{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T07:24:07Z","timestamp":1648884247593},"reference-count":35,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,7,1]]},"DOI":"10.1587\/transinf.2019icp0005","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T22:15:05Z","timestamp":1593555305000},"page":"1608-1617","source":"Crossref","is-referenced-by-count":1,"title":["A Multilayer Steganography Method with High Embedding Efficiency for Palette Images"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Han-Yan","family":"WU","sequence":"first","affiliation":[{"name":"Department of Computer Science, National Chiao Tung University"}]},{"given":"Ling-Hwei","family":"CHEN","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Chiao Tung University"}]},{"given":"Yu-Tai","family":"CHING","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Chiao Tung University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] K.-H. Jung, \u201cA high-capacity reversible data hiding scheme based on sorting and prediction in digital images,\u201d Multimed. Tools Appl., vol.76, no.11, pp.13127-13137, 2017. 10.1007\/s11042-016-3739-x","DOI":"10.1007\/s11042-016-3739-x"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] H. Nyeem, \u201cReversible data hiding with image bit-plane slicing,\u201d 20th Int. Conf. Comp. and Inf. Technol. (ICCIT), Dhaka, Bangladesh, Dec. 2017. DOI: 10.1109\/ICCITECHN.2017.8281763 10.1109\/iccitechn.2017.8281763","DOI":"10.1109\/ICCITECHN.2017.8281763"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] C.-N. Yang, C. Kim, and Y.-H. Lo, \u201cAdaptive real-time reversible data hiding for JPEG images,\u201d Journal of Real-Time Image Process., vol.14, no.1, pp.147-157, 2018. 10.1007\/s11554-015-0555-x","DOI":"10.1007\/s11554-015-0555-x"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] F.T. Wedaj, S. Kim, H.J. Kim, and F. Huang, \u201cImproved reversible data hiding in JPEG images based on new coefficient selection strategy,\u201d EURASIP Journal on Image and Video Process., vol.2017, no.63, 2017. DOI: 10.1186\/s13640-017-0206-1 10.1186\/s13640-017-0206-1","DOI":"10.1186\/s13640-017-0206-1"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] C. Lu, B. Ou, and X. Quan, \u201cReversible data hiding for JPEG images based on channel selection,\u201d Proc. 3rd Int. Conf. Multimed. Syst. and Signal Process., pp.56-63, April 2018. DOI: 10.1145\/3220162.3220189 10.1145\/3220162.3220189","DOI":"10.1145\/3220162.3220189"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] Z. Qian, S. Dai, and B. Chen, \u201cReversible data hiding in JPEG images using ordered embedding,\u201d KSII Trans. Internet and Inf. Syst., vol.11, no.2, pp.945-958, 2017. 10.3837\/tiis.2017.02.017","DOI":"10.3837\/tiis.2017.02.017"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] P.-H. Cheng, K.-C. Chang, and C.-L. Liu, \u201cA reversible data hiding scheme for VQ indices using histogram shifting of prediction errors,\u201d Multimed. Tools Appl., vol.76, no.4, pp.6031-6050, 2017. 10.1007\/s11042-015-3142-z","DOI":"10.1007\/s11042-015-3142-z"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] W. Hong, Y.-B. Ma, H.-C. Wu, and T.-S. Chen, \u201cAn efficient reversible data hiding method for AMBTC compressed images,\u201d Multimed. Tools Appl., vol.76, no.4, pp.5441-5460, 2017. 10.1007\/s11042-016-4032-8","DOI":"10.1007\/s11042-016-4032-8"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] X. Zhang, Z. Sun, Z. Tang, C. Yu, and X. Wang, \u201cHigh capacity data hiding based on interpolated image,\u201d Multimed. Tools Appl., vol.76, no.7, pp.9195-9218, 2017. 10.1007\/s11042-016-3521-0","DOI":"10.1007\/s11042-016-3521-0"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[10] M. Hussain, A.W.A. Wahab, A.T.S. Ho, N. Javed, and K.-H. Jung, \u201cA data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement,\u201d Signal Process.: Image Commun., vol.50, pp.44-57, Feb. 2017. 10.1016\/j.image.2016.10.005","DOI":"10.1016\/j.image.2016.10.005"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] W. Zhang, S. Wang, and X. Zhang, \u201cImproving embedding efficiency of covering codes for applications in steganography,\u201d IEEE Commun. Lett., vol.11, no.8, pp.680-682, 2007. 10.1109\/lcomm.2007.070438","DOI":"10.1109\/LCOMM.2007.070438"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] C.-C. Chang, T.D. Kieu, and Y.-C. Chou, \u201cUsing nearest covering codes to embed secret information in gray scale images,\u201d Proc. 2nd Int. Conf. Ubiquitous Inf. Management and Commun., Suwon, Korea, pp.315-320, Jan. 2008. DOI: 10.1145\/1352793.1352860 10.1145\/1352793.1352860","DOI":"10.1145\/1352793.1352860"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] Z. Cao, Z. Yin, H. Hu, X. Gao, and L. Wang, \u201cHigh capacity data hiding scheme based on (7, 4) Hamming code,\u201d SpringerPlus 5, no.175, pp.1-15, 2016. DOI: 10.1186\/s40064-016-1818-0 10.1186\/s40064-016-1818-0","DOI":"10.1186\/s40064-016-1818-0"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] Y. Guo, X. Cao, R. Wang, and C. Jin, \u201cA new data embedding method with a new data embedding domain for JPEG images,\u201d 2018 IEEE 4th Int. Conf. Multimed. Big Data (BigMM), Xi&apos;an, China, pp.1-5, Sept. 2018. 10.1109\/bigmm.2018.8499451","DOI":"10.1109\/BigMM.2018.8499451"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] W. Hong, X. Zhou, D.-C. Lou, T.S. Chen, and Y. Li, \u201cJoint image coding and lossless data hiding in VQ indices using adaptive coding techniques,\u201d Inf. Sci., vol.463-464, pp.245-260, Oct. 2018. 10.1016\/j.ins.2018.05.055","DOI":"10.1016\/j.ins.2018.05.055"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] W. Hong, T.S. Chen, Z. Yin, B. Luo, and Y. Ma, \u201cData hiding in AMBTC images using quantization level modification and perturbation technique,\u201d Multimed. Tools Appl., vol.76, no.3, pp.3761-3782, Feb. 2017. 10.1007\/s11042-016-3977-y","DOI":"10.1007\/s11042-016-3977-y"},{"key":"17","unstructured":"[17] S-Tools, https:\/\/www.compzets.com\/view-upload.php?id=61&amp;action=view, accessed April 6 2018."},{"key":"18","unstructured":"[18] R. Machado, EZ Stego, http:\/\/www.stego.com"},{"key":"19","unstructured":"[19] J. Fridrich, \u201cA new steganographic method for palette-based image,\u201d Proc. IS&amp;T PICS Conf., Savannah, GA, pp.285-289, 1998."},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] J. Fridrich and R. Du, \u201cSecure steganographic methods for palette images,\u201d Lecture Notes in Comp. Sci., vol.1768, pp.47-60, 2000. 10.1007\/10719724_4","DOI":"10.1007\/10719724_4"},{"key":"21","unstructured":"[21] G. Tanaka, N. Suetake, and E. Uchino, \u201cA steganographic method realizing high capacity data embedding for palette-based images,\u201d Proc. Int. Workshop on Smart Info-Media Syst. in Asia, Osaka, Japan, pp.92-95, Oct. 2009."},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] S. Imaizumi and K. Ozawa, \u201cMultibit embedding algorithm for steganography of palette-based images,\u201d Lecture Notes in Comp. Sci., vol.8333, pp.99-110, 2013. 10.1007\/978-3-642-53842-1_9","DOI":"10.1007\/978-3-642-53842-1_9"},{"key":"23","unstructured":"[23] S. Imaizumi and K. Ozawa, \u201cPalette-based image steganography for high-capacity embedding,\u201d Bull. Soc. Photogr. Imag. Japan, vol.25, no.1, pp.7-11, 2015."},{"key":"24","doi-asserted-by":"crossref","unstructured":"[24] A. Aryal, K. Motegi, S. Imaizumi, and N. Aoki, \u201cImprovement of multi-bit information embedding algorithm for palette-based images,\u201d ISC 2015, Trondheim, Norway, vol.9290, pp.511-523, 2015. 10.1007\/978-3-319-23318-5_28","DOI":"10.1007\/978-3-319-23318-5_28"},{"key":"25","unstructured":"[25] Giphy, https:\/\/giphy.com\/, accessed May 29 2018."},{"key":"26","doi-asserted-by":"publisher","unstructured":"[26] K.M. Miltner and T. Highfield, \u201cNever gonna GIF you up: analyzing the cultural significance of the animated GIF,\u201d Social Media + Society, vol.3, no.3, pp.1-11, 2017. 10.1177\/2056305117725223","DOI":"10.1177\/2056305117725223"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] N.F. Johnson and S. Jajodia, \u201cSteganalysis of images created using current steganography software,\u201d Lecture Notes in Comp. Sci., vol.1525, pp.273-289, 1998. 10.1007\/3-540-49380-8_19","DOI":"10.1007\/3-540-49380-8_19"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] A. Westfeld, \u201cF5 \u2014 a steganographic algorithm,\u201d Lecture Notes in Comp. Sci., vol.2137, pp.289-302, Springer, Heidelberg, 2001. 10.1007\/3-540-45496-9_21","DOI":"10.1007\/3-540-45496-9_21"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] J. Fridrich, P. Lison\u011bk, and D. Soukal, \u201cOn steganographic embedding efficiency,\u201d Proc. 8th Int. Workshop Inf. Hiding, New York, vol.4437, pp.282-296, July 2006 10.1007\/978-3-540-74124-4_19","DOI":"10.1007\/978-3-540-74124-4_19"},{"key":"30","unstructured":"[30] R. Crandall, \u201cSome notes on steganography,\u201d posted on steganography mailing list, 1998, http:\/\/dde.binghamton.edu\/download\/Crandall_matrix.pdf, accessed May 29 2018."},{"key":"31","doi-asserted-by":"publisher","unstructured":"[31] R.W. Hamming, \u201cError detecting and error correcting codes,\u201d The Bell Syst. Technical Journal, vol.29, no.2, pp.147-160, April 1950. 10.1002\/j.1538-7305.1950.tb00463.x","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"32","unstructured":"[32] Image database, http:\/\/sipi.usc.edu\/database\/, accessed April 6 2018."},{"key":"33","doi-asserted-by":"publisher","unstructured":"[33] Z. Wang, A.C. Bovik, H.R. Sheikh, and E.P. Simoncelli, \u201cImage quality assessment: from error visibility to structural similarity,\u201d IEEE Trans. Image Process., vol.13, no.4, pp.600-612, 2004. 10.1109\/tip.2003.819861","DOI":"10.1109\/TIP.2003.819861"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[34] M.A. Hassan and M.S. Bashraheel, \u201cColor-based structural similarity image quality assessment,\u201d 8th Int. Conf. Inf. Technol. (ICIT), Jordan, pp.691-696, May 2017. DOI: 10.1109\/ICITECH.2017.8079929 10.1109\/icitech.2017.8079929","DOI":"10.1109\/ICITECH.2017.8079929"},{"key":"35","unstructured":"[35] SIDBA, http:\/\/www.ess.ic.kanagawa-it.ac.jp\/app_images_j.html, accessed Sept. 7 2018."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019ICP0005\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,4]],"date-time":"2020-07-04T03:24:28Z","timestamp":1593833068000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/7\/E103.D_2019ICP0005\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":35,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019icp0005","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}