{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:52Z","timestamp":1777704652708,"version":"3.51.4"},"reference-count":9,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,12,24]]},"abstract":"<jats:p>In the system security technology, the information hiding field is developed as technologies for embedding information into digital content as media. The proposed technique is a technical steganography technique which uses a technique of information hiding through physical \/ statistical change of signal of contents. In the digital watermarking or steganography technology, the embedding process is frequently performed in the frequency domain in order to increase the latent capacity and to improve the image quality. However, these methods have a disadvantage that the computation complexity is high and the constraint condition becomes complicated. In the contrast, there have been various studies based on histogram shifting technology in reversible information hiding. Assume it selects multiple peaks on the histogram shifting, the capacity of data concealment gradually increased by applying multiple peak histogram method. The steganography technique using histogram shifting doesn\u2019t show any significant improvement for the hiding capacity and image quality in the early methods. In this paper, we analyze the effect of information hiding technology in terms of adopting the histogram shift method including skipping. In addition, we propose 2n divergence data hiding as a complimentary technique to improve hiding capacity. The proposed method has been proven through an example using mathematical expressions, and further improvement measures could be derived.<\/jats:p>","DOI":"10.3233\/jifs-169859","type":"journal-article","created":{"date-parts":[[2018,8,5]],"date-time":"2018-08-05T06:38:52Z","timestamp":1533451132000},"page":"6189-6195","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Improved histogram shifting-based data hiding method with alternative skipping method for image retrieval"],"prefix":"10.1177","volume":"35","author":[{"given":"Yong Soo","family":"Choi","sequence":"first","affiliation":[{"name":"Department of Liberal Arts and Teaching, Sungkyul University, Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,8]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_3_2_3_2","first-page":"19","article-title":"Reversible Watermarking by Difference Expansion","author":"Tian J.","year":"2002","unstructured":"TianJ., Reversible Watermarking by Difference Expansion, In Proc of Workshop on Multimedia and Security, 2002, pp. 19\u201322.","journal-title":"In Proc of Workshop on Multimedia and Security"},{"key":"e_1_3_2_4_2","first-page":"829","article-title":"Reversible Data Hiding Using the Histogram Modification of Block Image","author":"Yoo H.M.","year":"2009","unstructured":"YooH.M., LeeS.K., SuhY.H. and SuhJ.W., Reversible Data Hiding Using the Histogram Modification of Block Image, In Proc of 16th International Conf on Neural Information Processing, Part I, 2009, pp. 829\u2013837.","journal-title":"In Proc of 16th International Conf on Neural Information Processing, Part I"},{"issue":"6","key":"e_1_3_2_5_2","article-title":"Ternary Bose - Chaudhuri - Hocquenghem (BCH) with t = 2 code for steganography","volume":"17","author":"Sachnev V.","year":"2016","unstructured":"SachnevV. and ChoiY.S., Ternary Bose - Chaudhuri - Hocquenghem (BCH) with t = 2 code for steganography, Journal of DCS17(6) (2016).","journal-title":"Journal of DCS"},{"key":"e_1_3_2_6_2","article-title":"Reversible data hiding technique using histogram","author":"Gupta J.","year":"2015","unstructured":"GuptaJ., GuptaP. and GuptaS.C., Reversible data hiding technique using histogram, Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on, 2015.","journal-title":"Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on"},{"issue":"2","key":"e_1_3_2_7_2","first-page":"101","article-title":"Reversible data hiding based on histogram modification of pixel differences","volume":"285","author":"Tai W.L.","year":"2012","unstructured":"TaiW.L., YehC.M. and ChangC.C., Reversible data hiding based on histogram modification of pixel differences, Optics Communications285(2) (2012), 101\u2013108.","journal-title":"Optics Communications"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.09.005"},{"issue":"10","key":"e_1_3_2_9_2","first-page":"481","article-title":"Histogram shifting based reversible data hiding","volume":"10","author":"Mathews L.R.","year":"2015","unstructured":"MathewsL.R., ArathyC. and HaranV., Histogram shifting based reversible data hiding, International Journal of Engineering Trends and Technology10(10) (2015), 481\u2013485.","journal-title":"International Journal of Engineering Trends and Technology"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.07.002"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169859","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169859","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:42Z","timestamp":1777455702000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":9,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12,24]]}},"alternative-id":["10.3233\/JIFS-169859"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169859","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}