{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T00:27:06Z","timestamp":1743640026894,"version":"3.37.3"},"reference-count":54,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772572","62072481"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1016\/j.sigpro.2022.108639","type":"journal-article","created":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T06:00:01Z","timestamp":1654063201000},"page":"108639","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":13,"special_numbering":"C","title":["Reversible data hiding in JPEG images based on coefficient-first selection"],"prefix":"10.1016","volume":"200","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6075-3026","authenticated-orcid":false,"given":"Xie","family":"Yang","sequence":"first","affiliation":[]},{"given":"Taoyu","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3098-3373","authenticated-orcid":false,"given":"Fangjun","family":"Huang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sigpro.2022.108639_bib0001","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","article-title":"Reversible data hiding: advances in the past two decades","volume":"4","author":"Shi","year":"2016","journal-title":"IEEE Access"},{"key":"10.1016\/j.sigpro.2022.108639_bib0002","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1117\/12.435400","article-title":"Invertible authentication","volume":"4314","author":"Fridrich","year":"2001","journal-title":"Security and Watermarking of Multimedia contents III"},{"issue":"2","key":"10.1016\/j.sigpro.2022.108639_bib0003","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","article-title":"Lossless generalized-LSB data embedding","volume":"14","author":"Celik","year":"2005","journal-title":"IEEE Trans. on Image Process."},{"issue":"8","key":"10.1016\/j.sigpro.2022.108639_bib0004","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"10.1016\/j.sigpro.2022.108639_bib0005","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","article-title":"Expansion embedding techniques for reversible watermarking","volume":"16","author":"Thodi","year":"2007","journal-title":"IEEE Trans. on Image Process."},{"issue":"2","key":"10.1016\/j.sigpro.2022.108639_bib0006","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","article-title":"DE-based reversible data hiding with improved overflow location map","volume":"19","author":"Hu","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"10.1016\/j.sigpro.2022.108639_bib0007","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","article-title":"Reversible watermarking algorithm using sorting and prediction","volume":"19","author":"Sachnev","year":"2009","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"10.1016\/j.sigpro.2022.108639_bib0008","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"Ni","year":"2006","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"10","key":"10.1016\/j.sigpro.2022.108639_bib0009","doi-asserted-by":"crossref","first-page":"2620","DOI":"10.1016\/j.jss.2013.04.086","article-title":"Reversible watermarking method based on asymmetric-histogram shifting of prediction errors","volume":"86","author":"Chen","year":"2013","journal-title":"J. Syst. Softw."},{"issue":"7","key":"10.1016\/j.sigpro.2022.108639_bib0010","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TIFS.2013.2261062","article-title":"A novel reversible data hiding scheme based on two-dimensional difference-histogram modification","volume":"8","author":"Li","year":"2013","journal-title":"IEEE Trans. In. Forensic Secur."},{"issue":"2","key":"10.1016\/j.sigpro.2022.108639_bib0011","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/TMM.2012.2229262","article-title":"Reversible data hiding with optimal value transfer","volume":"15","author":"Zhang","year":"2013","journal-title":"IEEE Trans. Multimed."},{"issue":"9","key":"10.1016\/j.sigpro.2022.108639_bib0012","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. In. Forensic Secur."},{"issue":"1","key":"10.1016\/j.sigpro.2022.108639_bib0013","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/TIP.2014.2358881","article-title":"Optimal transition probability of reversible data hiding for general distortion metrics and its applications","volume":"24","author":"Zhang","year":"2015","journal-title":"IEEE Trans. on Image Process."},{"key":"10.1016\/j.sigpro.2022.108639_bib0014","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.jss.2015.04.085","article-title":"Asymmetric-histogram based reversible information hiding scheme using edge sensitivity detection","volume":"116","author":"Lu","year":"2016","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.sigpro.2022.108639_bib0015","first-page":"1","article-title":"Rate and distortion optimization for reversible data hiding using multiple histogram shifting","author":"Wang","year":"2016","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.sigpro.2022.108639_bib0016","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.sigpro.2019.05.020","article-title":"Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting","volume":"163","author":"Jia","year":"2019","journal-title":"Signal Process."},{"issue":"7","key":"10.1016\/j.sigpro.2022.108639_bib0017","doi-asserted-by":"crossref","first-page":"2176","DOI":"10.1109\/TCSVT.2018.2859792","article-title":"Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection","volume":"29","author":"Ou","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"11","key":"10.1016\/j.sigpro.2022.108639_bib0018","doi-asserted-by":"crossref","first-page":"3236","DOI":"10.1109\/TCSVT.2018.2878932","article-title":"Skewed histogram shifting for reversible data hiding using a pair of extreme predictions","volume":"29","author":"Kim","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"10.1016\/j.sigpro.2022.108639_bib0019","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1109\/TCSVT.2019.2942489","article-title":"Optimal reversible data hiding scheme based on multiple histograms modification","volume":"30","author":"Qi","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"10.1016\/j.sigpro.2022.108639_bib0020","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.1109\/TCSVT.2019.2915584","article-title":"Multiple histograms-based reversible data hiding: framework and realization","volume":"30","author":"Wang","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2022.108639_bib0021","article-title":"Reversible data hiding by using CNN prediction and adaptive embedding","author":"Hu","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.sigpro.2022.108639_bib0022","doi-asserted-by":"crossref","first-page":"3000","DOI":"10.1109\/TIFS.2021.3069173","article-title":"Reversible data hiding based on adaptive multiple histograms modification","volume":"16","author":"He","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.sigpro.2022.108639_bib0023","doi-asserted-by":"crossref","first-page":"5045","DOI":"10.1109\/TIP.2021.3078088","article-title":"Reversible data hiding based on dual pairwise prediction-error expansion","volume":"30","author":"He","year":"2021","journal-title":"IEEE Trans. Image Process."},{"issue":"12","key":"10.1016\/j.sigpro.2022.108639_bib0024","doi-asserted-by":"crossref","first-page":"4850","DOI":"10.1109\/TCSVT.2021.3055612","article-title":"Adaptive pairwise prediction-error expansion and multiple histograms modification for reversible data hiding","volume":"31","author":"Chang","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2022.108639_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107888","article-title":"Reversible data hiding method based on combining IPVO with bias-added Rhombus predictor by multi-predictor mechanism","volume":"180","author":"Fan","year":"2021","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2022.108639_bib0026","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1117\/12.465317","article-title":"Lossless data embedding for all image formats","volume":"4675","author":"Fridrich","year":"2002","journal-title":"Security and watermarking of multimedia contents IV"},{"issue":"7","key":"10.1016\/j.sigpro.2022.108639_bib0027","doi-asserted-by":"crossref","first-page":"1965","DOI":"10.1016\/j.jss.2013.03.083","article-title":"A high capacity lossless data hiding scheme for JPEG images","volume":"86","author":"Wang","year":"2013","journal-title":"J. Syst. Softw."},{"issue":"4","key":"10.1016\/j.sigpro.2022.108639_bib0028","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/TIP.2009.2035227","article-title":"Data embedding in JPEG bitstream by code mapping","volume":"19","author":"Mobasseri","year":"2010","journal-title":"IEEE Trans. Image Process."},{"issue":"2","key":"10.1016\/j.sigpro.2022.108639_bib0029","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.jss.2011.08.015","article-title":"Lossless data hiding in JPEG bitstream","volume":"85","author":"Qian","year":"2012","journal-title":"J. Syst. Softw."},{"issue":"8","key":"10.1016\/j.sigpro.2022.108639_bib0030","doi-asserted-by":"crossref","first-page":"2166","DOI":"10.1016\/j.jss.2013.03.102","article-title":"An improved VLC-based lossless data hiding scheme for JPEG images","volume":"86","author":"Hu","year":"2013","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.sigpro.2022.108639_bib0031","doi-asserted-by":"crossref","DOI":"10.1109\/TDSC.2020.3013326","article-title":"High capacity lossless data hiding in JPEG bitstream based on general VLC mapping","author":"Du","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"27\u201328","key":"10.1016\/j.sigpro.2022.108639_bib0032","doi-asserted-by":"crossref","first-page":"19045","DOI":"10.1007\/s11042-020-08809-6","article-title":"An improved VLC mapping method with parameter optimization for reversible data hiding in JPEG bitstream","volume":"79","author":"Zhang","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.sigpro.2022.108639_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2020.102821","article-title":"Reversible data hiding in JPEG bitstream using optimal VLC mapping","volume":"71","author":"Zhang","year":"2020","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.sigpro.2022.108639_bib0034","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.1109\/TCSVT.2020.3006494","article-title":"Optimized lossless data hiding in JPEG bitstream and relay transfer based extension","volume":"31","author":"Qiu","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2022.108639_bib0035","series-title":"International Conference Image Analysis and Recognition","first-page":"715","article-title":"Reversible data hiding for JPEG images based on histogram pairs","author":"Xuan","year":"2007"},{"issue":"9","key":"10.1016\/j.sigpro.2022.108639_bib0036","doi-asserted-by":"crossref","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","article-title":"Reversible data hiding in JPEG images","volume":"26","author":"Huang","year":"2016","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"10.1016\/j.sigpro.2022.108639_bib0037","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1186\/s13640-017-0206-1","article-title":"Improved reversible data hiding in JPEG images based on new coefficient selection strategy","volume":"2017","author":"Wedaj","year":"2017","journal-title":"J. Image Video Proc."},{"key":"10.1016\/j.sigpro.2022.108639_bib0038","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.sigpro.2018.02.002","article-title":"Reversible data hiding in JPEG image based on DCT frequency and block selection","volume":"148","author":"Hou","year":"2018","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2022.108639_bib0039","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.displa.2018.01.004","article-title":"Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients","volume":"51","author":"Liu","year":"2018","journal-title":"Displays"},{"key":"10.1016\/j.sigpro.2022.108639_bib0040","series-title":"Proceedings of the 14th IEEE International Conference on Signal Processing (ICSP)","first-page":"389","article-title":"A novel block sorting scheme for reversible data hiding in JPEG images","author":"Wang","year":"2018"},{"issue":"24","key":"10.1016\/j.sigpro.2022.108639_bib0041","doi-asserted-by":"crossref","first-page":"34541","DOI":"10.1007\/s11042-019-08109-8","article-title":"Reversible data hiding in JPEG images based on zero coefficients and distortion cost function","volume":"78","author":"Di","year":"2019","journal-title":"Multimed. Tools Appl."},{"issue":"9","key":"10.1016\/j.sigpro.2022.108639_bib0042","doi-asserted-by":"crossref","first-page":"835","DOI":"10.3390\/e21090835","article-title":"Reversible data hiding in JPEG images using quantized DC","volume":"21","author":"Kim","year":"2019","journal-title":"Entropy"},{"key":"10.1016\/j.sigpro.2022.108639_bib0043","series-title":"International Conference on Artificial Intelligence and Security","first-page":"442","article-title":"Reversible data hiding in JPEG images based on multiple histograms modification","author":"Lu","year":"2019"},{"issue":"9","key":"10.1016\/j.sigpro.2022.108639_bib0044","doi-asserted-by":"crossref","first-page":"11443","DOI":"10.1007\/s11042-018-6651-8","article-title":"A reversible data hiding scheme for JPEG images by doubling small quantized AC coefficients","volume":"78","author":"Xie","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.sigpro.2022.108639_bib0045","first-page":"1","article-title":"Minimum entropy and histogram-pair based JPEG image reversible data hiding","volume":"45","author":"Xuan","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"issue":"10","key":"10.1016\/j.sigpro.2022.108639_bib0046","doi-asserted-by":"crossref","first-page":"3942","DOI":"10.1109\/TCSVT.2020.3044186","article-title":"Reversible data hiding in JPEG images under multi-distortion metric","volume":"31","author":"Chen","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2022.108639_bib0047","doi-asserted-by":"crossref","first-page":"2121","DOI":"10.1109\/TIFS.2019.2958758","article-title":"Reversible data hiding in JPEG images based on negative influence models","volume":"15","author":"He","year":"2020","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.sigpro.2022.108639_bib0048","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107647","article-title":"Improved block ordering and frequency selection for reversible data hiding in JPEG images","volume":"175","author":"He","year":"2020","journal-title":"Signal Process."},{"issue":"7","key":"10.1016\/j.sigpro.2022.108639_bib0049","doi-asserted-by":"crossref","first-page":"2535","DOI":"10.1109\/TCSVT.2020.3027391","article-title":"Efficient reversible data hiding for JPEG images with multiple histograms modification","volume":"31","author":"Xiao","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"10.1016\/j.sigpro.2022.108639_bib0050","doi-asserted-by":"crossref","first-page":"2343","DOI":"10.1109\/TCSVT.2020.2969463","article-title":"Reversible data hiding in JPEG images with multi-objective optimization","volume":"30","author":"Yin","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.sigpro.2022.108639_bib0051","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107476","article-title":"Reversible data hiding for JPEG images based on pairwise nonzero AC coefficient expansion","volume":"171","author":"Li","year":"2020","journal-title":"Signal Process."},{"key":"10.1016\/j.sigpro.2022.108639_bib0052","doi-asserted-by":"crossref","first-page":"1620","DOI":"10.1109\/LSP.2021.3101424","article-title":"Reversible data hiding for JPEG images based on multiple two-dimensional histograms","volume":"28","author":"Xiao","year":"2021","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.sigpro.2022.108639_bib0053","series-title":"Human Vision and Electronic Imaging","first-page":"403","article-title":"DCT Coefficient Distributions","author":"Smoot","year":"1996"},{"issue":"10","key":"10.1016\/j.sigpro.2022.108639_bib0054","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/83.869177","article-title":"A mathematical analysis of the DCT coefficient distributions for images","volume":"9","author":"Lam","year":"2000","journal-title":"IEEE Trans. on Image Process."}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168422001785?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168422001785?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:46:37Z","timestamp":1711586797000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168422001785"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11]]},"references-count":54,"alternative-id":["S0165168422001785"],"URL":"https:\/\/doi.org\/10.1016\/j.sigpro.2022.108639","relation":{},"ISSN":["0165-1684"],"issn-type":[{"type":"print","value":"0165-1684"}],"subject":[],"published":{"date-parts":[[2022,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Reversible data hiding in JPEG images based on coefficient-first selection","name":"articletitle","label":"Article Title"},{"value":"Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.sigpro.2022.108639","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"108639"}}