{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T05:34:05Z","timestamp":1773034445063,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,12,20]],"date-time":"2016-12-20T00:00:00Z","timestamp":1482192000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s00521-016-2759-9","type":"journal-article","created":{"date-parts":[[2016,12,20]],"date-time":"2016-12-20T12:52:12Z","timestamp":1482238332000},"page":"1611-1618","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A metaheuristic method to hide MP3 sound in JPEG image"],"prefix":"10.1007","volume":"30","author":[{"given":"Ankur","family":"Gupta","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7510-1963","authenticated-orcid":false,"given":"Ankit","family":"Chaudhary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,20]]},"reference":[{"key":"2759_CR1","volume-title":"Cryptography and secure communication","author":"MY Rhee","year":"1994","unstructured":"Rhee MY (1994) Cryptography and secure communication. McGraw-Hill Book Co, Singapore"},{"issue":"5","key":"2759_CR2","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/S0020-0190(96)00168-8","volume":"60","author":"J Jinn-K","year":"1996","unstructured":"Jinn-K J, Yuh-Min T (1996) On the security of image encryption method. Infor Process Lett 60(5):261\u2013265","journal-title":"Infor Process Lett"},{"issue":"6","key":"2759_CR3","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N Bourbakis","year":"1992","unstructured":"Bourbakis N, Alexopoulos C (1992) Picture data encryption using scan patterns. Pattern Recognit 25(6):567\u2013581","journal-title":"Pattern Recognit"},{"key":"2759_CR4","doi-asserted-by":"crossref","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3, 4):313\u2013336","DOI":"10.1147\/sj.353.0313"},{"key":"2759_CR5","doi-asserted-by":"crossref","unstructured":"Gupta A, Chaudhary A (2014) Hiding sound in image by k-LSB mutation using Cuckoo Search. In: Second IEEE-INNS international symposium on computational and business intelligence, New Delhi, India, 7\u20138 Dec 2014","DOI":"10.1109\/ISCBI.2014.12"},{"key":"2759_CR6","doi-asserted-by":"crossref","unstructured":"Fong S, Deb S, Chaudhary A (2015) A review of metaheuristics on robotics. In: Computers and electrical engineering, vol 43, Elsevier, pp 278\u2013291","DOI":"10.1016\/j.compeleceng.2015.01.009"},{"key":"2759_CR7","unstructured":"Adelson E (1990) Digital signal encoding and decoding apparatus. US Patent 4,939,515 1990"},{"key":"2759_CR8","unstructured":"Turner LF (1989) Digital data security system. Patent IPN wo 89 08915"},{"key":"2759_CR9","doi-asserted-by":"crossref","unstructured":"Van Schyndel RG, Tirkel A, Osborne CF (1994) A digital watermark. In: Image processing, 1994. Proceedings ICIP-94, IEEE international conference, vol 2, IEEE","DOI":"10.1109\/ICIP.1994.413536"},{"key":"2759_CR10","doi-asserted-by":"crossref","unstructured":"Chaudhary A et al (2012) A hash based approach for secure keyless steganography in lossless RGB images. In: Proceedings of the 22nd graphicon: international conference on computer graphics and vision, Moscow, Russia, 1\u20135 Oct 2012, pp 80\u201383","DOI":"10.1109\/ICUMT.2012.6459795"},{"issue":"3","key":"2759_CR11","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R-Z Wang","year":"2001","unstructured":"Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit 34(3):671\u2013683","journal-title":"Pattern Recognit"},{"issue":"15","key":"2759_CR12","doi-asserted-by":"crossref","first-page":"3099","DOI":"10.1016\/j.ins.2007.02.008","volume":"177","author":"X Li","year":"2007","unstructured":"Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177(15):3099\u20133109","journal-title":"Inf Sci"},{"key":"2759_CR13","doi-asserted-by":"crossref","unstructured":"Bedi P, Bansal R, Sehgal P (2011) Using PSO in image hiding scheme based on LSB substitution. In: Proceedings of first international conference on advances in computing and communications, vol 192. Springer, Berlin, pp 259\u2013268","DOI":"10.1007\/978-3-642-22720-2_26"},{"key":"2759_CR14","doi-asserted-by":"crossref","unstructured":"Singh KSMJ, Elamvazuthi I, Shaari KZK, Lima FV (2015) PID tuning control strategy using Cuckoo Search algorithm. In: 2015 IEEE student conference on research and development, Kuala Lumpur, pp 129\u2013133","DOI":"10.1109\/SCORED.2015.7449309"},{"key":"2759_CR15","doi-asserted-by":"crossref","unstructured":"Bhoye M, Purohit SN, Trivedi IN, Pandya MH, Jangir P, Jangir N (2016) Energy management of renewable energy sources in a microgrid using Cuckoo Search Algorithm. In: 2016 IEEE students\u2019 conference on electrical, electronics and computer science, India, 2016, pp 1\u20136","DOI":"10.1109\/SCEECS.2016.7509294"},{"key":"2759_CR16","doi-asserted-by":"crossref","unstructured":"Cakmak R, Altas IH (2016) Scheduling of domestic shiftable loads via Cuckoo Search optimization algorithm. In: 2016 4th international istanbul smart grid congress and fair, Istanbul, 2016, pp 1\u20134","DOI":"10.1109\/SGCF.2016.7492435"},{"key":"2759_CR17","unstructured":"Soto R, Crawford B, Barraza J, Johnson F, Paredes F (2015) Solving pre-processed set covering problems via Cuckoo Search and L\u00e9vy flights. In: 2015 10th Iberian conference on information systems and technologies, Aveiro, 2015, pp 1\u20136"},{"key":"2759_CR18","doi-asserted-by":"publisher","unstructured":"Cheung NJ, Ding XM, Shen HB  (2016) A nonhomogeneous Cuckoo Search algorithm based on quantum mechanism for real parameter optimization. In: IEEE transactions on cybernetics, pp 1\u201312. doi:\n                        10.1109\/TCYB.2016.2517140","DOI":"10.1109\/TCYB.2016.2517140"},{"issue":"2","key":"2759_CR19","first-page":"20","volume":"55","author":"P Gerami","year":"2012","unstructured":"Gerami P, Subariah I, Morteza B (2012) Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. Int J Comput Appl 55(2):20\u201325","journal-title":"Int J Comput Appl"},{"issue":"1","key":"2759_CR20","first-page":"11","volume":"2","author":"M Mohamed","year":"2011","unstructured":"Mohamed M, Al-Afari F, Bamatraf MA (2011) Data hiding by LSB substitution using genetic optimal key-permutation. Int Arab J e-Technol 2(1):11\u201317","journal-title":"Int Arab J e-Technol"},{"key":"2759_CR21","unstructured":"http:\/\/www.multiweb.cz\/twoinches\/mp3inside.htm"},{"key":"2759_CR22","unstructured":"http:\/\/professionaltag.sourceforge.net\/WhatIsID3.html"},{"key":"2759_CR23","unstructured":"Yang X-S, Suash D (2009) Cuckoo Search via L\u00e9vy flights. In: Nature biologically inspired computing. NaBIC 2009. World Congress on IEEE 2009"},{"issue":"7194","key":"2759_CR24","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1038\/nature06948","volume":"453","author":"P Barthelemy","year":"2008","unstructured":"Barthelemy P et al (2008) A L\u00e9vy flight for light. Nature 453(7194):495\u2013498","journal-title":"Nature"},{"key":"2759_CR25","unstructured":"Gutowski M (2001) L\u00e9vy flights as an underlying mechanism for global optimization algorithms. arXiv preprint math-ph\/0106003"},{"issue":"226","key":"2759_CR26","doi-asserted-by":"crossref","first-page":"1830","DOI":"10.1016\/j.jcp.2007.06.008","volume":"2007","author":"I Pavlyukevich","year":"2007","unstructured":"Pavlyukevich I (2007) L\u00e9vy flights, non-local search and simulated annealing. J Comput Phys 2007(226):1830\u20131844","journal-title":"J Comput Phys"},{"issue":"4","key":"2759_CR27","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s10462-011-9276-0","volume":"39","author":"P Civicioglu","year":"2013","unstructured":"Civicioglu P, Besdok E (2013) A conceptual comparison of the Cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms. Artif Intell Rev 39(4):315\u2013346","journal-title":"Artif Intell Rev"},{"issue":"8","key":"2759_CR28","doi-asserted-by":"crossref","first-page":"5508","DOI":"10.1016\/j.asoc.2011.05.008","volume":"11","author":"R Rajabioun","year":"2011","unstructured":"Rajabioun R (2011) Cuckoo optimization algorithm. Appl Soft Comput 11(8):5508\u20135518","journal-title":"Appl Soft Comput"},{"issue":"3","key":"2759_CR29","first-page":"36","volume":"2","author":"E Valian","year":"2011","unstructured":"Valian E, Mohanna S, Tavakoli S (2011) Improved Cuckoo Search algorithm for feedforward neural network training. Int J Artif Intell Appl 2(3):36\u201343","journal-title":"Int J Artif Intell Appl"},{"issue":"9","key":"2759_CR30","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1016\/j.chaos.2011.06.004","volume":"44","author":"S Walton","year":"2011","unstructured":"Walton S et al (2011) Modified Cuckoo Search: a new gradient free optimisation algorithm. Chaos Solitons Fractals 44(9):710\u2013718","journal-title":"Chaos Solitons Fractals"},{"issue":"13","key":"2759_CR31","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1049\/el:20080522","volume":"44","author":"Q Huynh-Thu","year":"2008","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image\/video quality assessment. Electron Lett 44(13):800\u2013801","journal-title":"Electron Lett"},{"issue":"4","key":"2759_CR32","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"2759_CR33","unstructured":"http:\/\/homepages.inf.ed.ac.uk\/rbf\/CVonline\/LOCAL_COPIES\/VELDHUIZEN\/node18.html"},{"key":"2759_CR34","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Peak_signal-to-noise_ratio"},{"issue":"2","key":"2759_CR35","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.csi.2008.05.010","volume":"31","author":"IC Lin","year":"2009","unstructured":"Lin IC, Lin YB, Wang CM (2009) Hiding data in spatial domain images with distortion tolerance. Comput Stand Interfaces 31(2):458\u2013464","journal-title":"Comput Stand Interfaces"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-016-2759-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2759-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-016-2759-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,18]],"date-time":"2018-08-18T22:27:41Z","timestamp":1534631261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-016-2759-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,20]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["2759"],"URL":"https:\/\/doi.org\/10.1007\/s00521-016-2759-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,20]]}}}