{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:47:39Z","timestamp":1776293259915,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T00:00:00Z","timestamp":1602460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s00530-020-00703-3","type":"journal-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T06:02:41Z","timestamp":1602482561000},"page":"73-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Image steganography based on Kirsch edge detection"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8697-0803","authenticated-orcid":false,"given":"Sudipta Kumar","family":"Ghosal","sequence":"first","affiliation":[]},{"given":"Agneet","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,12]]},"reference":[{"key":"703_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2975798","author":"C Yan","year":"2020","unstructured":"Yan, C., Shao, B., Yuxuan, W., Yue, G.: Deep multi-view enhancement hashing for image retrieval. IEEE Trans Pattern Anal Mach Intell (2020). https:\/\/doi.org\/10.1109\/TPAMI.2020.2975798","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"703_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2967645","author":"C Yan","year":"2020","unstructured":"Yan, C., Shao, B., Zhao, H., Ning, R., Zhang, Y., Feng, X.: 3D room layout estimation from a single RGB image. IEEE Trans Multimed (2020). https:\/\/doi.org\/10.1109\/TMM.2020.2967645","journal-title":"IEEE Trans Multimed"},{"key":"703_CR3","unstructured":"Yan, C., Li, Z., Zhang, Y., Liu, Y., Ji, X., Zhang,Y.: Depth image denoising using nuclear norm and learning graph model. ACM Trans. Multimed. Comput. Commun. Appl. (2020). https:\/\/arxiv.org\/pdf\/2008.03741.pdf"},{"issue":"3\u20134","key":"703_CR4","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst J 35(3\u20134), 313\u2013336 (1996)","journal-title":"IBM Syst J"},{"issue":"9\u201310","key":"703_CR5","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D-C Wu","year":"2003","unstructured":"Wu, D.-C., Tsai, W.-H.: A Steganographic method for images by pixel-value differencing. Pattern Recogn Lett. 24(9\u201310), 1613\u20131626 (2003)","journal-title":"Pattern Recogn Lett."},{"issue":"11","key":"703_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LCOMM.2006.253292","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 1\u20133 (2006)","journal-title":"IEEE Commun. Lett."},{"key":"703_CR7","doi-asserted-by":"crossref","unstructured":"Lee C. F., Wang Y. R., Chang C. C.: A Steganographic method with high embedding capacity by improving exploiting modification direction. Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Vol. 1, pp. 497\u2013500 (2007).","DOI":"10.1109\/IIH-MSP.2007.62"},{"key":"703_CR8","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","volume":"48","author":"S-Y Shen","year":"2015","unstructured":"Shen, S.-Y., Huang, L.-H.: A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput. Secur. 48, 131\u2013141 (2015)","journal-title":"Comput. Secur."},{"key":"703_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4905-5,pp.1-17","author":"S-Y Shen","year":"2017","unstructured":"Shen, S.-Y., Huang, L.-H., Wu, S.-S.: A novel adaptive data hiding based on improved EMD and interpolation. Multimed. Tools Appl. (2017). https:\/\/doi.org\/10.1007\/s11042-017-4905-5,pp.1-17","journal-title":"Multimed. Tools Appl."},{"key":"703_CR10","doi-asserted-by":"publisher","first-page":"17607","DOI":"10.1007\/s11042-018-7127-6","volume":"78","author":"S Mukherjee","year":"2019","unstructured":"Mukherjee, S., Sanyal, G.: A multi level image steganography methodology based on adaptive PMS and block based pixel swapping. Multimed. Tools Appl. 78, 17607\u201317622 (2019). https:\/\/doi.org\/10.1007\/s11042-018-7127-6","journal-title":"Multimed. Tools Appl."},{"key":"703_CR11","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla, A.A., Sellahewa, H., Jassim, S.A.: Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed. Tools Appl. 78, 17799\u201317823 (2019). https:\/\/doi.org\/10.1007\/s11042-019-7166-7","journal-title":"Multimed. Tools Appl."},{"key":"703_CR12","doi-asserted-by":"publisher","first-page":"11747","DOI":"10.1007\/s11042-019-08472-6","volume":"79","author":"A Chatterjee","year":"2020","unstructured":"Chatterjee, A., Ghosal, S.K., Sarkar, R.: LSB based steganography with OCR: an intelligent amalgamation. Multimed. Tools Appl. 79, 11747\u201311765 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08472-6","journal-title":"Multimed. Tools Appl."},{"key":"703_CR13","doi-asserted-by":"publisher","first-page":"25089","DOI":"10.1007\/s11042-020-09129-5","volume":"79","author":"N Mohamed","year":"2020","unstructured":"Mohamed, N., Baziyad, M., Rabie, T., et al.: L*a*b* color space high capacity steganography utilizing quad-trees. Multimed Tools Appl 79, 25089\u201325113 (2020). https:\/\/doi.org\/10.1007\/s11042-020-09129-5","journal-title":"Multimed Tools Appl"},{"key":"703_CR14","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1016\/j.eswa.2009.09.050","volume":"37","author":"WJ Chen","year":"2010","unstructured":"Chen, W.J., Chang, C.C., Le, T.H.N.: High payload Steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37, 3292\u20133301 (2010)","journal-title":"Expert Syst. Appl."},{"key":"703_CR15","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1049\/iet-ipr.2013.0584","volume":"8","author":"HW Tseng","year":"2014","unstructured":"Tseng, H.W., Leng, H.S.: High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process. 8, 647\u2013654 (2014)","journal-title":"IET Image Process."},{"key":"703_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.displa.2016.12.004","volume":"46","author":"J Bai","year":"2017","unstructured":"Bai, J., Chang, C.-C., Nguyen, T.-S., Zhu, C., Liu, Y.: A high payload steganographic algorithm based on edge detection. Displays 46, 42\u201351 (2017). https:\/\/doi.org\/10.1016\/j.displa.2016.12.004","journal-title":"Displays"},{"key":"703_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.03.009","author":"R Atta","year":"2018","unstructured":"Atta, R., Ghanbari, M.: A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set, journal of visual communication & image representation. Elsevier (2018). https:\/\/doi.org\/10.1016\/j.jvcir.2018.03.009","journal-title":"Elsevier"},{"key":"703_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.jisa.2018.05.001","volume":"41","author":"K Gaurav","year":"2018","unstructured":"Gaurav, K., Ghanekar, U.: Image steganography based on Canny edge detection, dilation operator and hybrid coding. J. Inf. Secur. Appl. 41, 41\u201351 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2018.05.001","journal-title":"J. Inf. Secur. Appl."},{"key":"703_CR19","doi-asserted-by":"publisher","first-page":"30403","DOI":"10.1007\/s11042-018-6126-y","volume":"77","author":"SK Ghosal","year":"2018","unstructured":"Ghosal, S.K., Mandal, J.K., Sarkar, R.: High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimed. Tools Appl. 77, 30403\u201330418 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6126-y","journal-title":"Multimed. Tools Appl."},{"key":"703_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.12.007","author":"DRIM Setiadi","year":"2019","unstructured":"Setiadi, D.R.I.M.: Improved payload capacity in LSB image steganography uses dilated hybrid edge detection. J. King Saud Univ Comput Inf Sci (2019). https:\/\/doi.org\/10.1016\/j.jksuci.2019.12.007","journal-title":"J. King Saud Univ Comput Inf Sci"},{"issue":"2","key":"703_CR21","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.dt.2018.08.003","volume":"15","author":"S Kumar","year":"2019","unstructured":"Kumar, S., Singh, A., Kumar, M.: Information hiding with adaptive steganography based on novel fuzzy edge identification. Defence Technol. 15(2), 162\u2013169 (2019). https:\/\/doi.org\/10.1016\/j.dt.2018.08.003","journal-title":"Defence Technol."},{"key":"703_CR22","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/0010-4809(71)90034-6","volume":"4","author":"R Kirsch","year":"1971","unstructured":"Kirsch, R.: Computer determination of the constituent structure of biological images. Comput. Biomed. Res. 4, 315\u2013328 (1971)","journal-title":"Comput. Biomed. Res."},{"key":"703_CR23","unstructured":"Weber A. G., The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. https:\/\/sipi.usc.edu\/database\/. Accessed 11 Jul 2019."},{"key":"703_CR24","unstructured":"Boehm, B.: Stegexpose-A tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656 (2014)."},{"key":"703_CR25","unstructured":"Dumitrescu, S., Xiaolin, W., Nasir M.: On steganalysis of random LSB embedding in continuous-tone images. Proceedings. International Conference on Image Processing. Vol. 3. IEEE (2002)."},{"key":"703_CR26","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M., Dui, R.: Reliable detection of LSB steganography in color and grayscale images. Proceedings of the ACM Workshop on Multimedia and Security, pp. 27\u201330 (2001).","DOI":"10.1145\/1232454.1232466"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00703-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-020-00703-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-020-00703-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T09:31:45Z","timestamp":1634031105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-020-00703-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["703"],"URL":"https:\/\/doi.org\/10.1007\/s00530-020-00703-3","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,12]]},"assertion":[{"value":"10 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}