{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T09:07:47Z","timestamp":1759482467878,"version":"3.41.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T00:00:00Z","timestamp":1512950400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s00500-017-2944-5","type":"journal-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T07:54:17Z","timestamp":1512978857000},"page":"1555-1567","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment"],"prefix":"10.1007","volume":"22","author":[{"given":"Imran","family":"Shafi","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Noman","sequence":"additional","affiliation":[]},{"given":"Moneeb","family":"Gohar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5483-2732","authenticated-orcid":false,"given":"Awais","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Murad","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Sadia","family":"Din","sequence":"additional","affiliation":[]},{"given":"Syed Hassan","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Jamil","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,11]]},"reference":[{"key":"2944_CR1","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.neucom.2015.04.109","volume":"174","author":"A Ahmad","year":"2016","unstructured":"Ahmad A, Paul A, Rathore MM (2016a) An efficient divide-and-conquer approach for big data analytics in machine-to-machine communication. Neurocomputing 174:439\u2013453","journal-title":"Neurocomputing"},{"key":"2944_CR2","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1016\/j.future.2015.08.004","volume":"56","author":"A Ahmad","year":"2016","unstructured":"Ahmad A, Paul A, Rathore MM, Chang H (2016b) Smart cyber society: integration of capillary devices with high usability based on cyber-physical system. Future Gener Comput Syst 56:493\u2013503","journal-title":"Future Gener Comput Syst"},{"key":"2944_CR3","doi-asserted-by":"crossref","unstructured":"Cao W, Han J (2012) Steganalysis on JPEG decompressed bitmaps revisited. In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp 878\u2013881","DOI":"10.1109\/MINES.2012.205"},{"key":"2944_CR4","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recognit 37:469\u2013474","journal-title":"Pattern Recognit"},{"issue":"2","key":"2944_CR5","first-page":"37","volume":"3","author":"K Changa","year":"2008","unstructured":"Changa K, Changa C, Huangb PS, Tua T (2008) A novel image steganographic method using tri-way pixel-value differencing. J Multimed 3(2):37\u201344","journal-title":"J Multimed"},{"key":"2944_CR6","unstructured":"Chen W (2003) A comparative study of information hiding schemes using amplitude, frequency and phase embedding. PhD thesis, National Cheng Kung University, Tainan, Taiwan"},{"key":"2944_CR7","doi-asserted-by":"crossref","unstructured":"Grover N, Mohapatra AK (2013) Digital image authentication model based on edge adaptive steganography. In: 2013 2nd International Conference on Advanced Computing, Networking and Security (ADCONS), pp 238\u2013242","DOI":"10.1109\/ADCONS.2013.45"},{"key":"2944_CR8","unstructured":"Gupta MM, Knopf GK, Nikiforuk PN (1987) Computer vision with fuzzy edge perception. In: International Symposium on Intelligent Control, Philadelphia, USA, pp 271\u2013278"},{"key":"2944_CR9","doi-asserted-by":"crossref","unstructured":"Hou X, Zhang T, Xiong G, Wan B (2012) Forensics aided steganalysis of heterogeneous bitmap images with different compression history. In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp 874\u2013877","DOI":"10.1109\/MINES.2012.115"},{"key":"2944_CR10","doi-asserted-by":"crossref","unstructured":"Lai B, Chang L (2006) Adaptive Data hiding for images based on Harr discrete wavelet transform. Lecture notes in computer science, vol 319","DOI":"10.1007\/11949534_109"},{"issue":"3","key":"2944_CR11","doi-asserted-by":"crossref","first-page":"319","DOI":"10.3233\/FUN-2008-83305","volume":"83","author":"J Lillo","year":"2008","unstructured":"Lillo J, Shih M (2008) Generalizations of pixel-value differencing steganography for data hiding in images. Fundam Inform 83(3):319\u2013335","journal-title":"Fundam Inform"},{"issue":"5","key":"2944_CR12","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MWC.2016.7721744","volume":"23","author":"A Paul","year":"2016","unstructured":"Paul A, Ahmad A, Rathore MM, Jabbar S (2016) Smartbuddy: defining human behaviors using big data analytics in social internet of things. IEEE Wirel Commun 23(5):68\u201374","journal-title":"IEEE Wirel Commun"},{"key":"2944_CR13","doi-asserted-by":"crossref","unstructured":"Ramaiya MK, Hemrajani N, Saxena AK (2013a) Improvisation of security aspect in steganography applying DES. In: 2013 International Conference on Communication Systems and Network Technologies (CSNT), pp 431\u2013436","DOI":"10.1109\/CSNT.2013.96"},{"key":"2944_CR14","doi-asserted-by":"crossref","unstructured":"Ramaiya MK, Hemrajani N, Saxena AK (2013b) Security improvisation in image steganography using DES. In: 2013 IEEE 3rd International on Advance Computing Conference (IACC), pp 1094\u20131099","DOI":"10.1109\/IAdCC.2013.6514379"},{"key":"2944_CR15","doi-asserted-by":"crossref","unstructured":"Simmons GJ (1984) The prisoners\u2019 problem and the subliminal channel. In: Proceedings of Crypto\u201983, pp 51\u201367","DOI":"10.1007\/978-1-4684-4730-9_5"},{"issue":"I","key":"2944_CR16","doi-asserted-by":"crossref","first-page":"127","DOI":"10.15388\/Informatica.2004.050","volume":"15","author":"HW Tseng","year":"2004","unstructured":"Tseng HW, Chang CC (2004) High capacity data hiding in JPEG-compressed images. Informatica 15(I):127\u2013142","journal-title":"Informatica"},{"issue":"2","key":"2944_CR17","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TIFS.2012.2234117","volume":"8","author":"G Valenzise","year":"2013","unstructured":"Valenzise G, Tagliasacchi M, Tubaro S (2013) Revealing the traces of JPEG compression anti-forensics. IEEE Trans Inf Forensics Secur 8(2):335\u2013349","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"2944_CR18","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/TIFS.2014.2308633","volume":"9","author":"K Wang","year":"2014","unstructured":"Wang K, Zhao H, Wang H (2014) Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value. IEEE Trans Inf Forensics Secur 9(5):741\u2013751","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2944_CR19","doi-asserted-by":"crossref","unstructured":"Westfeld A (2001) F5a steganographic algorithm: high capacity despite better steganalysis. In: 4th International Workshop on Information Hiding, 25\u201327 April, pp 289\u2013302","DOI":"10.1007\/3-540-45496-9_21"},{"issue":"1","key":"2944_CR20","first-page":"1","volume":"4","author":"N Wu","year":"2007","unstructured":"Wu N, Hwang M (2007) Data hiding: current status and key issues. Int J Netw Secur 4(1):1\u20139","journal-title":"Int J Netw Secur"},{"key":"2944_CR21","unstructured":"Zayed HH (2005) A high-hiding capacity technique for hiding data in images based on K-Bit LSB substitution. In: The 30th International Conference on Artificial Intelligence Applications (ICAIA\u20142005), Cairo"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-017-2944-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2944-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-017-2944-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T13:17:54Z","timestamp":1751116674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-017-2944-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,11]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["2944"],"URL":"https:\/\/doi.org\/10.1007\/s00500-017-2944-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2017,12,11]]}}}