{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T13:17:58Z","timestamp":1769692678689,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s00530-020-00665-6","type":"journal-article","created":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T06:32:31Z","timestamp":1593585151000},"page":"651-666","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Robust image steganography approach based on RIWT-Laplacian pyramid and histogram shifting using deep learning"],"prefix":"10.1007","volume":"27","author":[{"given":"Arunkumar","family":"Sukumar","sequence":"first","affiliation":[]},{"given":"V.","family":"Subramaniyaswamy","sequence":"additional","affiliation":[]},{"given":"Logesh","family":"Ravi","sequence":"additional","affiliation":[]},{"given":"V.","family":"Vijayakumar","sequence":"additional","affiliation":[]},{"given":"V.","family":"Indragandhi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,1]]},"reference":[{"key":"665_CR1","doi-asserted-by":"crossref","unstructured":"Kishor, S. N., GN Kodanda Ramaiah, and S. A. K. Jilani (2016). A review on steganography through multimedia.\u00a02016 International Conference on Research Advances in Integrated Navigation Systems (RAINS). IEEE.","DOI":"10.1109\/RAINS.2016.7764373"},{"key":"665_CR2","doi-asserted-by":"crossref","unstructured":"Jero, S. Edward, Palaniappan Ramu, and S. Ramakrishnan(2014). Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission.\u00a0Journal of medical systems\u00a038.10 132.","DOI":"10.1007\/s10916-014-0132-z"},{"key":"665_CR3","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.compeleceng.2017.07.026","volume":"65","author":"W Wang","year":"2018","unstructured":"Wang, W., Si, M., Pang, Y., Ran, P., Wang, H., Jiang, X., Liu, Y., Wu, J., Wu, W., Chilamkurti, N., Jeon, G.: An encryption algorithm based on combined chaos in body area networks. Comput. Electr. Eng. 65, 282\u2013291 (2018)","journal-title":"Comput. Electr. Eng."},{"key":"665_CR4","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.future.2016.11.029","volume":"86","author":"K Muhammad","year":"2018","unstructured":"Muhammad, K., et al.: Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener. Comput. Syst. 86, 951\u2013960 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"665_CR5","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., et al.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727\u2013752 (2010)","journal-title":"Signal Process."},{"key":"665_CR6","doi-asserted-by":"crossref","unstructured":"Sreekutty, M. S., Baiju, P.S.: Security enhancement in image steganography for medical integrity verification system. In: 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE (2017)","DOI":"10.1109\/ICCPCT.2017.8074197"},{"key":"665_CR7","doi-asserted-by":"crossref","unstructured":"Altaay, A. A. Jabbar, S. B. S., Mazdak Z.: An introduction to image steganography techniques. In: 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE (2012)","DOI":"10.1109\/ACSAT.2012.25"},{"issue":"1","key":"665_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3923\/jai.2017.1.21","volume":"10","author":"A Shaik","year":"2017","unstructured":"Shaik, A., Thanikaiselvan, V., Amitharajan, R.: Data security through data hiding in images: a review. J. Artif. Intell. 10(1), 1\u201321 (2017)","journal-title":"J. Artif. Intell."},{"issue":"5","key":"665_CR9","doi-asserted-by":"publisher","first-page":"4265","DOI":"10.3233\/JIFS-169984","volume":"36","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar, S., Subramaniyaswamy, S., et al.: RIWT and QR factorization based hybrid robust image steganography using block selection algorithm for IoT devices. J. Intell. Fuzzy Syst. 36(5), 4265\u20134276 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"665_CR10","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar, S., Subramaniyaswamy, S., et al.: SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139, 426\u2013437 (2019)","journal-title":"Measurement"},{"key":"665_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Yi Zhang","year":"2018","unstructured":"Zhang, Yi, et al.: On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146, 99\u2013111 (2018)","journal-title":"Signal Process."},{"key":"665_CR12","unstructured":"Arunkumar, S., Subramaniyaswamy, S., et al.: Meta-data based secret image sharing application for different sized biomedical images. Biomed. Res. 29, S394\u2013S398 (2018)"},{"issue":"1","key":"665_CR13","first-page":"11","volume":"3","author":"D Bandyopadhyay","year":"2014","unstructured":"Bandyopadhyay, D., et al.: A novel secure image steganography method based on chaos theory in spatial domain. Int. J. Secur. Priv. Trust Manag. IJSPTM 3(1), 11\u201322 (2014)","journal-title":"Int. J. Secur. Priv. Trust Manag. IJSPTM"},{"issue":"6","key":"665_CR14","doi-asserted-by":"publisher","first-page":"063001","DOI":"10.1117\/1.JEI.26.6.063001","volume":"26","author":"T Rabie","year":"2017","unstructured":"Rabie, T., Baziyad, M.: Visual fidelity without sacrificing capacity: an adaptive Laplacian pyramid approach to information hiding. J. Electron. Imaging 26(6), 063001 (2017)","journal-title":"J. Electron. Imaging"},{"key":"665_CR15","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13","author":"MS Subhedar","year":"2014","unstructured":"Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey. Comput. Sci. Rev. 13, 95\u2013113 (2014)","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"665_CR16","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.sigpro.2011.06.006","volume":"92","author":"F Peng","year":"2012","unstructured":"Peng, F., Li, X., Yang, B.: Adaptive reversible data hiding scheme based on integer transform. Signal Process. 92(1), 54\u201362 (2012)","journal-title":"Signal Process."},{"issue":"7","key":"665_CR17","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2012","unstructured":"Qin, C., Chang, C.C., Huang, Y.H., Liao, L.T.: An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7), 1109\u20131118 (2012)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"18","key":"665_CR18","doi-asserted-by":"publisher","first-page":"23673","DOI":"10.1007\/s11042-018-5713-2","volume":"77","author":"T Rabie","year":"2018","unstructured":"Rabie, T., Baziyad, M., Kamel, I.: Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimed. Tools Appl. 77(18), 23673\u201323698 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"665_CR19","doi-asserted-by":"crossref","unstructured":"Ni, Z., Shi, Y. Q., Ansari, N., Su, W.: Reversible data hiding. In: IEEE Transactions on Circuits and Systems for Video Technology, pp. 354\u2013362 (2006)","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"665_CR20","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.jpdc.2017.06.022","volume":"117","author":"S Hussain","year":"2018","unstructured":"Hussain, S., Keung, J., Akhunzada, A., Ahmad, A., Khan, A.A., Cuomo, S., Piccialli, F., Jeon, G.: Implications of deep learning for the automation of design patterns organization. J. Parallel Distrib. Comput. 117, 256\u2013266 (2018)","journal-title":"J. Parallel Distrib. Comput."},{"key":"665_CR21","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.compeleceng.2017.12.009","volume":"75","author":"B Jan","year":"2019","unstructured":"Jan, B., Farman, H., Khan, M., Ul Islam, I., Ali, S., Ahmad, A., Jeon, G.: Deep learning in big data analytics: a comparative study. Comput. Electr. Eng. 75, 275\u2013287 (2019)","journal-title":"Comput. Electr. Eng."},{"key":"665_CR22","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1016\/j.procs.2015.02.105","volume":"46","author":"D Baby","year":"2015","unstructured":"Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. Proc. Comput. Sci. 46, 612\u2013618 (2015)","journal-title":"Proc. Comput. Sci."},{"key":"665_CR23","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-981-10-8797-4_54","volume-title":"Integrated Intelligent Computing, Communication and Security","author":"NG Kini","year":"2019","unstructured":"Kini, N.G., Kini, V.G.: A secured steganography algorithm for hiding an image in an image. Integrated Intelligent Computing, Communication and Security, pp. 539\u2013546. Springer, Singapore (2019)"},{"issue":"5","key":"665_CR24","first-page":"053102","volume":"57","author":"J Wang","year":"2018","unstructured":"Wang, J., Wu, J., Wu, Z., Anisetti, M., Jeon, G.: Bayesian method application for color demosaicking. SPIE Opt. Eng. 57(5), 053102 (2018)","journal-title":"SPIE Opt. Eng."},{"key":"665_CR25","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.optcom.2012.08.101","volume":"287","author":"W Wu","year":"2013","unstructured":"Wu, W., Yang, X., Pang, Y., Peng, J., Jeon, G.: A multifocus image fusion method by using hidden Markov model. Opt. Commun. 287, 63\u201372 (2013)","journal-title":"Opt. Commun."},{"issue":"6","key":"665_CR26","first-page":"462","volume":"3","author":"HM Reddy","year":"2009","unstructured":"Reddy, H.M., Raja, K.B.: High capacity and security steganography using discrete wavelet transform. Int. J. Comput. Sci. Secur. IJCSS 3(6), 462 (2009)","journal-title":"Int. J. Comput. Sci. Secur. IJCSS"},{"issue":"6","key":"665_CR27","first-page":"497","volume":"4","author":"A Nag","year":"2011","unstructured":"Nag, A., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel technique for image steganography based on DWT and Huffman encoding. Int. J. Comput. Sci. Secur. IJCSS 4(6), 497\u2013610 (2011)","journal-title":"Int. J. Comput. Sci. Secur. IJCSS"},{"issue":"3","key":"665_CR28","first-page":"296","volume":"24","author":"AA Latef","year":"2011","unstructured":"Latef, A.A.: Color image steganography based on discrete wavelet and discrete cosine transforms. Ibn Al-Haitham J. Pure Appl. Sci. 24(3), 296\u2013302 (2011)","journal-title":"Ibn Al-Haitham J. Pure Appl. Sci."},{"key":"665_CR29","unstructured":"Dey, N., Roy, A.B., & Dey, S.: A novel approach of color image hiding using RGB color planes and DWT. arXiv preprint arXiv:1208.0803 (2012)"},{"issue":"12","key":"665_CR30","doi-asserted-by":"publisher","first-page":"127005","DOI":"10.1117\/1.3265713","volume":"48","author":"G Jeon","year":"2009","unstructured":"Jeon, G., Park, S.J., Fang, Y., Anisetti, M., Bellandi, V., Damiani, E., Jeong, J.: Specification of efficient block matching scheme for motion estimation in video compression. SPIE Opt. Eng. 48(12), 127005 (2009)","journal-title":"SPIE Opt. Eng."},{"issue":"1","key":"665_CR31","doi-asserted-by":"publisher","first-page":"16","DOI":"10.7763\/IJCTE.2011.V3.277","volume":"3","author":"AA Shejul","year":"2011","unstructured":"Shejul, A.A., Kulkarni, U.L.: A secure skin tone based steganography using wavelet transform. Int. J. Comput. Theory Eng. 3(1), 16 (2011)","journal-title":"Int. J. Comput. Theory Eng."},{"issue":"1","key":"665_CR32","first-page":"29","volume":"6","author":"G Kaur","year":"2013","unstructured":"Kaur, G., Kochhar, A.: Transform domain analysis of image steganography. Int. J. Sci. Emerg. Technol. Latest Trends 6(1), 29\u201337 (2013)","journal-title":"Int. J. Sci. Emerg. Technol. Latest Trends"},{"issue":"4","key":"665_CR33","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1504\/IJESDF.2014.065739","volume":"6","author":"AK Singh","year":"2014","unstructured":"Singh, A.K., Dave, M., Mohan, A.: Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. IJESDF 6(4), 285\u2013305 (2014)","journal-title":"IJESDF"},{"issue":"4","key":"665_CR34","doi-asserted-by":"publisher","first-page":"46","DOI":"10.5815\/ijmecs.2016.04.06","volume":"8","author":"S Nagpal","year":"2016","unstructured":"Nagpal, S., Bhushan, S., Mahajan, M.: An enhanced digital image watermarking scheme for medical images using neural network, DWT and RSA. Int. J. Mod. Educ. Comput. Sci. 8(4), 46 (2016)","journal-title":"Int. J. Mod. Educ. Comput. Sci."},{"issue":"3","key":"665_CR35","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar, F.N., Srivastava, V.K.: A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed. Tools Appl. 76(3), 3669\u20133697 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"665_CR36","doi-asserted-by":"crossref","unstructured":"Kalita, M., Tuithung, T., Majumder, S.: A new steganography method using integer wavelet transform and least significant bit substitution. Comput. J. 62, 1639\u20131655 (2019)","DOI":"10.1093\/comjnl\/bxz014"},{"issue":"1","key":"665_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3108936","volume":"18","author":"MM Rathore","year":"2017","unstructured":"Rathore, M.M., Paul, A., Ahmad, A., Anisetti, M., Jeon, G.: Hadoop-based intelligent care system (HICS): analytical approach for big data in IoT. ACM Trans. Internet Technol. 18(1), 1\u201324 (2017)","journal-title":"ACM Trans. Internet Technol."},{"issue":"4","key":"665_CR38","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TCOM.1983.1095851","volume":"31","author":"P Burt","year":"1983","unstructured":"Burt, P., Adelson, E.: The Laplacian pyramid as a compact image code. IEEE Trans. Commun. 31(4), 532\u2013540 (1983)","journal-title":"IEEE Trans. Commun."},{"key":"665_CR39","unstructured":"Swain, G., Lenka, S.K.: A hybrid approach to steganography embedding at darkest and brightest pixels. In: 2010 International Conference on Communication and Computational Intelligence (INCOCCI), pp. 529\u2013534. IEEE (2010)"},{"issue":"2","key":"665_CR40","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.aeue.2012.06.008","volume":"67","author":"NM Makbol","year":"2013","unstructured":"Makbol, N.M., Khoo, B.E.: Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU Int. J. Electron. Commun. 67(2), 102\u2013112 (2013)","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"2","key":"665_CR41","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s13369-017-2898-z","volume":"43","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., Wu, L., Gao, S., Sun, H., Yan, Y.: Robust reversible watermarking algorithm based on RIWT and compressed sensing. Arab. J. Sci. Eng. 43(2), 979\u2013992 (2018)","journal-title":"Arab. J. Sci. Eng."},{"issue":"11","key":"665_CR42","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. TIFS 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur. TIFS"},{"key":"665_CR43","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhang, W., Chen, K., Liu, J., Liu, Y., Yu, N.: Adversarial examples against deep neural network based steganalysis. In: Proceedings of the 6th ACM workshop on information hiding and multimedia security, IH&MMSec'2018, pp. 67\u201372, Innsbruck, Austria (2018)","DOI":"10.1145\/3206004.3206012"},{"key":"665_CR44","doi-asserted-by":"crossref","unstructured":"Goljan, M., Fridrich, J., Cogranne, R.: Rich model for steganalysis of color images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 185\u2013190. IEEE (2014)","DOI":"10.1109\/WIFS.2014.7084325"},{"issue":"11","key":"665_CR45","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545\u20132557 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"665_CR46","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/LSP.2015.2438008","volume":"22","author":"J Chen","year":"2015","unstructured":"Chen, J., Kang, X., Liu, Y., Wang, Z.J.: Median filtering forensics based on convolutional neural networks. IEEE Signal Process. Lett. 22(11), 1849\u20131853 (2015)","journal-title":"IEEE Signal Process. Lett."},{"issue":"3","key":"665_CR47","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"Lin, C.C., Shiu, P.F.: High capacity data hiding scheme for DCT-based images. J. Inf. Hiding Multimed. Signal Process. 1(3), 220\u2013240 (2010)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"issue":"5","key":"665_CR48","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1007\/s11042-017-4388-4","volume":"77","author":"F Li","year":"2018","unstructured":"Li, F., Mao, Q., Chang, C.C.: Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed. Tools Appl. 77(5), 5149\u20135168 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"665_CR49","doi-asserted-by":"publisher","first-page":"4907","DOI":"10.1007\/s00034-018-0790-z","volume":"37","author":"A Shaik","year":"2018","unstructured":"Shaik, A., Thanikaiselvan, V.: A new image-based hybrid reversible data hiding model using IHWT and RP-PEHM for secured data communication. Circuits Syst. Signal Process. 37(11), 4907\u20134928 (2018)","journal-title":"Circuits Syst. Signal Process."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00665-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-020-00665-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00665-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,29]],"date-time":"2021-07-29T02:08:10Z","timestamp":1627524490000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-020-00665-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["665"],"URL":"https:\/\/doi.org\/10.1007\/s00530-020-00665-6","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]},"assertion":[{"value":"1 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}