{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:05:17Z","timestamp":1773615917937,"version":"3.50.1"},"reference-count":25,"publisher":"Allerton Press","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.3103\/s0146411624700111","type":"journal-article","created":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T10:02:20Z","timestamp":1714989740000},"page":"216-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Study on Applications of Reversible Information Hiding Algorithms Based on Discrete Cosine Transform Coefficient and Frequency Band Selection in JPEG Image Encryption"],"prefix":"10.3103","volume":"58","author":[{"family":"Yingwei Gao","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2024,5,6]]},"reference":[{"key":"7697_CR1","doi-asserted-by":"publisher","first-page":"259","DOI":"10.4236\/chnstd.2018.74023","volume":"7","author":"X. Liu","year":"2018","unstructured":"Liu, X. and Zha, Yu., Copyright protection of digital movies using the coalition of technology and law in China, Chin. Stud., 2018, vol. 7, no. 4, pp. 259\u2013276. https:\/\/doi.org\/10.4236\/chnstd.2018.74023","journal-title":"Chin. Stud."},{"key":"7697_CR2","doi-asserted-by":"publisher","unstructured":"Adam, N., Mashaly, M., and Alexan, W., A 3DES double\u2013layer based message security scheme, 2019 2nd\u00a0Int. Conf. on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 2019, IEEE, 2019, pp. 1\u20135. https:\/\/doi.org\/10.1109\/cais.2019.8769457","DOI":"10.1109\/cais.2019.8769457"},{"key":"7697_CR3","doi-asserted-by":"publisher","first-page":"012050","DOI":"10.1088\/1742-6596\/1979\/1\/012050","volume":"1979","author":"K. Saravanan","year":"2021","unstructured":"Saravanan, K., Suganthi, K., Kalaiselvi, R., Divya, B., and Dilip Kumar, S., Privacy preserving on remote sensing data using reversible data hiding, J. Phys.: Conf. Ser., 2021, vol. 1979, no. 1, p. 012050. https:\/\/doi.org\/10.1088\/1742-6596\/1979\/1\/012050","journal-title":"J. Phys.: Conf. Ser."},{"key":"7697_CR4","doi-asserted-by":"publisher","first-page":"5087","DOI":"10.1109\/tip.2018.2851074","volume":"27","author":"D. Hou","year":"2018","unstructured":"Hou, D., Zhang, W., Yang, Ya., and Yu, N., Reversible data hiding under inconsistent distortion metrics, IEEE Trans. Image Process., 2018, vol. 27, no. 10, pp. 5087\u20135099. https:\/\/doi.org\/10.1109\/tip.2018.2851074","journal-title":"IEEE Trans. Image Process."},{"key":"7697_CR5","doi-asserted-by":"publisher","first-page":"664","DOI":"10.3390\/electronics10060664","volume":"10","author":"Ya. Liu","year":"2021","unstructured":"Liu, Ya., Feng, G., Qin, C., Lu, H., and Chang, C., High-capacity reversible data hiding in encrypted images based on hierarchical quad-tree coding and multi-MSB prediction, Electronics, 2021, vol. 10, no. 6, p. 664. https:\/\/doi.org\/10.3390\/electronics10060664","journal-title":"Electronics"},{"key":"7697_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2021.12.092","volume":"589","author":"A. Kouhi","year":"2022","unstructured":"Kouhi, A. and Sedaaghi, M.H., Reversible data hiding based on high fidelity prediction scheme for reducing the number of invalid modifications, Inf. Sci., 2022, vol. 589, pp. 46\u201361. https:\/\/doi.org\/10.1016\/j.ins.2021.12.092","journal-title":"Inf. Sci."},{"key":"7697_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.jei.27.2.023017","volume":"27","author":"R. Bhardwaj","year":"2018","unstructured":"Bhardwaj, R., Enhanced encrypted reversible data hiding algorithm with minimum distortion through homomorphic encryption, J. Electron. Imaging, 2018, vol. 27, no. 2, p. 1. https:\/\/doi.org\/10.1117\/1.jei.27.2.023017","journal-title":"J. Electron. Imaging"},{"key":"7697_CR8","doi-asserted-by":"publisher","first-page":"11727","DOI":"10.1007\/s11042-017-4814-7","volume":"77","author":"K. Manohar","year":"2018","unstructured":"Manohar, K. and Kieu, T.D., An SMVQ-based reversible data hiding technique exploiting side match distortion, Multimedia Tools Appl., 2018, vol. 77, no. 10, pp. 11727\u201311750. https:\/\/doi.org\/10.1007\/s11042-017-4814-7","journal-title":"Multimedia Tools Appl."},{"key":"7697_CR9","doi-asserted-by":"publisher","first-page":"433","DOI":"10.12720\/jait.13.5.433-440","volume":"13","author":"K.S.R. Murthy","year":"2022","unstructured":"Murthy, K.S.R. and Manikandan, V.M., A reversible data hiding through encryption scheme for medical image transmission using AES encryption with key scrambling, J. Adv. Inf. Technol., 2022, vol. 13, no. 5, pp. 433\u2013440. https:\/\/doi.org\/10.12720\/jait.13.5.433-440","journal-title":"J. Adv. Inf. Technol."},{"key":"7697_CR10","doi-asserted-by":"publisher","unstructured":"Upendra Raju, K. and Prabha Nagarajan, A., A steganography embedding method based on CDF-DWT technique for reversible data hiding application using elgamal algorithm, Int. J. Found. Comput. Sci., 2022, vol. 33, no. 06n07, pp. 489\u2013512. https:\/\/doi.org\/10.1142\/S0129054122420011","DOI":"10.1142\/S0129054122420011"},{"key":"7697_CR11","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/jetcas.2018.2832204","volume":"8","author":"M.S. Ansari","year":"2018","unstructured":"Ansari, M.S., Jiang, H., Cockburn, B.F., and Han, J., Low-power approximate multipliers using encoded partial products and approximate compressors, IEEE J. Emerging Sel. Top. Circuits Syst., 2018, vol. 8, no. 3, pp.\u00a0404\u2013416. https:\/\/doi.org\/10.1109\/jetcas.2018.2832204","journal-title":"IEEE J. Emerging Sel. Top. Circuits Syst."},{"key":"7697_CR12","doi-asserted-by":"publisher","first-page":"105969","DOI":"10.1016\/j.cmpb.2021.105969","volume":"202","author":"M.R.K. Mookiah","year":"2021","unstructured":"Mookiah, M.R.K., Hogg, S., Macgillivray, T., and Trucco, E., On the quantitative effects of compression of retinal fundus images on morphometric vascular measurements in VAMPIRE, Comput. Methods Programs Biomedicine, 2021, vol. 202, no. 1040, p. 105969. https:\/\/doi.org\/10.1016\/j.cmpb.2021.105969","journal-title":"Comput. Methods Programs Biomedicine"},{"key":"7697_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.4103\/jmss.jmss_19_19","volume":"9","author":"S. Azarianpour","year":"2019","unstructured":"Azarianpour, S. and Sadri, A., A generalized ghost detection and segmentation method for double-joint photographic experts group compression, J. Med. Signals Sens., 2019, vol. 9, no. 4, p. 211. https:\/\/doi.org\/10.4103\/jmss.jmss_19_19","journal-title":"J. Med. Signals Sens."},{"key":"7697_CR14","doi-asserted-by":"publisher","first-page":"012093","DOI":"10.1088\/1742-6596\/1858\/1\/012093","volume":"1858","author":"Hangkawidjaja Ratnadewi","year":"2021","unstructured":"Ratnadewi, Hangkawidjaja, A.D., Prijono, A., and Suherman, J., Discrete cosine transform and multi class support vector machines for classification cardiac atrial arrhythmia and cardiac normal, J. Phys.: Conf. Ser., 2021, vol. 1858, no. 1, p. 012093. https:\/\/doi.org\/10.1088\/1742-6596\/1858\/1\/012093","journal-title":"J. Phys.: Conf. Ser."},{"key":"7697_CR15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.nucengdes.2018.05.019","volume":"335","author":"R.N. De Mesquita","year":"2018","unstructured":"De Mesquita, R.N., Castro, L.F., Torres, W.M., Rocha, M.D.S., Umbehaun, P.E., Andrade, D.A., Sabundjian, G., and Masotti, P.H.F., Classification of natural circulation two-phase flow image patterns based on self-organizing maps of full frame DCT coefficients, Nucl. Eng. Des., 2018, vol. 335, no. 1, pp. 161\u2013171. https:\/\/doi.org\/10.1016\/j.nucengdes.2018.05.019","journal-title":"Nucl. Eng. Des."},{"key":"7697_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","volume":"517","author":"H.-J. Ko","year":"2020","unstructured":"Ko, H.-J., Huang, Ch.-T., Horng, G., and Wang, Sh.-J., Robust and blind image watermarking in DCT domain using inter-block coefficient correlation, Inf. Sci., 2020, vol. 517, pp. 128\u2013147. https:\/\/doi.org\/10.1016\/j.ins.2019.11.005","journal-title":"Inf. Sci."},{"key":"7697_CR17","doi-asserted-by":"publisher","first-page":"329","DOI":"10.24996\/ijs.2021.62.1.31","volume":"62","author":"R.I. Yousif","year":"2021","unstructured":"Yousif, R.I. and Salman, N.H., Image compression based on arithmetic coding algorithm, Iraqi J. Sci., 2021, vol. 62, no. 1, pp. 329\u2013334. https:\/\/doi.org\/10.24996\/ijs.2021.62.1.31","journal-title":"Iraqi J. Sci."},{"key":"7697_CR18","doi-asserted-by":"publisher","first-page":"042018","DOI":"10.1088\/1742-6596\/1964\/4\/042018","volume":"1964","author":"K. Padmanaban","year":"2021","unstructured":"Padmanaban, K., Senthil Kumar, A.M., Velmurugan, A.K., and Madhan, E.S., Data communication through reliable sensor using Huffman coding system, J. Phys.: Conf. Ser., 2021, vol. 1964, no. 4, p. 042018. https:\/\/doi.org\/10.1088\/1742-6596\/1964\/4\/042018","journal-title":"J. Phys.: Conf. Ser."},{"key":"7697_CR19","doi-asserted-by":"publisher","first-page":"102955","DOI":"10.1016\/j.jisa.2021.102955","volume":"62","author":"S. Mukherjee","year":"2021","unstructured":"Mukherjee, S., Sarkar, S., and Mukhopadhyay, S., Pencil shell matrix based image steganography with elevated embedding capacity, J. Inf. Secur. Appl., 2021, vol. 62, p. 102955. https:\/\/doi.org\/10.1016\/j.jisa.2021.102955","journal-title":"J. Inf. Secur. Appl."},{"key":"7697_CR20","doi-asserted-by":"publisher","unstructured":"Alzamil, N., Li, W., Zhou, H., and Merry, H., Frequency-dependent signal-to-noise ratio effect of distributed acoustic sensing vertical seismic profile acquisition, Geophys. Prospecting, 2022, vol. 70, no. 2, pp. 377\u2013387.https:\/\/doi.org\/10.1111\/1365-2478.13165","DOI":"10.1111\/1365-2478.13165"},{"key":"7697_CR21","unstructured":"Efimushkina, T., Egiazarian, K., and Gabbouj, M., Rate-distortion based reversible watermarking for JPEG images with quality factors selection, European Workshop on Visual Information Processing (EUVIP), Paris, 2013, IEEE, 2013, pp. 94\u201399."},{"key":"7697_CR22","unstructured":"SIPI Image Database. https:\/\/sipi.usc.edu\/database\/. Cited October 19, 2023."},{"key":"7697_CR23","doi-asserted-by":"publisher","unstructured":"Manikandan, V.M. and Masilamani, V., A novel bit plane compression based reversible data hiding scheme with Arnold transform, Int. J. Eng. Adv. Technol., 2020, vol. 9, no. 5, pp. 417\u2013423.https:\/\/doi.org\/10.35940\/ijeat.e9517.069520","DOI":"10.35940\/ijeat.e9517.069520"},{"key":"7697_CR24","doi-asserted-by":"crossref","unstructured":"Ni, Zh., Shi, Yu.-Q., Ansari, N., and Su, W., Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol., 2006, vol. 16, no. 3, pp. 354\u2013362.10.1109\/TCSVT.2006.869964","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"7697_CR25","doi-asserted-by":"crossref","unstructured":"Huang, F., Qu, X., Kim, H.J., and Huang, J., Reversible data hiding in JPEG images, IEEE Trans. Circuits Syst. Video Technol., 2016, vol. 26, no. 9, pp. 1610\u20131621.10.1109\/tcsvt.2015.2473235","DOI":"10.1109\/TCSVT.2015.2473235"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700111.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700111","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700111.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:07:07Z","timestamp":1773612427000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["7697"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700111","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"24 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}