{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,11]],"date-time":"2023-10-11T01:30:15Z","timestamp":1696987815600},"reference-count":15,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"<p>With the exponential progression in communication technology, advanced mixed media content such as image, sound and video can be effectively duplicated and put away effortlessly without any loss in their original content. Therefore, it is distinctly critical to beat this and the need of a reasonable sort of copyright insurance framework inside the data. Reversible Data Hiding (RDH) keeps up the brilliant property that the first cover can be losslessly recouped after inserted information is separated while securing the picture substance's privacy. This may be liable to a few cause errors on information extraction and image reclamation. We propose to maintain the incredible property that the original cover has which can be losslessly recovered after embedded data is extracted while securing the image content's confidentiality. This strategy protects against different sorts of attacks on the computerized information and hence provides a robust answer for information theft cases.<\/p>","DOI":"10.4018\/ijisp.2019040101","type":"journal-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T14:06:54Z","timestamp":1554386814000},"page":"1-13","source":"Crossref","is-referenced-by-count":2,"title":["Reversible Data Hiding Scheme for Video"],"prefix":"10.4018","volume":"13","author":[{"given":"T.","family":"Bhaskar","sequence":"first","affiliation":[{"name":"JNTUH, Hyderabad, India"}]},{"given":"Madhu","family":"Oruganti","sequence":"additional","affiliation":[{"name":"Department of ECE, Sreenidhi Institute of Science and Technology SNIST, Hyderabad, India"}]}],"member":"2432","reference":[{"key":"IJISP.2019040101-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.05.020"},{"key":"IJISP.2019040101-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.09.005"},{"key":"IJISP.2019040101-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.04.012"},{"key":"IJISP.2019040101-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2012.10.081"},{"key":"IJISP.2019040101-4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2392556"},{"key":"IJISP.2019040101-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.11.024"},{"key":"IJISP.2019040101-6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2246179"},{"key":"IJISP.2019040101-7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2261062"},{"key":"IJISP.2019040101-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2012.01.021"},{"key":"IJISP.2019040101-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.10.008"},{"key":"IJISP.2019040101-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.05.005"},{"key":"IJISP.2019040101-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.01.002"},{"key":"IJISP.2019040101-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2008.12.017"},{"key":"IJISP.2019040101-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2012.04.009"},{"key":"IJISP.2019040101-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.08.029"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=226946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:23:18Z","timestamp":1651861398000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019040101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}