","year":"2012","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2021031607532786566_j_infor422_ref_044","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/TMM.2016.2569497","article-title":"Reversible data hiding in encrypted image by reversible image transforming","volume":"18","year":"2016","journal-title":"IEEE Transactions on Multimedia"},{"key":"2021031607532786566_j_infor422_ref_045","first-page":"718","article-title":"A reversible data hiding scheme based on histogram modification in integer DWT domain for BTC compressed images","volume":"18","year":"2016","journal-title":"International Journal of Network Security"}],"container-title":["Informatica"],"original-title":[],"language":"en","deposited":{"date-parts":[[2021,3,16]],"date-time":"2021-03-16T06:09:13Z","timestamp":1615874953000},"score":1,"resource":{"primary":{"URL":"https:\/\/informatica.vu.lt\/doi\/10.15388\/20-INFOR422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,22]]},"references-count":45,"alternative-id":["10.15388\/20-INFOR422"],"URL":"https:\/\/doi.org\/10.15388\/20-infor422","relation":{},"ISSN":["0868-4952","1822-8844"],"issn-type":[{"value":"0868-4952","type":"print"},{"value":"1822-8844","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,22]]}}}