{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T04:47:20Z","timestamp":1769921240065,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T00:00:00Z","timestamp":1632355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T00:00:00Z","timestamp":1632355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s00371-021-02285-1","type":"journal-article","created":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T12:14:08Z","timestamp":1632399248000},"page":"4129-4150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer"],"prefix":"10.1007","volume":"38","author":[{"given":"S.","family":"Jaya Prakash","sequence":"first","affiliation":[]},{"given":"K.","family":"Mahalakshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,23]]},"reference":[{"key":"2285_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4375-6","volume-title":"Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures","author":"NF Johnson","year":"2001","unstructured":"Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures, vol. 1. Springer Science & Business Media, Boston (2001)"},{"issue":"13","key":"2285_CR2","doi-asserted-by":"publisher","first-page":"17333","DOI":"10.1007\/s11042-017-5308-3","volume":"77","author":"M Douglas","year":"2018","unstructured":"Douglas, M., Bailey, K., Leeney, M., Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimed. Tools Appl. 77(13), 17333\u201317373 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"2285_CR3","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727\u2013752 (2010)","journal-title":"Signal Process."},{"issue":"6","key":"2285_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5815\/ijmecs.2012.06.04","volume":"4","author":"S Gupta","year":"2012","unstructured":"Gupta, S., Goyal, A., Bhushan, B.: Information hiding using least significant bit steganography and cryptography. Int. J. Mod. Educ. Comput. Sci. 4(6), 27 (2012)","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"issue":"3","key":"2285_CR5","first-page":"275","volume":"31","author":"AK Sahu","year":"2019","unstructured":"Sahu, A.K., Swain, G.: High fidelity-based reversible data hiding using modified LSB matching and pixel difference. J. King Saud University-Computer Inf. Sci. 31(3), 275\u2013414 (2019)","journal-title":"J. King Saud University-Computer Inf. Sci."},{"issue":"1","key":"2285_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-018-0211-x","volume":"10","author":"AK Sahu","year":"2019","unstructured":"Sahu, A.K., Swain, G.: A novel n-rightmost bit replacement image steganography technique. 3D Research 10(1), 1\u201318 (2019)","journal-title":"3D Research"},{"issue":"3","key":"2285_CR7","first-page":"299","volume":"12","author":"MM Gowthul Alam","year":"2017","unstructured":"Gowthul Alam, M.M., Baulkani, S.: Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. Int. J. Bus. Intell. Data Min. 12(3), 299 (2017)","journal-title":"Int. J. Bus. Intell. Data Min."},{"issue":"3","key":"2285_CR8","first-page":"117","volume":"9","author":"V Sundararaj","year":"2016","unstructured":"Sundararaj, V.: An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int. J. Intell. Eng. Syst. 9(3), 117\u2013126 (2016)","journal-title":"Int. J. Intell. Eng. Syst."},{"issue":"4","key":"2285_CR9","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s00500-018-3124-y","volume":"23","author":"MM Gowthul Alam","year":"2019","unstructured":"Gowthul Alam, M.M., Baulkani, S.: Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Comput. 23(4), 1079\u20131098 (2019)","journal-title":"Soft Comput."},{"issue":"4","key":"2285_CR10","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1504\/IJBET.2019.103242","volume":"31","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj, V.: Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. Int. J. Biomed. Eng. Technol. 31(4), 325 (2019)","journal-title":"Int. J. Biomed. Eng. Technol."},{"issue":"2","key":"2285_CR11","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s10115-018-1263-1","volume":"60","author":"MM Gowthul Alam","year":"2019","unstructured":"Gowthul Alam, M.M., Baulkani, S.: Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowl. Inf. Syst. 60(2), 971\u20131000 (2019)","journal-title":"Knowl. Inf. Syst."},{"key":"2285_CR12","doi-asserted-by":"publisher","first-page":"105046","DOI":"10.1016\/j.dib.2019.105046","volume":"28","author":"BA Hassan","year":"2020","unstructured":"Hassan, B.A., Rashid, T.A.: Datasets on statistical analysis and performance evaluation of backtracking search optimisation algorithm compared with its counterpart algorithms. Data Br. 28, 105046 (2020)","journal-title":"Data Br."},{"key":"2285_CR13","first-page":"1","volume":"33","author":"BA Hassan","year":"2020","unstructured":"Hassan, B.A.: CSCF: a chaotic sine cosine firefly algorithm for practical application problems. Neural Comput. Appl. 33, 1\u201320 (2020)","journal-title":"Neural Comput. Appl."},{"issue":"16","key":"2285_CR14","doi-asserted-by":"publisher","first-page":"22691","DOI":"10.1007\/s11042-019-7577-5","volume":"78","author":"MR Rejeesh","year":"2019","unstructured":"Rejeesh, M.R.: Interest point based face recognition using adaptive neuro fuzzy inference system. Multimed. Tools Appl. 78(16), 22691\u201322710 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"2285_CR15","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.cose.2018.04.009","volume":"77","author":"V Sundararaj","year":"2018","unstructured":"Sundararaj, V., Muthukumar, S., Kumar, R.S.: An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput. Secur. 77, 277\u2013288 (2018)","journal-title":"Comput. Secur."},{"issue":"11","key":"2285_CR16","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1002\/pip.3315","volume":"28","author":"V Sundararaj","year":"2020","unstructured":"Sundararaj, V., Anoop, V., Dixit, P., Arjaria, A., Chourasia, U., Bhambri, P., Rejeesh, M.R., Sundararaj, R.: CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Prog. Photovolt. Res. Appl. 28(11), 1128\u20131145 (2020)","journal-title":"Prog. Photovolt. Res. Appl."},{"issue":"1","key":"2285_CR17","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11277-018-6014-9","volume":"104","author":"S Vinu","year":"2019","unstructured":"Vinu, S.: Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel. Pers. Commun. 104(1), 173\u2013197 (2019)","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"2285_CR18","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1109\/TIFS.2011.2135853","volume":"6","author":"I-J Lai","year":"2011","unstructured":"Lai, I.-J., Tsai, W.-H.: Secret-fragment-visible mosaic image\u2013a new computer art and its application to information hiding. IEEE Trans. Inf. Forensics Secur. 6(3), 936\u2013945 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2285_CR19","doi-asserted-by":"publisher","first-page":"108579","DOI":"10.1109\/ACCESS.2020.3000993","volume":"8","author":"L Yang","year":"2020","unstructured":"Yang, L., Deng, H., Dang, X.: A novel coverless information hiding method based on the most significant bit of the cover image. IEEE Access 8, 108579\u2013108591 (2020)","journal-title":"IEEE Access"},{"key":"2285_CR20","doi-asserted-by":"publisher","first-page":"5045","DOI":"10.1109\/TIP.2021.3078088","volume":"30","author":"W He","year":"2021","unstructured":"He, W., Cai, Z.: Reversible data hiding based on dual pairwise prediction-error expansion. IEEE Trans. Image Process. 30, 5045\u20135055 (2021). https:\/\/doi.org\/10.1109\/TIP.2021.3078088","journal-title":"IEEE Trans. Image Process."},{"key":"2285_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3080497","author":"S Sheidani","year":"2021","unstructured":"Sheidani, S., Mahmoudi-Aznaveh, A., Eslami, Z.: CPA-Secure privacy-preserving reversible data hiding for JPEG images. IEEE Trans. Inf. Forensics Secur. (2021). https:\/\/doi.org\/10.1109\/TIFS.2021.3080497","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2285_CR22","doi-asserted-by":"publisher","first-page":"179891","DOI":"10.1109\/ACCESS.2019.2955990","volume":"7","author":"Z Zhou","year":"2019","unstructured":"Zhou, Z., Cao, Y., Wang, M., Fan, E., Wu, Q.M.J.: Faster-RCNN based robust coverless information hiding system in cloud environment. IEEE Access 7, 179891\u2013179897 (2019)","journal-title":"IEEE Access"},{"key":"2285_CR23","doi-asserted-by":"publisher","first-page":"214732","DOI":"10.1109\/ACCESS.2020.3040048","volume":"8","author":"S Li","year":"2020","unstructured":"Li, S., Liang, Hu., Sun, C., Chi, L., Li, T., Li, H.: A reversible data hiding algorithm based on prediction error with large amounts of data hiding in spatial domain. IEEE Access 8, 214732\u2013214741 (2020)","journal-title":"IEEE Access"},{"key":"2285_CR24","doi-asserted-by":"publisher","first-page":"107920","DOI":"10.1016\/j.sigpro.2020.107920","volume":"181","author":"L Li","year":"2021","unstructured":"Li, L., Zhang, W., Qin, C., Chen, K., Zhou, W., Yu, N.: Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181, 107920 (2021)","journal-title":"Signal Process."},{"key":"2285_CR25","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jvcir.2017.01.004","volume":"43","author":"H Yao","year":"2017","unstructured":"Yao, H., Qin, C., Tang, Z., Tian, Y.: Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43, 152\u2013163 (2017)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"2285_CR26","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.dsp.2018.06.014","volume":"81","author":"J Yin","year":"2018","unstructured":"Yin, J., Bo, Ou., Liu, X., Peng, F.: Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching. Digit. Signal Process. 81, 173\u2013185 (2018)","journal-title":"Digit. Signal Process."},{"issue":"12","key":"2285_CR27","doi-asserted-by":"publisher","first-page":"3332","DOI":"10.1109\/TIFS.2019.2914557","volume":"14","author":"Y-C Chen","year":"2019","unstructured":"Chen, Y.-C., Hung, T.-H., Hsieh, S.-H., Shiu, C.-W.: A new reversible data hiding in encrypted image based on multi-secret sharing and lightweight cryptographic algorithms. IEEE Trans. Inf. Forensics Secur. 14(12), 3332\u20133343 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2285_CR28","first-page":"116118","volume":"92","author":"J Hou","year":"2021","unstructured":"Hou, J., Ou, B., Tian, H., Qin, Z.: Reversible data hiding based on multiple histograms modification and deep neural networks. Signal Process.: Image Commun. 92, 116118 (2021)","journal-title":"Signal Process.: Image Commun."},{"key":"2285_CR29","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.renene.2020.05.150","volume":"160","author":"H Zang","year":"2020","unstructured":"Zang, H., Liu, L., Sun, Li., Cheng, L., Wei, Z., Sun, G.: Short-term global horizontal irradiance forecasting based on a hybrid CNN-LSTM model with spatiotemporal correlations. Renew. Energy 160, 26\u201341 (2020)","journal-title":"Renew. Energy"},{"key":"2285_CR30","doi-asserted-by":"crossref","unstructured":"Albawi, S, Mohammed, TA, Al-Zawi, S.: Understanding of a convolutional neural network. In: 2017 International Conference on Engineering and Technology (ICET), pp. 1\u20136. IEEE, (2017).","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"2285_CR31","unstructured":"Gatys, LA, Ecker, AS, Bethge, M.:A neural algorithm of artistic style.\u00a0arXiv preprintarXiv:1508.06576 (2015)"},{"key":"2285_CR32","doi-asserted-by":"crossref","unstructured":"Gatys, LA, Ecker, AS, Bethge, M:. Image style transfer using convolutional neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2414\u20132423. (2016)","DOI":"10.1109\/CVPR.2016.265"},{"issue":"2","key":"2285_CR33","doi-asserted-by":"publisher","first-page":"500","DOI":"10.3390\/s21020500","volume":"21","author":"Z Omiotek","year":"2021","unstructured":"Omiotek, Z., Kotyra, A.: Flame image processing and classification using a pre-trained VGG16 model in combustion diagnosis. Sensors 21(2), 500 (2021)","journal-title":"Sensors"},{"issue":"1","key":"2285_CR34","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10489-020-01826-w","volume":"51","author":"S Ahuja","year":"2021","unstructured":"Ahuja, S., Panigrahi, B.K., Dey, N., Rajinikanth, V., Gandhi, T.K.: Deep transfer learning-based automated detection of COVID-19 from lung CT scan slices. Appl. Intell. 51(1), 571\u2013585 (2021)","journal-title":"Appl. Intell."},{"issue":"3","key":"2285_CR35","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s10489-020-01893-z","volume":"51","author":"FA Hashim","year":"2021","unstructured":"Hashim, F.A., Hussain, K., Houssein, E.H., Mabrouk, M.S., Al-Atabany, W.: Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems. Appl. Intell. 51(3), 1531\u20131551 (2021)","journal-title":"Appl. Intell."},{"issue":"2","key":"2285_CR36","doi-asserted-by":"publisher","first-page":"1923","DOI":"10.1016\/j.asej.2020.12.006","volume":"12","author":"ZM Ali","year":"2021","unstructured":"Ali, Z.M., Diaaeldin, I.M., El-Rafei, A., Hasanien, H.M., Aleem, S.H.E.A., Abdelaziz, A.Y.: A novel distributed generation planning algorithm via graphically-based network reconfiguration and soft open points placement using Archimedes optimization algorithm. Ain Shams Eng. J. 12(2), 1923\u20131941 (2021)","journal-title":"Ain Shams Eng. J."},{"issue":"1","key":"2285_CR37","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.eswa.2011.07.046","volume":"39","author":"RC Green","year":"2012","unstructured":"Green, R.C., Wang, L., Alam, M.: Training neural networks using central force optimization and particle swarm optimization: insights and comparisons. Exp. Syst. Appl. 39(1), 555\u2013563 (2012)","journal-title":"Exp. Syst. Appl."},{"key":"2285_CR38","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.ijepes.2016.04.034","volume":"83","author":"M Pradhan","year":"2016","unstructured":"Pradhan, M., Roy, P.K., Pal, T.: Grey wolf optimization applied to economic load dispatch problems. Int. J. Electr. Power Energy Syst. 83, 325\u2013334 (2016)","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"5","key":"2285_CR39","first-page":"858","volume":"19","author":"Y-L Wang","year":"2017","unstructured":"Wang, Y.-L., Shen, J.-J., Hwang, M.-S.: An improved dual image-based reversible hiding technique using LSB matching. IJ Netw. Secur. 19(5), 858\u2013862 (2017)","journal-title":"IJ Netw. Secur."},{"issue":"5","key":"2285_CR40","doi-asserted-by":"publisher","first-page":"577","DOI":"10.3390\/e23050577","volume":"23","author":"T-C Lu","year":"2021","unstructured":"Lu, T.-C., Yang, P.-C., Jana, B.: Improving the reversible LSB matching scheme based on the likelihood re-encoding strategy. Entropy 23(5), 577 (2021)","journal-title":"Entropy"},{"issue":"17","key":"2285_CR41","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"A Mishra","year":"2014","unstructured":"Mishra, A., Agarwal, C., Sharma, A., Bedi, P.: Optimized gray-scale image watermarking using DWT\u2013SVD and firefly algorithm. Expert Syst. Appl. 41(17), 7858\u20137867 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"6","key":"2285_CR42","first-page":"4478","volume":"12","author":"AB Deshmukh","year":"2021","unstructured":"Deshmukh, A.B., Dudul, S.V.: Design and analysis of denoising framework for overcoming speckle noise footprints. Turk. J. Comput. Math. Educ. (TURCOMAT) 12(6), 4478\u20134488 (2021)","journal-title":"Turk. J. Comput. Math. Educ. (TURCOMAT)"},{"issue":"4","key":"2285_CR43","first-page":"221","volume":"27","author":"P Arulpandy","year":"2020","unstructured":"Arulpandy, P., Pricilla, M.T.: Speckle noise reduction and image segmentation based on a modified mean filter. Comput. Assist. Methods Eng. Sci. 27(4), 221\u2013239 (2020)","journal-title":"Comput. Assist. Methods Eng. Sci."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-021-02285-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-021-02285-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-021-02285-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T15:08:37Z","timestamp":1671030517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-021-02285-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,23]]},"references-count":43,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["2285"],"URL":"https:\/\/doi.org\/10.1007\/s00371-021-02285-1","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,23]]},"assertion":[{"value":"5 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the.authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}