{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,24]],"date-time":"2023-05-24T21:30:13Z","timestamp":1684963813594},"reference-count":12,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>A novel high capacity and security reversible data hiding scheme is proposed in this article, in which the secret data is represented by different orthogonal spreading sequences and repeatedly embedded into the cover image without disturbing each other in the light of Code Division Multiple Access (CDMA) technique, and thus the embedding capacity is enlarged. As most elements of orthogonal spreading sequences are mutually canceled in the process of repeated embedding, it keeps the distortion of the embedded image at a low level even with high embedding capacity. Moreover, only the receiver who has the spreading sequence and the embedding gain factor the same as the sender can extract the secret data and achieve the original image exactly, thus the proposed scheme achieves high embedding security than other schemes. The results of the experiment demonstrates that the CDMA based reversible data hiding scheme could achieve higher image quality at moderate-to-high embedding capacity compared with other state-of-the-art schemes.<\/jats:p>","DOI":"10.4018\/ijdcf.2019100108","type":"journal-article","created":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T10:10:22Z","timestamp":1569579022000},"page":"118-129","source":"Crossref","is-referenced-by-count":1,"title":["A New Kind of High Capacity and Security Reversible Data Hiding Scheme"],"prefix":"10.4018","volume":"11","author":[{"given":"Bin","family":"Ma","sequence":"first","affiliation":[{"name":"College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]},{"given":"Xiao-Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]},{"given":"Bing","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019100108-0","first-page":"157","article-title":"Reversible data hiding. In International Conference on Image Processing","volume":"2","author":"M. U.Celik","year":"2002","journal-title":"Proceedings"},{"key":"IJDCF.2019100108-1","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1117\/12.435400","article-title":"Invertible authentication","volume":"Vol. 4314","author":"J.Fridrich","year":"2001","journal-title":"Security and Watermarking of Multimedia contents III"},{"key":"IJDCF.2019100108-2","first-page":"1321","article-title":"Reversible Image Authentication Based on Watermarking.","author":"S.Lee","year":"2006","journal-title":"IEEE International Conference on Multimedia and Expo"},{"key":"IJDCF.2019100108-3","doi-asserted-by":"crossref","unstructured":"Li, X., Yang, B., & Zeng, T. (2011). Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Transactions on Image Processing, 20(12), 3524-3533.","DOI":"10.1109\/TIP.2011.2150233"},{"key":"IJDCF.2019100108-4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2261062"},{"key":"IJDCF.2019100108-5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2566261"},{"key":"IJDCF.2019100108-6","first-page":"1","article-title":"Reversible data hiding.","volume":"Vol. 2","author":"Z.Ni","year":"2004","journal-title":"International Workshop on Digital Watermarking"},{"key":"IJDCF.2019100108-7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"IJDCF.2019100108-8","doi-asserted-by":"crossref","unstructured":"Thodi, D. M., & Rodr\u00edguez, J. J. (2007). Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing,16(3), 721-730.","DOI":"10.1109\/TIP.2006.891046"},{"key":"IJDCF.2019100108-9","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"IJDCF.2019100108-10","first-page":"378","article-title":"Optimal Histogram-Pair and Prediction-Error Based Reversible Data Hiding for Medical Images.","author":"X.Tong","year":"2015","journal-title":"International Workshop on Digital Watermarking"},{"key":"IJDCF.2019100108-11","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2009.0316"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=238888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T12:02:41Z","timestamp":1651838561000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019100108"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":12,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019100108","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}