{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T04:33:28Z","timestamp":1767846808155,"version":"3.49.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T00:00:00Z","timestamp":1533772800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s00500-018-3441-1","type":"journal-article","created":{"date-parts":[[2018,8,9]],"date-time":"2018-08-09T09:16:49Z","timestamp":1533806209000},"page":"8045-8056","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method"],"prefix":"10.1007","volume":"23","author":[{"given":"Ahmed","family":"Khan","sequence":"first","affiliation":[]},{"given":"Aaliya","family":"Sarfaraz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,9]]},"reference":[{"key":"3441_CR1","doi-asserted-by":"crossref","unstructured":"Akhtar N, Johri P et al. (2013) Enhancing the security and quality of LSB based image steganography. In: IEEE 5th international conference on computational intelligence and communication networks, pp 385\u2013390","DOI":"10.1109\/CICN.2013.85"},{"key":"3441_CR2","doi-asserted-by":"crossref","unstructured":"Akhtar N, Johri P et al. (2014) An improved inverted LSB image steganography. In: IEEE international conference on issues and challenges in intelligent computing techniques, pp 749\u2013755","DOI":"10.1109\/ICICICT.2014.6781374"},{"issue":"1","key":"3441_CR3","first-page":"1","volume":"2","author":"A Al-Jaber","year":"2010","unstructured":"Al-Jaber A, Sabri K (2010) Information hiding without changing the cover image. Int Arab J Inf Technol 2(1):1\u20134","journal-title":"Int Arab J Inf Technol"},{"issue":"6","key":"3441_CR4","first-page":"50","volume":"2","author":"K Arora","year":"2014","unstructured":"Arora K, Gandhi G (2014) Enhanced steganography using K-matrix. Int J Comput Sci Eng 2(6):50\u201353","journal-title":"Int J Comput Sci Eng"},{"key":"3441_CR5","doi-asserted-by":"crossref","unstructured":"Ashwin S, Ramesh J et al. (2012) Novel and secure encoding and hiding techniques using image steganography: a survey. In: IEEE international conference on emerging trends in electrical engineering and energy management, pp 171\u2013177","DOI":"10.1109\/ICETEEEM.2012.6494463"},{"issue":"8","key":"3441_CR6","first-page":"109","volume":"1","author":"K Bansal","year":"2012","unstructured":"Bansal K, Singh A (2012) Use of textual compression in steganography & cryptography. Int J Innov Res Dev 1(8):109\u2013115","journal-title":"Int J Innov Res Dev"},{"key":"3441_CR7","doi-asserted-by":"crossref","unstructured":"Bing F, Xiansan Z (2009) Information hiding technique in most significant bit of still image. In: IEEE international conference image analysis & signal processing, pp 1\u20133","DOI":"10.1109\/IASP.2009.5054594"},{"key":"3441_CR8","unstructured":"Biswas S, Nag A et al. (2012) an image steganography technique using X-box mapping. In: IEEE-international conference on advances in engineering, science and management, pp 709\u2013713"},{"issue":"3","key":"3441_CR9","first-page":"327","volume":"30","author":"RH Bukhari","year":"2018","unstructured":"Bukhari RH, Sarfaraz A, Khan A (2018) Python: a critical analysis of programing languages for novices. Sci Int 30(3):327\u2013331","journal-title":"Sci Int"},{"key":"3441_CR10","unstructured":"Changder S, Samima S et al. (2013) Secure key based image realization steganography. In: Proceedings of the IEEE second international conference on image information processing, pp 377\u2013382"},{"key":"3441_CR11","doi-asserted-by":"crossref","unstructured":"Dagadita M, Slusanschi E et al. (2013) Data hiding using steganography. In: Parallel and distributed computing IEEE 12th international symposium, pp 159\u2013166","DOI":"10.1109\/ISPDC.2013.29"},{"key":"3441_CR12","doi-asserted-by":"crossref","unstructured":"Dagar S (2014) highly randomized image steganography using secret keys. In: IEEE international conference on recent advances and innovations in engineering, pp 1\u20135","DOI":"10.1109\/ICRAIE.2014.6909116"},{"key":"3441_CR13","doi-asserted-by":"crossref","unstructured":"Gu C, Cao X (2012) Research on information hiding technology. In: IEEE 2nd international conference consumer electronics. Communications and networks, pp 2035\u20132037","DOI":"10.1109\/CECNet.2012.6201610"},{"issue":"6","key":"3441_CR14","first-page":"387","volume":"4","author":"R Jain","year":"2014","unstructured":"Jain R, Singh B (2014) Multistage three layers image steganography using LSB with enhanced security. Int J Emerg Technol Adv Eng 4(6):387\u2013392","journal-title":"Int J Emerg Technol Adv Eng"},{"issue":"1","key":"3441_CR15","first-page":"35","volume":"8","author":"S Janeyulu","year":"2009","unstructured":"Janeyulu S, Prasad M et al (2009) A novel information hiding technique for security by using image steganography. J Theoret Appl Inf Technol 8(1):35\u201339","journal-title":"J Theoret Appl Inf Technol"},{"issue":"4","key":"3441_CR16","first-page":"366","volume":"16","author":"M Juneja","year":"2014","unstructured":"Juneja M, Sandhu P (2014) Improved LSB based steganography techniques for color images in spatial domain. Int J Netw Secur 16(4):366\u2013376","journal-title":"Int J Netw Secur"},{"key":"3441_CR17","unstructured":"Karim S, Rahman M et al. (2011) A new approach for LSB based image steganography using secret key. In: Proceedings of IEEE 14th international conference on computer and information technology, pp 22\u201324"},{"issue":"5","key":"3441_CR18","first-page":"181","volume":"2","author":"G Kaur","year":"2013","unstructured":"Kaur G, Kaur K (2013) Digital watermarking and other data hiding techniques. Int J Innov Technol Explor Eng 2(5):181\u2013183","journal-title":"Int J Innov Technol Explor Eng"},{"issue":"8","key":"3441_CR19","first-page":"3130","volume":"2","author":"K Kaur","year":"2013","unstructured":"Kaur K, Kour G (2013) Implementing LSB on image watermarking. Int J Adv Res Comput Commun Eng 2(8):3130\u20133134","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"3441_CR20","doi-asserted-by":"crossref","unstructured":"Kaur S, Bansal S et al. (2014) Steganography and classification of image steganography techniques. In: IEEE International conference on computing for sustainable global development, pp 870\u2013875","DOI":"10.1109\/IndiaCom.2014.6828087"},{"issue":"2","key":"3441_CR21","first-page":"26","volume":"4","author":"P Kavipriya","year":"2014","unstructured":"Kavipriya P, Sangeetha M (2014) Color secret image encryption and share generation for multiple-secret threshold visual cryptography. Int J Eng Res Appl 4(2):26\u201328","journal-title":"Int J Eng Res Appl"},{"key":"3441_CR22","doi-asserted-by":"crossref","unstructured":"Keshari S, Modani S et al. (2011) Weighted fractional fourier transform based image steganography. In: IEEE international conference on recent trends in information systems, pp 214\u2013217","DOI":"10.1109\/ReTIS.2011.6146870"},{"issue":"3","key":"3441_CR23","first-page":"50","volume":"3","author":"U Khadim","year":"2015","unstructured":"Khadim U, Khan A, Ahmad B, Khan A (2015) Information hiding in text to improve performance for word document. Int J Technol Res 3(3):50\u201355","journal-title":"Int J Technol Res"},{"issue":"4","key":"3441_CR24","first-page":"525","volume":"3","author":"A Khan","year":"2014","unstructured":"Khan A (2014) Joint ownership verification for digital text. Adv Comput Sci Appl (ACSA) 3(4):525\u2013531","journal-title":"Adv Comput Sci Appl (ACSA)"},{"issue":"6","key":"3441_CR25","first-page":"6091","volume":"27","author":"A Khan","year":"2015","unstructured":"Khan A (2015a) Comparative analysis of watermarking techniques. Sci Int 27(6):6091\u20136096","journal-title":"Sci Int"},{"issue":"4","key":"3441_CR26","first-page":"426","volume":"4","author":"A Khan","year":"2015","unstructured":"Khan A (2015b) Robust textual steganography. J Sci 4(4):426\u2013434","journal-title":"J Sci"},{"issue":"2","key":"3441_CR27","first-page":"361","volume":"29","author":"A Khan","year":"2017","unstructured":"Khan A, Sarfaraz A (2017) Vetting the security of mobile applications. Sci Int 29(2):361\u2013365","journal-title":"Sci Int"},{"issue":"3","key":"3441_CR28","first-page":"19","volume":"12","author":"A Khan","year":"2018","unstructured":"Khan A, Sarfaraz A (2018) Practical guidelines for securing wireless local area networks (WLANs). Int J Secur Appl 12(3):19\u201328","journal-title":"Int J Secur Appl"},{"issue":"5","key":"3441_CR29","first-page":"4451","volume":"28","author":"A Khan","year":"2016","unstructured":"Khan A, Sohaib M, Amjad FM (2016) High-capacity multi-layer framework for highly robust textual steganography. Sci Int 28(5):4451\u20134457","journal-title":"Sci Int"},{"issue":"4","key":"3441_CR30","first-page":"701","volume":"3","author":"S Kumar","year":"2013","unstructured":"Kumar S, Sharma V (2013) A new approach to hide text in images using steganography. Int J Adv Res Comput Sci Softw Eng 3(4):701\u2013708","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"3441_CR31","doi-asserted-by":"crossref","unstructured":"Mousa H (2013) Secured steganography algorithm based random function. In: 8th IEEE international conference on computer engineering & systems, pp 228\u2013232","DOI":"10.1109\/ICCES.2013.6707209"},{"issue":"2","key":"3441_CR32","first-page":"18","volume":"61","author":"M Pandya","year":"2013","unstructured":"Pandya M, Joshi H et al (2013) A novel digital watermarking algorithm using random matrix image. Int J Comput Appl 61(2):18\u201321","journal-title":"Int J Comput Appl"},{"key":"3441_CR33","unstructured":"Ridzo\u0148 R, Kanocz T et al. (2010) Using DCT coefficients flipping for information hiding in still images. In: 20th IEEE international conference radio elektronika, pp 1\u20134"},{"key":"3441_CR34","doi-asserted-by":"crossref","unstructured":"Sachdeva S, Kumar A et al. (2012) Colour image steganography based on modified quantization table. In: Second IEEE international conference on advanced computing & communication technologies , pp 309\u2013314","DOI":"10.1109\/ACCT.2012.37"},{"issue":"1","key":"3441_CR35","first-page":"1","volume":"1","author":"D Saravanan","year":"2013","unstructured":"Saravanan D, Doni A et al (2013) Image information hiding: an survey. SIJ Trans Comput Sci Eng Appl 1(1):1\u20135","journal-title":"SIJ Trans Comput Sci Eng Appl"},{"key":"3441_CR36","first-page":"1","volume-title":"Digital image processing and computer vision","author":"RJ Schalkoff","year":"1989","unstructured":"Schalkoff RJ (1989) Digital image processing and computer vision. Wiley, New York, pp 1\u2013489"},{"issue":"2","key":"3441_CR37","first-page":"171","volume":"3","author":"M Shelke","year":"2014","unstructured":"Shelke M, Dongre M et al (2014) Comparison of different techniques for steganography in images. Int J Appl Innov Eng Manag 3(2):171\u2013176","journal-title":"Int J Appl Innov Eng Manag"},{"key":"3441_CR38","unstructured":"Singleton N (2011) Computerized image processing for forgery prevention. In: First international conference on innovative computing information & control, pp 459\u2013462"},{"issue":"3","key":"3441_CR39","first-page":"7","volume":"4","author":"K Thakre","year":"2014","unstructured":"Thakre K, Chitaliya N (2014) Dual image steganography for communicating high security information. Int J Soft Comput Eng 4(3):7\u201312","journal-title":"Int J Soft Comput Eng"},{"key":"3441_CR40","unstructured":"Thampi S (2008) Information hiding techniques: a tutorial review. Network security and cryptography, arXiv preprint arXi, pp 1\u201320"},{"key":"3441_CR41","doi-asserted-by":"crossref","unstructured":"Thangadurai K, Devi G et al. (2014) An analysis of LSB based image steganography techniques. In: IEEE international conference on computer communication and informatics, pp 1\u20134","DOI":"10.1109\/ICCCI.2014.6921751"},{"key":"3441_CR42","unstructured":"Tiwari R, Sahoo G (2012) Some new methodologies for image hiding using steganographic techniques, Arxiv Preprint Arxiv, pp 25\u201331"},{"key":"3441_CR43","unstructured":"Tso H, Lou D (2010) Information hiding method using sharing images. In: IEEE fourth international conference on genetic and evolutionary computing, pp 642\u2013645"},{"issue":"1","key":"3441_CR44","first-page":"347","volume":"3","author":"S Utareja","year":"2013","unstructured":"Utareja S, Patel K et al (2013) A survey of information hiding techniques. Int J Emerg Technol Adv Eng 3(1):347\u2013350","journal-title":"Int J Emerg Technol Adv Eng"},{"issue":"6","key":"3441_CR45","first-page":"1","volume":"2","author":"P Vijaya","year":"2012","unstructured":"Vijaya P (2012) Secure data hiding algorithm using encrypted secret message. Int J Sci Res Publ 2(6):1\u20134","journal-title":"Int J Sci Res Publ"},{"key":"3441_CR46","doi-asserted-by":"crossref","unstructured":"Yongping Z (2011) Image information hiding technique based on frequency hopping and 2D-DWT. In: IEEE international conference on computer science and automation engineering, pp 461\u2013464","DOI":"10.1109\/CSAE.2011.5952508"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3441-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3441-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3441-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T19:23:26Z","timestamp":1565292206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3441-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,9]]},"references-count":46,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["3441"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3441-1","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,9]]},"assertion":[{"value":"9 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors have no conflict of interest upon this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}