Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions

Reversible data hiding hides data in an image such that the original image is recoverable. This paper presents a novel embedding framework with reduced distortion called skewed histogram shifting using a pair of extreme predictions. Unlike traditional prediction error histogram shifting schemes, whe...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on circuits and systems for video technology Vol. 29; no. 11; pp. 3236 - 3246
Main Authors Kim, Suah, Qu, Xiaochao, Sachnev, Vasily, Kim, Hyoung Joong
Format Journal Article
LanguageEnglish
Published New York IEEE 01.11.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Reversible data hiding hides data in an image such that the original image is recoverable. This paper presents a novel embedding framework with reduced distortion called skewed histogram shifting using a pair of extreme predictions. Unlike traditional prediction error histogram shifting schemes, where only one good prediction is used to generate a prediction error histogram, the proposed scheme uses a pair of extreme predictions to generate two skewed histograms. By exploiting the structure of the skewed histogram, only the pixels from the peak and the short tail are used for embedding, which decreases the distortion from the lesser number of pixels being shifted. Detailed experiments and analysis are provided using several image databases.
AbstractList Reversible data hiding hides data in an image such that the original image is recoverable. This paper presents a novel embedding framework with reduced distortion called skewed histogram shifting using a pair of extreme predictions. Unlike traditional prediction error histogram shifting schemes, where only one good prediction is used to generate a prediction error histogram, the proposed scheme uses a pair of extreme predictions to generate two skewed histograms. By exploiting the structure of the skewed histogram, only the pixels from the peak and the short tail are used for embedding, which decreases the distortion from the lesser number of pixels being shifted. Detailed experiments and analysis are provided using several image databases.
Author Kim, Hyoung Joong
Kim, Suah
Sachnev, Vasily
Qu, Xiaochao
Author_xml – sequence: 1
  givenname: Suah
  orcidid: 0000-0003-1692-2790
  surname: Kim
  fullname: Kim, Suah
  email: suahnkim@gmail.com
  organization: Graduate School of Information Security, Korea University, Seoul, South Korea
– sequence: 2
  givenname: Xiaochao
  surname: Qu
  fullname: Qu, Xiaochao
  email: qxc@meitu.com
  organization: MTlab, Meitu, Inc., Beijing, China
– sequence: 3
  givenname: Vasily
  orcidid: 0000-0001-7063-5069
  surname: Sachnev
  fullname: Sachnev, Vasily
  email: bassvasys@hotmail.com
  organization: Department of Information, Communications and Electronic Engineering, Catholic University of Korea, Bucheon, South Korea
– sequence: 4
  givenname: Hyoung Joong
  orcidid: 0000-0002-1144-6660
  surname: Kim
  fullname: Kim, Hyoung Joong
  email: khj-@korea.ac.kr
  organization: Graduate School of Information Security, Korea University, Seoul, South Korea
BookMark eNp9kE1PwzAMhiMEEhvwB-ASiXNHnDRLekRjfEhIIDYQt8ptXQhs7UjC17-nZYgDBy5xJL-PbT1Dttm0DTG2D2IEILKj-WR2Nx9JAXYkrbGZkhtsAFrbREqhN7u_0JBYCXqbDUN4EgJSm5oBu5890ztV_NyF2D54XPLZo6ujax543Xp-Q2_kgysWxE8wYher-tZt6F_k1-g8b2s-_YielsSvPVWujK5twi7bqnERaO-n7rDb0-l8cp5cXp1dTI4vk1JmOiZjMIXOqhRVUZuUoFQZgSo0AllbZGMLKFFoRIuFqAqRgsTUiEySsWk5VmqHHa7nrnz78koh5k_tq2-6lblU0MkxYE2XsutU6dsQPNV56SL2h0aPbpGDyHuP-bfHvPeY_3jsUPkHXXm3RP_5P3SwhhwR_QJWgwGl1BfEVYAf
CODEN ITCTEM
CitedBy_id crossref_primary_10_3390_math12091283
crossref_primary_10_1109_TPAMI_2021_3131250
crossref_primary_10_1007_s11042_024_19162_3
crossref_primary_10_1093_comjnl_bxab203
crossref_primary_10_1109_ACCESS_2023_3258461
crossref_primary_10_1109_TIFS_2019_2963766
crossref_primary_10_1016_j_jisa_2023_103649
crossref_primary_10_1016_j_sigpro_2020_107579
crossref_primary_10_1007_s11042_023_15319_8
crossref_primary_10_1007_s11042_024_18539_8
crossref_primary_10_3390_app14146370
crossref_primary_10_1007_s11042_022_12364_7
crossref_primary_10_1016_j_jksuci_2024_102112
crossref_primary_10_1007_s13369_021_05529_3
crossref_primary_10_1007_s11227_021_04226_0
crossref_primary_10_1007_s11760_024_03214_0
crossref_primary_10_1049_ise2_12062
crossref_primary_10_2139_ssrn_4011681
crossref_primary_10_1109_ACCESS_2024_3523230
crossref_primary_10_3390_electronics13173532
crossref_primary_10_1016_j_image_2021_116405
crossref_primary_10_1109_TCSVT_2023_3286393
crossref_primary_10_1007_s11042_022_12936_7
crossref_primary_10_1016_j_sigpro_2020_107562
crossref_primary_10_1109_TCSVT_2021_3055612
crossref_primary_10_1016_j_eswa_2024_123844
crossref_primary_10_1016_j_jisa_2023_103573
crossref_primary_10_1007_s11042_022_13770_7
crossref_primary_10_1117_1_JEI_32_4_043010
crossref_primary_10_1016_j_sigpro_2022_108577
crossref_primary_10_1016_j_ins_2020_08_019
crossref_primary_10_1016_j_sigpro_2020_107647
crossref_primary_10_1007_s42979_024_03214_4
crossref_primary_10_1016_j_sigpro_2023_108956
crossref_primary_10_1016_j_jvcir_2021_103349
crossref_primary_10_1109_JIOT_2024_3368416
crossref_primary_10_1109_LSP_2022_3149706
crossref_primary_10_1109_TBDATA_2024_3375155
crossref_primary_10_1109_TCSVT_2022_3192553
crossref_primary_10_1109_LSP_2021_3101424
crossref_primary_10_1016_j_jisa_2025_104030
crossref_primary_10_1145_3534565
crossref_primary_10_1007_s10044_024_01220_z
crossref_primary_10_1145_3645105
crossref_primary_10_1007_s10044_024_01370_0
crossref_primary_10_2139_ssrn_4021942
crossref_primary_10_1016_j_sigpro_2022_108527
crossref_primary_10_1109_TCSVT_2020_3027391
crossref_primary_10_1007_s11042_022_13705_2
crossref_primary_10_1007_s11042_023_15092_8
crossref_primary_10_1049_ipr2_12395
crossref_primary_10_1109_LSP_2023_3256701
crossref_primary_10_1016_j_sigpro_2024_109858
crossref_primary_10_1007_s10489_022_03211_1
crossref_primary_10_1109_TCSVT_2021_3125711
crossref_primary_10_1177_1550147720917014
crossref_primary_10_3390_computers10110152
crossref_primary_10_1109_TCSVT_2022_3166207
crossref_primary_10_1109_ACCESS_2019_2904040
crossref_primary_10_1109_TCSVT_2023_3282649
crossref_primary_10_1016_j_knosys_2024_111930
crossref_primary_10_1109_TCSVT_2024_3495673
crossref_primary_10_1109_TCSII_2020_2981550
crossref_primary_10_1016_j_ins_2021_09_019
crossref_primary_10_1109_TIFS_2019_2958758
crossref_primary_10_1016_j_jvcir_2024_104181
crossref_primary_10_1016_j_ins_2019_09_062
crossref_primary_10_3390_app10103375
crossref_primary_10_3390_e21090835
crossref_primary_10_3390_app12199418
crossref_primary_10_1109_TCSVT_2019_2942489
crossref_primary_10_1016_j_sigpro_2022_108639
crossref_primary_10_32604_cmc_2023_035964
crossref_primary_10_3390_math10224249
crossref_primary_10_3390_electronics12153245
crossref_primary_10_1016_j_sigpro_2025_109901
crossref_primary_10_1109_TCSVT_2022_3164013
crossref_primary_10_1016_j_jisa_2022_103137
crossref_primary_10_1088_1402_4896_ac88a3
crossref_primary_10_1016_j_eswa_2021_115475
crossref_primary_10_1109_TIFS_2021_3069173
crossref_primary_10_1109_TKDE_2024_3438943
crossref_primary_10_1007_s11042_023_15255_7
crossref_primary_10_1155_2022_4858806
crossref_primary_10_1016_j_eswa_2023_120610
crossref_primary_10_1007_s10489_023_04707_0
crossref_primary_10_1016_j_image_2021_116274
crossref_primary_10_1007_s11042_024_18797_6
crossref_primary_10_3390_jimaging7120268
crossref_primary_10_1016_j_sigpro_2019_107264
crossref_primary_10_1109_LSP_2024_3455995
crossref_primary_10_1109_TIFS_2025_3544956
crossref_primary_10_1016_j_jisa_2022_103180
Cites_doi 10.1109/TIP.2011.2150233
10.1016/j.sigpro.2011.06.006
10.1109/TCSVT.2012.2224052
10.1016/j.sigpro.2015.01.002
10.1016/j.dsp.2013.11.002
10.1109/LSP.2008.2001984
10.1117/12.435400
10.1109/TIP.2011.2162424
10.1016/j.jss.2009.05.051
10.1109/TCSVT.2009.2020257
10.1109/ICASSP.2014.6855042
10.1109/TCSVT.2006.869964
10.1109/WIFS.2013.6707819
10.1109/TIFS.2012.2224108
10.1109/TIP.2011.2114354
10.1109/TIP.2006.891046
10.1016/j.sigpro.2012.07.025
10.1155/2010/104835
10.5370/JEET.2016.11.4.974
10.1587/elex.5.870
10.1155/S1110865702000537
10.1007/s11042-014-1881-x
10.1109/ICIP.2010.5652508
10.1109/ICME.2009.5202783
10.1016/j.sigpro.2012.05.034
10.1109/TIP.2005.859373
10.1109/TIFS.2011.2145372
10.1109/TIP.2005.863053
10.1109/TIP.2014.2307482
10.1109/LSP.2006.884895
10.1155/2010/316820
10.1145/997817.997857
10.1109/ICME.2014.6890276
10.1186/s13640-016-0144-3
10.1109/TIP.2004.840686
10.1109/TIFS.2015.2444354
10.3837/tiis.2010.08.012
10.1109/TIFS.2009.2035975
10.1109/TIFS.2013.2261062
10.1016/j.image.2014.05.003
10.1109/TIP.2016.2549458
10.1109/TCSVT.2009.2017409
10.1109/TCSVT.2011.2130410
10.1109/TIFS.2013.2248725
10.1049/el:20021131
10.1109/TIP.2004.828418
10.1109/TIFS.2008.924600
10.1007/11922841_28
10.1109/TCSVT.2003.815962
10.1109/TIP.2013.2281422
10.1109/TIFS.2007.905146
10.1109/ICME.2006.262782
10.1109/ICASSP.2014.6855043
10.1145/2482513.2482535
10.1016/j.jvcir.2015.06.010
10.1109/LSP.2015.2459055
10.1109/LSP.2014.2346989
10.5370/JEET.2015.10.1.422
10.1109/ISCAS.2010.5537323
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCSVT.2018.2878932
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2205
EndPage 3246
ExternalDocumentID 10_1109_TCSVT_2018_2878932
8517133
Genre orig-research
GrantInformation_xml – fundername: National Research Foundation of Korea
  grantid: 2018K2A9A2A06024168; FY2018
  funderid: 10.13039/501100003725
– fundername: Institute for Information and communications Technology Promotion
  grantid: 2018-0-00365
  funderid: 10.13039/501100010418
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
ICLAB
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
RXW
TAE
TN5
VH1
AAYXX
CITATION
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c295t-617b59d4a3bf74e1c39e13b5a1e88b9681a2a05aa8ab0db0412a47092e784c633
IEDL.DBID RIE
ISSN 1051-8215
IngestDate Sun Jun 29 15:25:01 EDT 2025
Thu Apr 24 23:11:20 EDT 2025
Tue Jul 01 00:41:12 EDT 2025
Wed Aug 27 02:35:31 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 11
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c295t-617b59d4a3bf74e1c39e13b5a1e88b9681a2a05aa8ab0db0412a47092e784c633
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1144-6660
0000-0001-7063-5069
0000-0003-1692-2790
PQID 2311107187
PQPubID 85433
PageCount 11
ParticipantIDs ieee_primary_8517133
crossref_citationtrail_10_1109_TCSVT_2018_2878932
crossref_primary_10_1109_TCSVT_2018_2878932
proquest_journals_2311107187
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-11-01
PublicationDateYYYYMMDD 2019-11-01
PublicationDate_xml – month: 11
  year: 2019
  text: 2019-11-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on circuits and systems for video technology
PublicationTitleAbbrev TCSVT
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref13
ref56
ref12
ref59
ref15
ref58
ref14
ref53
ref52
ref11
ref54
ref10
li (ref55) 2015; 10
gao (ref35) 2011; 21
ref17
ref16
ref19
ref18
gui (ref49) 2012
li (ref24) 2013; 8
luo (ref32) 2010; 5
ref51
ref50
kim (ref5) 2015
ref46
ref45
li (ref36) 2011; 20
ref48
ref47
ref42
ref41
ref44
ref43
ref8
ref7
ref9
ref4
ref3
ref6
dragoi (ref38) 2012
ref40
ref34
ref37
ref31
ref30
ref33
ref2
ref1
ref39
ref23
ref26
ref25
ref22
ref21
ref28
ref27
ref29
ni (ref20) 2006; 16
ref60
ref62
ref61
wang (ref63) 2011
References_xml – start-page: 1
  year: 2011
  ident: ref63
  article-title: Grassmann hashing for approximate nearest neighbor search in high dimensional space
  publication-title: Proc IEEE Int Conf Multimedia Expo
– volume: 20
  start-page: 3524
  year: 2011
  ident: ref36
  article-title: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection
  publication-title: IEEE Trans Image Process
  doi: 10.1109/TIP.2011.2150233
– ident: ref48
  doi: 10.1016/j.sigpro.2011.06.006
– ident: ref40
  doi: 10.1109/TCSVT.2012.2224052
– ident: ref28
  doi: 10.1016/j.sigpro.2015.01.002
– ident: ref27
  doi: 10.1016/j.dsp.2013.11.002
– ident: ref45
  doi: 10.1109/LSP.2008.2001984
– start-page: 1
  year: 2015
  ident: ref5
  article-title: Automatic contrast enhancement using reversible data hiding
  publication-title: Proc IEEE Int Workshop Inf Forensics Secur
– ident: ref10
  doi: 10.1117/12.435400
– ident: ref47
  doi: 10.1109/TIP.2011.2162424
– ident: ref31
  doi: 10.1016/j.jss.2009.05.051
– ident: ref6
  doi: 10.1109/TCSVT.2009.2020257
– ident: ref58
  doi: 10.1109/ICASSP.2014.6855042
– volume: 16
  start-page: 354
  year: 2006
  ident: ref20
  article-title: Reversible data hiding
  publication-title: IEEE Trans Circuits Syst Video Technol
  doi: 10.1109/TCSVT.2006.869964
– start-page: 1688
  year: 2012
  ident: ref38
  article-title: Improved rhombus interpolation for reversible watermarking by difference expansion
  publication-title: Proc IEEE Signal Process Conf
– ident: ref52
  doi: 10.1109/WIFS.2013.6707819
– ident: ref19
  doi: 10.1109/TIFS.2012.2224108
– ident: ref62
  doi: 10.1109/TIP.2011.2114354
– ident: ref29
  doi: 10.1109/TIP.2006.891046
– ident: ref26
  doi: 10.1016/j.sigpro.2012.07.025
– ident: ref33
  doi: 10.1155/2010/104835
– ident: ref56
  doi: 10.5370/JEET.2016.11.4.974
– ident: ref30
  doi: 10.1587/elex.5.870
– ident: ref7
  doi: 10.1155/S1110865702000537
– ident: ref59
  doi: 10.1007/s11042-014-1881-x
– ident: ref46
  doi: 10.1109/ICIP.2010.5652508
– ident: ref60
  doi: 10.1109/ICME.2009.5202783
– ident: ref39
  doi: 10.1016/j.sigpro.2012.05.034
– ident: ref15
  doi: 10.1109/TIP.2005.859373
– ident: ref37
  doi: 10.1109/TIFS.2011.2145372
– ident: ref9
  doi: 10.1109/TIP.2005.863053
– ident: ref42
  doi: 10.1109/TIP.2014.2307482
– ident: ref44
  doi: 10.1109/LSP.2006.884895
– ident: ref51
  doi: 10.1155/2010/316820
– ident: ref61
  doi: 10.1145/997817.997857
– ident: ref54
  doi: 10.1109/ICME.2014.6890276
– ident: ref57
  doi: 10.1186/s13640-016-0144-3
– ident: ref8
  doi: 10.1109/TIP.2004.840686
– start-page: 947
  year: 2012
  ident: ref49
  article-title: A novel integer transform for efficient reversible watermarking
  publication-title: Proc IEEE Int Conf Pattern Recognit
– volume: 10
  start-page: 2016
  year: 2015
  ident: ref55
  article-title: Efficient reversible data hiding based on multiple histograms modification
  publication-title: IEEE Trans Inf Forensics Security
  doi: 10.1109/TIFS.2015.2444354
– ident: ref12
  doi: 10.3837/tiis.2010.08.012
– volume: 5
  start-page: 187
  year: 2010
  ident: ref32
  article-title: Reversible image watermarking using interpolation technique
  publication-title: IEEE Trans Inf Forensics Security
  doi: 10.1109/TIFS.2009.2035975
– volume: 8
  start-page: 1091
  year: 2013
  ident: ref24
  article-title: A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
  publication-title: IEEE Trans Inf Forensics Security
  doi: 10.1109/TIFS.2013.2261062
– ident: ref25
  doi: 10.1016/j.image.2014.05.003
– ident: ref17
  doi: 10.1109/TIP.2016.2549458
– ident: ref18
  doi: 10.1109/TCSVT.2009.2017409
– volume: 21
  start-page: 1061
  year: 2011
  ident: ref35
  article-title: Lossless data embedding using generalized statistical quantity histogram
  publication-title: IEEE Trans Circuits Syst Video Technol
  doi: 10.1109/TCSVT.2011.2130410
– ident: ref1
  doi: 10.1109/TIFS.2013.2248725
– ident: ref11
  doi: 10.1049/el:20021131
– ident: ref14
  doi: 10.1109/TIP.2004.828418
– ident: ref16
  doi: 10.1109/TIFS.2008.924600
– ident: ref22
  doi: 10.1007/11922841_28
– ident: ref13
  doi: 10.1109/TCSVT.2003.815962
– ident: ref23
  doi: 10.1109/TIP.2013.2281422
– ident: ref43
  doi: 10.1109/TIFS.2007.905146
– ident: ref21
  doi: 10.1109/ICME.2006.262782
– ident: ref53
  doi: 10.1109/ICASSP.2014.6855043
– ident: ref41
  doi: 10.1145/2482513.2482535
– ident: ref4
  doi: 10.1016/j.jvcir.2015.06.010
– ident: ref3
  doi: 10.1109/LSP.2015.2459055
– ident: ref2
  doi: 10.1109/LSP.2014.2346989
– ident: ref50
  doi: 10.5370/JEET.2015.10.1.422
– ident: ref34
  doi: 10.1109/ISCAS.2010.5537323
SSID ssj0014847
Score 2.5768478
Snippet Reversible data hiding hides data in an image such that the original image is recoverable. This paper presents a novel embedding framework with reduced...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3236
SubjectTerms Data encapsulation
Distortion
Embedding
Histograms
Pixels
Prediction theory
Reversible data hiding
reversible watermarking
skewed histogram shifting
Watermarking
Title Skewed Histogram Shifting for Reversible Data Hiding Using a Pair of Extreme Predictions
URI https://ieeexplore.ieee.org/document/8517133
https://www.proquest.com/docview/2311107187
Volume 29
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZgJzjwRoyXcuAGHWmbtskRARNCAk1soN2qJHUE2rSh0QnErydJu4mXELcenCiy3diOP9sAR8LorMi0CQoTmoBFkQ7snceCTCFlmnLBY1eNfHObXt2z637SX4CTeS0MInrwGbbcp8_lF2M9dU9lp26OvI2pFmHRBm5VrdY8Y8C4HyZm3YUw4NaOzQpkqDjtnXcfeg7FxVs2PrAGOvpihPxUlR9Xsbcv7VW4mZ2sgpUMWtNStfT7t6aN_z36GqzUjiY5qzRjHRZwtAHLn9oPbkK_O8BXLIhvFeJQWqT7-GQcDppYV5bcoYdsqCGSC1lKS-bsHPEgAyJJRz5NyNiQy7fSvTGSzsTlfLwab8F9-7J3fhXUkxYCHYmkdHWCKhEFk7EyGcNQxwLDWCUyRM6VSHkoI0kTKblUtFCuR5dkGRURZpzpNI63oTEaj3AHCGq7FTWxMVqwzPo3aZEqIVMrEqbjhDYhnLE-13UbcjcNY5j7cISK3Isrd-LKa3E14Xi-5rlqwvEn9abj_5yyZn0T9mcSzuv_9CW33q0LgEOe7f6-ag-W7N6iqj7ch0Y5meKBdUNKdej17wMtmNgF
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB5ROLQceJRWbHn5wK1ksRMnsY-Ih5bHIsQuaG-R7YxVBNqttlkV8euxnewKCkK95TBOrJmJZ8bzzQzArrQmL3Njo9IyG_E4NpE783iUa6TcUCFF4quRu5dZ54afDdLBHOzNamEQMYDPsO0fQy6_HJmJvyrb93PkXUz1CRac3U9ZXa01yxlwEcaJOYeBRcJZsmmJDJX7_cPebd_juETbRQjORMevzFCYq_LmMA4W5mQZutO91cCS-_ak0m3z9E_bxv_d_AosNa4mOah1YxXmcPgVFl80IFyDQe8e_2JJQrMQj9MivV931iOhiXNmyTUG0IZ-QHKkKuXIvKUjAWZAFLlSd2MysuT4sfK3jORq7LM-QZG_wc3Jcf-wEzWzFiITy7TylYI6lSVXibY5R2YSiSzRqWIohJaZYCpWNFVKKE1L7bt0KZ5TGWMuuMmS5DvMD0dDXAeCxr2K2sRaI3nuPJyszLRUmRMJN0lKW8CmrC9M04jcz8N4KEJAQmURxFV4cRWNuFrwc7bmd92G40PqNc__GWXD-hZsTiVcNH_qn8L5tz4EZiL_8f6qHfjc6XcviovTy_MN-OK-I-taxE2Yr8YT3HJOSaW3gy4-A53B204
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Skewed+Histogram+Shifting+for+Reversible+Data+Hiding+Using+a+Pair+of+Extreme+Predictions&rft.jtitle=IEEE+transactions+on+circuits+and+systems+for+video+technology&rft.au=Kim%2C+Suah&rft.au=Qu%2C+Xiaochao&rft.au=Sachnev%2C+Vasily&rft.au=Kim%2C+Hyoung+Joong&rft.date=2019-11-01&rft.pub=IEEE&rft.issn=1051-8215&rft.volume=29&rft.issue=11&rft.spage=3236&rft.epage=3246&rft_id=info:doi/10.1109%2FTCSVT.2018.2878932&rft.externalDocID=8517133
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1051-8215&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1051-8215&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1051-8215&client=summon