{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:06:34Z","timestamp":1763535994412,"version":"3.30.1"},"reference-count":33,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.32604\/iasc.2023.027070","type":"journal-article","created":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T05:57:26Z","timestamp":1654495046000},"page":"537-552","source":"Crossref","is-referenced-by-count":2,"title":["A Recursive High Payload Reversible Data Hiding Using Integer Wavelet and Arnold Transform"],"prefix":"10.32604","volume":"35","author":[{"given":"Amishi","family":"Mahesh Kapadia","sequence":"first","affiliation":[]},{"given":"P.","family":"Nithyanandam","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"ref1","first-page":"161","article-title":"Reversible watermarking: Current status and key issues","volume":"2","author":"Feng","year":"2006","journal-title":"International Journal of Network Security"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","article-title":"Lossless generalized-LSB data embedding","volume":"14","author":"Celik","year":"2005","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","article-title":"Local-prediction-based difference expansion reversible watermarking","volume":"23","author":"Dragoi","year":"2014","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref4","series-title":"Int. Conf. on Software Engineering and Computer Systems","first-page":"741","article-title":"An overview of reversible data hiding schemes based on difference expansion technique","author":"Alqershi","year":"2009"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"5747","DOI":"10.1007\/s11042-014-1881-x","article-title":"Histogram shifting based reversible data hiding method using directed-prediction scheme","volume":"74","author":"Chen","year":"2015","journal-title":"Multimedia Tools and Applications"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/TIP.2013.2246179","article-title":"General framework to histogram-shifting based reversible data hiding","volume":"22","author":"Li","year":"2013","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"2460","DOI":"10.1016\/j.ins.2009.03.014","article-title":"Prediction-based reversible data hiding","volume":"179","author":"Tseng","year":"2009","journal-title":"Information Sciences"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","article-title":"High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion","volume":"93","author":"Li","year":"2013","journal-title":"Signal Processing"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1049\/el:20021131","article-title":"Distortion less data hiding based on integer wavelet transform","volume":"38","author":"Xuan","year":"2002","journal-title":"Electronics Letters"},{"key":"ref11","series-title":"Int. Conf. on Data Science, Machine Learning and Applications(ICDSMLA 2019)","first-page":"960","article-title":"A survey on reversible data hiding techniques","author":"Shirisha","year":"2020"},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"Z. M. Lu and S. Z. Guo, \u201cLossless information hiding in images on transform domains,\u201d 1st ed, London: Syngress, pp. 143\u2013204, 2016.","DOI":"10.1016\/B978-0-12-812006-4.00003-6"},{"key":"ref13","first-page":"489","article-title":"A review: Reversible information hiding and bio-inspired optimization","author":"Kapadia","journal-title":"Artificial Intelligence and Technologies"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1006\/acha.1997.0238","article-title":"Wavelet transforms that map integers to integers","volume":"5","author":"Calderbank","year":"1998","journal-title":"Applied and Computational Harmonic Analysis"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1049\/el:20021131","article-title":"Distortionless data hiding based on integer wavelet transform","volume":"38","author":"Zhu","year":"2002","journal-title":"Electronics Letters"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-642-01757-5_5","author":"Xuan","year":"2009","journal-title":"Transactions on Data Hiding and Multimedia Security IV"},{"key":"ref17","series-title":"IEEE Conf. on Electrical, Electronics and Computer Science (SCEECS)","first-page":"1","article-title":"Reversible data hiding for medical images using integer-to-integer wavelet transform","author":"Agrawal","year":"2016"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/s10916-016-0514-5","article-title":"Sensitive patient data hiding using a ROI reversible steganography scheme for DICOM images","volume":"40","author":"Mantos","year":"2016","journal-title":"Journal of Medical Systems"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","article-title":"A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine","volume":"77","author":"Zear","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.32604\/csse.2022.022305","article-title":"A robust 3-D medical watermarking based on wavelet transform for data protection","volume":"41","author":"Zhang","year":"2022","journal-title":"Computer Systems Science & Engineering"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"3035","DOI":"10.32604\/cmc.2022.022304","article-title":"Robust reversible audio watermarking scheme for telemedicine and privacy protection","volume":"71","author":"Zhang","year":"2022","journal-title":"Computers, Materials & Continua"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1007\/s11045-017-0497-5","article-title":"An integer wavelet transform based scheme for reversible data hiding in encrypted images","volume":"29","author":"Xiong","year":"2018","journal-title":"Multidimensional Systems and Signal Processing"},{"key":"ref23","series-title":"Int. Conf. on Electronics, Communication and Aerospace Technology (ICECA)","first-page":"831","article-title":"Secure data hiding technique using secret image scrambling","author":"Krishna","year":"2020"},{"key":"ref24","series-title":"Int. Conf. on Communication and Electronics Systems (ICCES)","first-page":"673","article-title":"Integer wavelet transform and arnold transform based image steganography with cryptanalysis","author":"Rima","year":"2019"},{"key":"ref25","series-title":"Int. Conf. on Inventive Computation Technologies (ICICT)","first-page":"840","article-title":"Secured data transmission through dual domain reversible data hiding and encryption in images","author":"Thanikaiselvan","year":"2020"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.ins.2021.02.015","article-title":"Dual-JPEG-image reversible data hiding","volume":"563","author":"Yao","year":"2021","journal-title":"Information Sciences"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1504\/IJICS.2020.104001","article-title":"Reversible data hiding methods in integer wavelet transform","volume":"12","author":"Kapadia","year":"2020","journal-title":"International Journal of Information and Computer Security"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1016\/j.procs.2020.01.013","article-title":"Secured reversible matrix embedding based on dual image using integer wavelet and Arnold transform","volume":"165","author":"Kapadia","year":"2019","journal-title":"Procedia Computer Science"},{"key":"ref29","first-page":"1","article-title":"Arnold\u2019s cat map","volume":"45","author":"Peterson","year":"1999","journal-title":"Math Linear Algebra"},{"key":"ref30","first-page":"118","article-title":"Digital knee X-ray images","volume":"1","year":"2021","journal-title":"Mendeley Data"},{"key":"ref31","doi-asserted-by":"crossref","unstructured":"D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, Handbook of Fingerprint Recognition (Second Edition), Springer, London, 2009","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"7849","DOI":"10.1007\/s11042-016-3398-y","article-title":"A novel method for digital image steganography based on a new three-dimensional chaotic map","volume":"76","author":"Sharif","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"ref33","series-title":"Int. Conf. on Information Technology(ICIT 2015)","first-page":"319","article-title":"Hide image in image based on lsb replacement and arnold transform","author":"Hada","year":"2015"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/ueditor\/files\/iasc\/TSP_IASC-35-1\/TSP_IASC_27070\/TSP_IASC_27070.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T21:28:45Z","timestamp":1733520525000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/iasc\/v35n1\/48154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.32604\/iasc.2023.027070","relation":{},"ISSN":["1079-8587"],"issn-type":[{"type":"print","value":"1079-8587"}],"subject":[],"published":{"date-parts":[[2023]]}}}