{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T03:28:09Z","timestamp":1720754889111},"reference-count":36,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100020429","name":"Dr BR Ambedkar National Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020429","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1016\/j.jisa.2023.103663","type":"journal-article","created":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T07:16:55Z","timestamp":1702451815000},"page":"103663","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["HSB based reversible data hiding using sorting and pairwise expansion"],"prefix":"10.1016","volume":"80","author":[{"given":"Ankit Kumar","family":"Saini","sequence":"first","affiliation":[]},{"given":"Samayveer","family":"Singh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103663_bib0001","doi-asserted-by":"crossref","first-page":"25","DOI":"10.5815\/ijigsp.2013.06.04","article-title":"A new steganography technique using snake scan ordering strategy","volume":"6","author":"Kumar","year":"2013","journal-title":"Int J Image Graph Signal Process"},{"key":"10.1016\/j.jisa.2023.103663_bib0002","first-page":"13445","article-title":"An improved histogram-shifting-imitated reversible data hiding based on HVS characteristics","volume":"77","author":"Kumar","year":"2018"},{"issue":"1","key":"10.1016\/j.jisa.2023.103663_bib0003","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11042-014-2289-3","article-title":"A reversible high capacity data hiding scheme using pixel value adjusting feature","volume":"75","author":"Kumar","year":"2016","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"10.1016\/j.jisa.2023.103663_bib0004","doi-asserted-by":"crossref","first-page":"15803","DOI":"10.1007\/s11042-017-5156-1","article-title":"Recovery based high capacity reversible data hiding scheme using even-odd embedding","volume":"77","author":"Malik","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2023.103663_bib0005","article-title":"A reversible high capacity data hiding scheme using combinatorial strategy","author":"Kumar","year":"2016","journal-title":"Int J Multimed Intell Secur Inderscience"},{"issue":"8","key":"10.1016\/j.jisa.2023.103663_bib0006","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"8","key":"10.1016\/j.jisa.2023.103663_bib0007","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","article-title":"Reversible watermark using the difference expansion of a generalized integer transform","volume":"13","author":"Alattar","year":"2004","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"10.1016\/j.jisa.2023.103663_bib0008","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"10.1016\/j.jisa.2023.103663_bib0009","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"20","key":"10.1016\/j.jisa.2023.103663_bib0010","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1587\/elex.5.870","article-title":"Reversible image data hiding based on gradient adjusted prediction","volume":"5","author":"Fallahpour","year":"2008","journal-title":"IEICE Electron Exp"},{"key":"10.1016\/j.jisa.2023.103663_bib0011","series-title":"Proceedings of the 34th international technical conference on circuits\/systems, computers and communications (ITC-CSCC)","first-page":"1","article-title":"High-fidelity reversible data hiding using block extension strategy","author":"Kumar","year":"2019"},{"key":"10.1016\/j.jisa.2023.103663_bib0012","doi-asserted-by":"crossref","first-page":"22635","DOI":"10.1007\/s11042-020-09069-0","article-title":"I-PVO based high-capacity reversible data hiding using bin reservation strategy","volume":"79","author":"Kumar","year":"2020","journal-title":"Multimed Tools App Springer"},{"issue":"12","key":"10.1016\/j.jisa.2023.103663_bib0013","doi-asserted-by":"crossref","first-page":"5010","DOI":"10.1109\/TIP.2013.2281422","article-title":"Pairwise prediction-error expansion for efficient reversible data hiding","volume":"22","author":"Ou","year":"2013","journal-title":"IEEE Trans Image Process"},{"key":"10.1016\/j.jisa.2023.103663_bib0014","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.ins.2020.05.047","article-title":"Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context","volume":"536","author":"Kumar","year":"2020","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2023.103663_bib0015","first-page":"1","article-title":"High-quality reversible data hiding scheme using sorting and enhanced pairwise PEE","author":"Kaur","year":"2021","journal-title":"IET Image Proc"},{"key":"10.1016\/j.jisa.2023.103663_bib0016","article-title":"Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection","author":"Ou","year":"2023","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2023.103663_bib0017","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TMM.2003.809729","article-title":"Circular interpretation of bijective transformations in lossless watermarking for media asset management","volume":"5","author":"Vleeschouwer","year":"2003","journal-title":"IEEE Tran. Multimedia"},{"key":"10.1016\/j.jisa.2023.103663_bib0018","first-page":"2199","article-title":"Robust lossless image data hiding","volume":"3","author":"Ni","year":"2004","journal-title":"Multimedia Expo"},{"issue":"4","key":"10.1016\/j.jisa.2023.103663_bib0019","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/TCSVT.2008.918761","article-title":"Robust lossless image data hiding designed for semi-fragile image authentication","volume":"18","author":"Ni","year":"2008","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2023.103663_bib0020","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1016\/j.patcog.2009.09.016","article-title":"A lossless robust data hiding scheme","volume":"43","author":"Zeng","year":"2010","journal-title":"Pattern Recognit"},{"key":"10.1016\/j.jisa.2023.103663_bib0021","first-page":"153","article-title":"Histogram modification based robust image watermarking approach","volume":"1","author":"Deng","year":"2010","journal-title":"Int J Multimed Intell Secur"},{"issue":"5","key":"10.1016\/j.jisa.2023.103663_bib0022","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","article-title":"Robust histogram shape-based method for image watermarking","volume":"25","author":"Zong","year":"2015","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"11","key":"10.1016\/j.jisa.2023.103663_bib0032","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1049\/iet-ipr.2017.0151","article-title":"Reversible data hiding scheme based on significant-bit-difference expansion","volume":"11","author":"Wang","year":"2017","journal-title":"IET Image Proc"},{"key":"10.1016\/j.jisa.2023.103663_bib0033","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.ins.2019.09.062","article-title":"Robust reversible data hiding scheme based on two-layer embedding strategy","volume":"512","author":"Kumar","year":"2020","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2023.103663_bib0034","doi-asserted-by":"crossref","first-page":"11826","DOI":"10.3390\/app122211826","article-title":"Local-moment-driven robust reversible data hiding","volume":"12","author":"Singh","year":"2022","journal-title":"Appl Sci"},{"key":"10.1016\/j.jisa.2023.103663_bib0035","doi-asserted-by":"crossref","first-page":"119264","DOI":"10.1016\/j.ins.2023.119264","article-title":"Efficient reversible data hiding via two layers of double-peak embedding","volume":"644","author":"Wu","year":"2023","journal-title":"Information Sciences"},{"key":"10.1016\/j.jisa.2023.103663_bib0023","series-title":"Proceedings of the international conference on electrical, computer engineering and electronics","first-page":"29","article-title":"Histogram based algorithm robust to geometric distortions","author":"Hu","year":"2015"},{"key":"10.1016\/j.jisa.2023.103663_bib0024","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ins.2018.02.073","article-title":"Non-unit mapped radial moments platform for robust, geometric invariant image watermarking and reversible data hiding","volume":"447","author":"Golabi","year":"2018","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2023.103663_bib0025","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/02564602.2018.1476192","article-title":"A robust image steganography on resisting JPEG compression with no side information","volume":"35","author":"Bao","year":"2018","journal-title":"IETE Tech Rev"},{"key":"10.1016\/j.jisa.2023.103663_bib0026","doi-asserted-by":"crossref","first-page":"12313","DOI":"10.1007\/s10586-017-1614-9","article-title":"Reversible and robust image watermarking based on histogram shifting","volume":"22","author":"Rajkumar","year":"2019","journal-title":"Cluster Comput"},{"issue":"7","key":"10.1016\/j.jisa.2023.103663_bib0027","first-page":"4402","article-title":"Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA","volume":"34","author":"Singh","year":"2022","journal-title":"J King Saud Univ"},{"key":"10.1016\/j.jisa.2023.103663_bib0028","first-page":"1309","article-title":"A robust data hiding reversible technique for improving the security in e-health care system","volume":"132","author":"Kanwal","year":"2022","journal-title":"Comput Model Eng Sci"},{"issue":"5","key":"10.1016\/j.jisa.2023.103663_bib0029","doi-asserted-by":"crossref","first-page":"1222","DOI":"10.3390\/electronics12051222","article-title":"Secure reversible data hiding using block-wise histogram shifting","volume":"12","author":"Kamil Khudhair","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.jisa.2023.103663_bib0030","series-title":"Predictive data security using AI: insights and issues of blockchain, IoT, and devops","first-page":"119","article-title":"Robust and secured reversible data hiding approach for medical image transmission over smart healthcare environment","author":"Jyothsna Devi","year":"2022"},{"key":"10.1016\/j.jisa.2023.103663_bib0031","first-page":"1","article-title":"Robust data hiding scheme for highly compressed image exploiting btc with hamming code","author":"Datta","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"10.1016\/j.jisa.2023.103663_bib0036","article-title":"A review of different prediction methods for reversible data hiding","volume":"78","author":"Kumar","year":"2023","journal-title":"J Inf Secur Appl"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002478?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212623002478?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T22:57:04Z","timestamp":1709074624000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212623002478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":36,"alternative-id":["S2214212623002478"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103663","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"HSB based reversible data hiding using sorting and pairwise expansion","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103663","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103663"}}