{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:27:01Z","timestamp":1755998821703},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s00530-023-01148-0","type":"journal-article","created":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T17:02:27Z","timestamp":1692982947000},"page":"3721-3744","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Compression of face images using meta-heuristic algorithms based on curvelet transform with variable bit allocation"],"prefix":"10.1007","volume":"29","author":[{"given":"Reza","family":"Khodadadi","sequence":"first","affiliation":[]},{"given":"Gholamreza","family":"Ardeshir","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Grailu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,25]]},"reference":[{"key":"1148_CR1","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.procs.2020.03.218","volume":"167","author":"P Chaudhary","year":"2020","unstructured":"Chaudhary, P., Gupta, R., Singh, A.: Joint image compression and encryption using a novel column-wise scanning and optimization algorithm. Procedia Comput. Sci. 167, 244\u2013253 (2020)","journal-title":"Procedia Comput. Sci."},{"key":"1148_CR2","unstructured":"Lakshmi Praba V, Anitha S (2019) Removing coding and inter pixel redundancy in high intensity part of image. J Emerg Technol Innov Res (JETIR) 6(2)"},{"issue":"2","key":"1148_CR3","doi-asserted-by":"crossref","first-page":"225","DOI":"10.25046\/aj050229","volume":"5","author":"A Bajit","year":"2020","unstructured":"Bajit, A., Nahid, M., Tamtaoui, A., Benbrahim, M.: A psychovisual optimization of wavelet foveation-based image coding and quality assessment based on human quality criterions. Adv. Sci. Technol. Eng. Syst. J. 5(2), 225\u2013234 (2020)","journal-title":"Adv. Sci. Technol. Eng. Syst. J."},{"issue":"2","key":"1148_CR4","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/83.136597","volume":"1","author":"M Antonini","year":"1992","unstructured":"Antonini, M., Barlaud, M., Mathieu, P., Daubechies, I.: Image coding using wavelet transform. IEEE Trans. Image Process. 1(2), 205\u2013220 (1992)","journal-title":"IEEE Trans. Image Process."},{"issue":"20","key":"1148_CR5","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1109\/18.119733","volume":"38","author":"RA DeVore","year":"1992","unstructured":"DeVore, R.A., Jawerth, B., Lucier, B.J.: Image compression through wavelet transform coding. IEEE Trans. Inform. 38(20), 719\u2013746 (1992). (Special issue on &lt;Emphasis Type=&quot;Italic&quot;&gt;Wavelet Transforms and Multiresolution Signal Analysis&lt;\/Emphasis&gt;)","journal-title":"IEEE Trans. Inform."},{"key":"1148_CR6","first-page":"105","volume-title":"Curves and Surface Fitting: Saint-Malo 1999","author":"E Cand\u00e8s","year":"2000","unstructured":"Cand\u00e8s, E., Donoho, D.: Curvelets\u2014a surprisingly effective nonadaptive representation for objects with edges. In: Cohen, A., Rabut, C., Schumaker, L. (eds.) Curves and Surface Fitting: Saint-Malo 1999, pp. 105\u2013120. Vanderbilt University Press, Nashville (2000)"},{"key":"1148_CR7","doi-asserted-by":"crossref","unstructured":"Bian, N., Liang, F., Fu, H., Lei, B.: A deep image compression framework for face recognition nding the optimum structure of CNN for face recognition. IEEE (2019)","DOI":"10.1109\/CCHI.2019.8901914"},{"key":"1148_CR8","doi-asserted-by":"publisher","first-page":"2912","DOI":"10.3390\/math10162912","volume":"10","author":"EM El-Kenawy","year":"2022","unstructured":"El-Kenawy, E.M., Mirjalili, S., Abdelhamid, A.A., Ibrahim, A., Khodadadi, N., Eid, M.M.: Meta-heuristic optimization and keystroke dynamics for authentication of smartphone users. Mathematics 10, 2912 (2022). https:\/\/doi.org\/10.3390\/math10162912","journal-title":"Mathematics"},{"issue":"1","key":"1148_CR9","doi-asserted-by":"crossref","first-page":"75","DOI":"10.5121\/sipij.2015.6106","volume":"6","author":"CH Venugopal Reddy","year":"2015","unstructured":"Venugopal Reddy, C.H., Siddaiah, P.: Hybrid LWT-SVD watermarking optimized using metaheuristic algorithms along with encryption for medical image security. Signal Image Process. Int. J. (SIPIJ) 6(1), 75\u201395 (2015)","journal-title":"Signal Image Process. Int. J. (SIPIJ)"},{"key":"1148_CR10","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.3390\/electronics10192354","volume":"10","author":"MK Hasan","year":"2021","unstructured":"Hasan, M.K., Ahsan, M.S., Abdullah-Al-Mamun, Shah Newaz, S.H., Lee, G.M.: Human face detection techniques: a comprehensive review and future research directions. Electronics 10, 2354 (2021). https:\/\/doi.org\/10.3390\/electronics10192354","journal-title":"Electronics"},{"issue":"9","key":"1148_CR11","doi-asserted-by":"crossref","first-page":"2379","DOI":"10.1109\/TIP.2007.903259","volume":"16","author":"M Elad","year":"2007","unstructured":"Elad, M., Goldenberg, R., Kimmel, R.: Low bit-rate compression of facial images. IEEE Trans. Image Process. 16(9), 2379\u20132383 (2007)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"1148_CR12","first-page":"251","volume":"6","author":"HR Moshtaghi","year":"2019","unstructured":"Moshtaghi, H.R., Eshlaghy, A.T., Motadel, M.R.: A comprehensive review on meta-heuristic algorithms and their classification with novel approach. J. Appl. Res. Ind. Eng. 6(3), 251\u2013267 (2019)","journal-title":"J. Appl. Res. Ind. Eng."},{"issue":"1","key":"1148_CR13","first-page":"301","volume":"11","author":"A Rikhtegara","year":"2020","unstructured":"Rikhtegara, A., Pooyanb, M., Manzuric, M.T.: Comparing performance of metaheuristic algorithms for. Int. J. Nonlinear Anal. Appl. 11(1), 301\u2013319 (2020)","journal-title":"Int. J. Nonlinear Anal. Appl."},{"key":"1148_CR14","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.12.5.271-278","author":"ME Emara","year":"2017","unstructured":"Emara, M.E., Abdel-Kader, R.F., Yasein, M.S.: Image compression using advanced optimization algorithms. J. Commun. (2017). https:\/\/doi.org\/10.12720\/jcm.12.5.271-278","journal-title":"J. Commun."},{"key":"1148_CR15","doi-asserted-by":"crossref","first-page":"012053","DOI":"10.1088\/1757-899X\/1136\/1\/012053","volume":"1136","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Lekhraj, Singh, S., Kumar, A.: Grey wolf optimizer and other metaheuristic optimization techniques with image processing as their applications: a review. IOP Conf. Ser. Mater. Sci. Eng. 1136, 012053 (2021)","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"1148_CR16","doi-asserted-by":"crossref","unstructured":"Oloyede, M., Hancke, G., Myburgh, H., Onumanyi, A.: A new evaluation function for face image enhancement in unconstrained environments using metaheuristic algorithms. EURASIP J. Image Video Process. (2019)","DOI":"10.1186\/s13640-019-0418-7"},{"issue":"1","key":"1148_CR17","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.2991\/ijcis.d.200729.001","volume":"13","author":"E Cuevas","year":"2020","unstructured":"Cuevas, E., Trujillo, A., Navarro, M.A., Diaz, P.: Comparison of recent metaheuristic algorithms for shape detection in images. Int. J. Comput. Intell. Syst. 13(1), 1059\u20131071 (2020)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"1148_CR18","doi-asserted-by":"crossref","unstructured":"Sheraj, M., Chopra, A.: Data compression algorithm for audio and image using feature extraction. In: 2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). (2020)","DOI":"10.1109\/ICCCSP49186.2020.9315248"},{"key":"1148_CR19","volume-title":"Applications of Evolutionary Computation in Image Processing and Pattern Recognition. Intelligent Systems Reference Library","author":"E Cuevas","year":"2026","unstructured":"Cuevas, E., Zald\u00edvar, D., Perez-Cisneros, M.: Applications of Evolutionary Computation in Image Processing and Pattern Recognition. Intelligent Systems Reference Library, vol. 100. Springer, Cham (2026)"},{"key":"1148_CR20","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12508","author":"K Geetha","year":"2020","unstructured":"Geetha, K., Anitha, V., Elhoseny, M., Kathiresan, S., Shamsolmoali, P., Selim, M.M.: An evolutionary lion optimization algorithm-based image compression technique for biomedical applications. Expert Syst. (2020). https:\/\/doi.org\/10.1111\/exsy.12508","journal-title":"Expert Syst."},{"key":"1148_CR21","doi-asserted-by":"crossref","unstructured":"Mascher-Kampfer, A., Stogner, H., Uhl, A.: Comparison of compression algorithms impact on fingerprint and face recognition accuracy. In: Proceedings of SPIE 6508, Visual Communications and Image Processing 2007, p 650810","DOI":"10.1117\/12.699199"},{"issue":"69042","key":"1148_CR22","first-page":"1","volume":"2006","author":"JE Vila-Forcen","year":"2006","unstructured":"Vila-Forcen, J.E., Voloshynovskiy, S., Koval, O., Pun, T.: Facial image compression based on structured codebooks in overcomplete domain. EURASIP J. Appl. Signal Process. 2006(69042), 1\u201311 (2006)","journal-title":"EURASIP J. Appl. Signal Process."},{"key":"1148_CR23","doi-asserted-by":"crossref","first-page":"2379","DOI":"10.1109\/TIP.2007.903259","volume":"16","author":"M Elad","year":"2007","unstructured":"Elad, M., Goldenberg, R., Kimmel, R.: Low bit-rate compression of facial images. IEEE Trans. Image Process 16, 2379\u20132383 (2007)","journal-title":"IEEE Trans. Image Process"},{"key":"1148_CR24","doi-asserted-by":"crossref","first-page":"29753","DOI":"10.1007\/s11042-022-12978-x","volume":"81","author":"A Bencherqui","year":"2022","unstructured":"Bencherqui, A., Daoui, A., Karmouni, H., Qjidaa, H., Alfidi, M., Sayyouri, M.: Optimal reconstruction and compression of signals and images by Hahn moments and artificial bee colony (ABC) algorithm. Multimedia Tools Appl. 81, 29753\u201329783 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"1148_CR25","doi-asserted-by":"crossref","first-page":"5541522","DOI":"10.1155\/2021\/5541522","volume":"2021","author":"L Asiedu","year":"2021","unstructured":"Asiedu, L., Essah, B.O., Iddi, S., Doku-Amponsah, K., Mettle, F.O.: Evaluation of the DWT-PCA\/SVD recognition algorithm on reconstructed frontal face images. J. Appl. Math. 2021, 5541522 (2021)","journal-title":"J. Appl. Math."},{"key":"1148_CR26","unstructured":"https:\/\/paperswithcode.com\/dataset\/orl."},{"key":"1148_CR27","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1109\/34.879790","volume":"22","author":"PJ Phillips","year":"2000","unstructured":"Phillips, P.J., Moon, H., Rizvi, S.A., Rauss, P.J.: The FERET evaluation methodology for face recognition algorithms. IEEE Trans. Pattern Anal. Mach. Intell. 22, 1090\u20131104 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1148_CR28","doi-asserted-by":"publisher","unstructured":"Selimovi\u0107, A., Hladnik, A.: Content-aware image compression with convolutional neural networks. Orig. Sci. Pap. https:\/\/doi.org\/10.24867\/GRID-2018-p56","DOI":"10.24867\/GRID-2018-p56"},{"key":"1148_CR29","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1612.08712","author":"A Prakash","year":"2017","unstructured":"Prakash, A., Moran, N., Garber, S., DiLillo, A., Storer, J.: Semantic perceptual image compression using deep convolution networks. Comput. Vis. Pattern Recognit. (2017). https:\/\/doi.org\/10.48550\/arXiv.1612.08712","journal-title":"Comput. Vis. Pattern Recognit."},{"key":"1148_CR30","unstructured":"Biswas, S., Sil, J., Maity, S.P.: On prediction error compressive sensing image reconstruction for face recognition. Comput. Electr. Eng. 1\u201314 (2017)"},{"key":"1148_CR31","doi-asserted-by":"publisher","unstructured":"He, T., Chen, Z.: End-to-End Facial Image Compression with Integrated Semantic Distortion Metric. IEEE. https:\/\/doi.org\/10.1109\/VCIP.2018.8698708","DOI":"10.1109\/VCIP.2018.8698708"},{"key":"1148_CR32","doi-asserted-by":"crossref","first-page":"101352","DOI":"10.1016\/j.jocs.2021.101352","volume":"51","author":"N Soni","year":"2021","unstructured":"Soni, N., Sharma, E.K., Kapoor, A.: Hybrid meta-heuristic algorithm based deep neural network for face recognition. J. Comput. Sci. 51, 101352 (2021)","journal-title":"J. Comput. Sci."},{"issue":"23","key":"1148_CR33","first-page":"13951","volume":"12","author":"A Kurniawan","year":"2017","unstructured":"Kurniawan, A.: Implementation of image compression using discrete cosine transform (DCT) and discrete wavelet transform (DWT). Int. J. Appl. Eng. Res. 12(23), 13951\u201313958 (2017)","journal-title":"Int. J. Appl. Eng. Res."},{"issue":"4","key":"1148_CR34","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1007\/s10462-017-9605-z","volume":"52","author":"K Hussain","year":"2019","unstructured":"Hussain, K., Salleh, M.N.M., Cheng, S., Shi, Y.: Metaheuristic research: a comprehensive survey. Artif. Intell. Rev. 52(4), 2191\u20132233 (2019)","journal-title":"Artif. Intell. Rev."},{"key":"1148_CR35","doi-asserted-by":"crossref","unstructured":"Y. Liang, et al;\u201c Face hallucination with imprecise-alignment using iterative sparse representation\u201d, Pattern Recognition (2014).","DOI":"10.1016\/j.patcog.2014.03.027"},{"key":"1148_CR36","unstructured":"Ravi Subban, Dattatreya Mankame, Sadique Nayeem, P. Pasupathi and S. Muthukumar; \u201cGenetic Algorithm based Human Face Recognition,\u201d Elsevier, 2014, Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC."},{"key":"1148_CR37","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.asoc.2019.02.041","volume":"80","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Liu, J., Tan, S., Wang, H.: A multi-objective differential evolutionary algorithm for constrained multi-objective optimization problems with low feasible ratio. Appl. Soft Comput. J. 80, 42\u201356 (2019)","journal-title":"Appl. Soft Comput. J."},{"issue":"2","key":"1148_CR38","first-page":"51","volume":"2","author":"RM Ramadan","year":"2009","unstructured":"Ramadan, R.M., Abdel-Kader, R.F.: Face recognition using particle swarm optimization-based selected features. Int. J. Signal Process. Image Process. Pattern Recognit. 2(2), 51\u201365 (2009)","journal-title":"Int. J. Signal Process. Image Process. Pattern Recognit."},{"issue":"2","key":"1148_CR39","first-page":"173","volume":"2","author":"S Kaur","year":"2011","unstructured":"Kaur, S., Agarwal, P., Rana, R.S.: Ant colony optimization: a technique used for image processing. Int. J. Comput. Sci. Technol. IJCST 2(2), 173\u2013175 (2011)","journal-title":"Int. J. Comput. Sci. Technol. IJCST"},{"key":"1148_CR40","unstructured":"Qiuyu, Z., Suozhong, W.: Color personal ID photo compression based on object segmentation. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, China (2005)"},{"key":"1148_CR41","unstructured":"Bala, J., Huang, J., Vafaie, H.: Hybrid learning using genetic algorithms and decision trees for pattern classification. In: Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, vol. 1. pp. 719\u2013724 (2012)"},{"key":"1148_CR42","unstructured":"Sun, Y., Yin, L.: A genetic algorithm based feature selection approach for 3D face recognition. In: Biometric consortium conference. USA, (2005)."},{"issue":"6","key":"1148_CR43","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1109\/34.862196","volume":"22","author":"C Liu","year":"2000","unstructured":"Liu, C., Wechsler, H.: Evolutionary pursuit and its application to face recognition. IEEE Trans. Pattern Anal. Mach. Intell. 22(6), 570\u2013582 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2008","key":"1148_CR44","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1016\/j.asoc.2007.05.007","volume":"8","author":"D Karaboga","year":"2008","unstructured":"Karaboga, D., Basturk, B.: On the performance of artificial bee colony (ABC) algorithm. Appl. Soft Comput. 8(2008), 687\u2013697 (2008)","journal-title":"Appl. Soft Comput."},{"key":"1148_CR45","unstructured":"https:\/\/www.researchgate.net\/figure\/Example-images-of-CIE-database_fig3_343240268"},{"key":"1148_CR46","unstructured":"https:\/\/fei.edu.br\/~cet\/facedatabase.html"},{"issue":"1","key":"1148_CR47","doi-asserted-by":"crossref","first-page":"166","DOI":"10.30534\/ijatcse\/2020\/3091.12020","volume":"9","author":"NH Jaafar","year":"2020","unstructured":"Jaafar, N.H., Sabudin, S., Ahmad, A.: Discrete curvelet transform algorithm for image compression system. Int. J. Adv. Trends Comput. Sci. Eng. 9(1), 166\u2013169 (2020)","journal-title":"Int. J. Adv. Trends Comput. Sci. Eng."},{"issue":"11","key":"1148_CR48","doi-asserted-by":"crossref","first-page":"19","DOI":"10.35940\/ijitee.J9896.0981119","volume":"8","author":"V Nawaria","year":"2019","unstructured":"Nawaria, V., Soni, V., Kanawade, S.Y.: Image fusion technique based on hybrid whale optimization algorithm simulated annealing (hWOA-SA). Int. J. Innov. Technol. Explor. Eng. (IJITEE) 8(11), 19\u201324 (2019)","journal-title":"Int. J. Innov. Technol. Explor. Eng. (IJITEE)"},{"key":"1148_CR49","first-page":"1373","volume":"9","author":"PD Kumari","year":"2017","unstructured":"Kumari, P.D., Panigrahi, S.K., Narayana, M.: Image compression algorithm based on curvelet transforms and comparative analysis with JPEG and JPEG 2000. Int. J. Electron. Eng. Res. 9, 1373\u20131387 (2017)","journal-title":"Int. J. Electron. Eng. Res."},{"issue":"16","key":"1148_CR50","first-page":"4633","volume":"119","author":"SR Sannasi Chakravarthy","year":"2018","unstructured":"Sannasi Chakravarthy, S.R., Rajaguru, H.: Fast and efficient image compression techniqueusing different encoding schemes. Int. J. Pure Appl. Math. 119(16), 4633\u20134640 (2018)","journal-title":"Int. J. Pure Appl. Math."},{"key":"1148_CR51","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2018.10.023","author":"SY Kahu","year":"2018","unstructured":"Kahu, S.Y., Bhurchandi, K.M.: JPEG-based variable block-size image compression using CIE La*b* color space. KSII Trans. Internet Inf. Syst. (2018). https:\/\/doi.org\/10.3837\/tiis.2018.10.023","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"1148_CR52","doi-asserted-by":"crossref","first-page":"39","DOI":"10.4103\/jpi.jpi_46_17","volume":"8","author":"L Pantanowitz","year":"2017","unstructured":"Pantanowitz, L., Liu, C., Huang, Y., Guo, H., Rohde, G.K.: Impact of altering various image parameters on human epidermal growth factor receptor 2 image analysis data quality. J. Pathol. Inform. 8, 39 (2017)","journal-title":"J. Pathol. Inform."},{"key":"1148_CR53","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/jimaging8010006","volume":"8","author":"D Giuliani","year":"2022","unstructured":"Giuliani, D.: Metaheuristic algorithms applied to color image segmentation on HSV space. J. Imaging 8, 1\u20136 (2022)","journal-title":"J. Imaging"},{"issue":"4","key":"1148_CR54","doi-asserted-by":"crossref","first-page":"682","DOI":"10.5829\/IJE.2023.36.04A.08","volume":"36","author":"R Khodadadi","year":"2023","unstructured":"Khodadadi, R., Ardeshir, G., Grailu, H.: Compressing face images using genetic and gray wolf meta-heuristic algorithms based on variable bit allocation. Int. J. Eng. 36(4), 682\u2013697 (2023)","journal-title":"Int. J. Eng."},{"key":"1148_CR55","volume-title":"Nature Inspired Optimization Techniques for Image Processing\u2014A Short Review","author":"SR Jino Ramson","year":"2019","unstructured":"Jino Ramson, S.R., Lova Raju, K., Vishnu, S., Anagnostopoulos, T.: Nature Inspired Optimization Techniques for Image Processing\u2014A Short Review. Springer International Publishing AG, part of Springer Nature, Cham (2019)"},{"key":"1148_CR56","doi-asserted-by":"crossref","unstructured":"Omari, M., Yaichi, S.: Image Compression Based on Genetic Algorithm Optimization. IEEE (2015)","DOI":"10.1109\/WSWAN.2015.7210304"},{"key":"1148_CR57","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1806206","author":"S Xu","year":"2020","unstructured":"Xu, S., Chang, C.-C., Liu, Y.: A novel image compression technology based on vector quantisation and linear regression prediction. Connect. Sci. (2020). https:\/\/doi.org\/10.1080\/09540091.2020.1806206","journal-title":"Connect. Sci."},{"issue":"1","key":"1148_CR58","first-page":"38","volume":"12","author":"SS Al-Bundi","year":"2020","unstructured":"Al-Bundi, S.S., Abd, M.S.: A review on fractal image compression using optimization techniques. J. Al-Qadisiyah Comput. Sci. Math. 12(1), 38\u201348 (2020)","journal-title":"J. Al-Qadisiyah Comput. Sci. Math."},{"key":"1148_CR59","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili, S., Lewis, A.: The whale optimization algorithm. Adv. Eng. Softw. 95, 51\u201367 (2016)","journal-title":"Adv. Eng. Softw."},{"key":"1148_CR60","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014)","journal-title":"Adv. Eng. Softw."},{"issue":"1","key":"1148_CR61","doi-asserted-by":"publisher","first-page":"1483565","DOI":"10.1080\/25742558.2018.1483565","volume":"5","author":"J Nasiri","year":"2018","unstructured":"Nasiri, J., Khiyabani, F.M.: A whale optimization algorithm (WOA) approach for clustering. Cogent Math. Stat. 5(1), 1483565 (2018). https:\/\/doi.org\/10.1080\/25742558.2018.1483565","journal-title":"Cogent Math. Stat."},{"key":"1148_CR62","doi-asserted-by":"crossref","unstructured":"Ye, Z., Wang, F., Kochan, R.: Image enhancement based on whale optimization algorithm. In: Telecommunications and computer engineering (TCSET), February 2020","DOI":"10.1109\/TCSET49122.2020.235554"},{"key":"1148_CR63","volume-title":"Grey Wolf Optimization Algorithm for Facial Image Super-Resolution","author":"SS Rajput","year":"2018","unstructured":"Rajput, S.S., Bohat, V.K., Arya, K.V.: Grey Wolf Optimization Algorithm for Facial Image Super-Resolution. Springer Science+Business Media, LLC, part of Springer Nature, Berlin (2018)"},{"key":"1148_CR64","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.neucom.2015.06.083","volume":"172","author":"E Emary","year":"2016","unstructured":"Emary, E., Zawbaa, H.M., Hassanien, A.E.: Binary grey wolf optimization approaches for feature selection. Neurocomputing 172, 371\u2013381 (2016). https:\/\/doi.org\/10.1016\/j.neucom.2015.06.083","journal-title":"Neurocomputing"},{"issue":"5","key":"1148_CR65","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1006\/anbe.2003.2223","volume":"66","author":"C Begg","year":"2003","unstructured":"Begg, C., Begg, K., Du Toit, J., Mills, M.: Scent-marking behaviour of the honey badger, mellivora capensis (mustelidae), in the southern kalahari. Anim. Behav. 66(5), 917\u2013929 (2003)","journal-title":"Anim. Behav."},{"issue":"1","key":"1148_CR66","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1017\/S0952836904005990","volume":"265","author":"C Begg","year":"2005","unstructured":"Begg, C., Begg, K., Du Toit, J., Mills, M.: Life-history variables of an atypical mustelid, the honey badger mellivora capensis. J. Zool. 265(1), 17\u201322 (2005)","journal-title":"J. Zool."},{"key":"1148_CR67","volume-title":"Mammals of the Soviet Union: Vol. 2, Part 1b: Carnivora (Weasels, Additional Species)","author":"V Heptner","year":"2001","unstructured":"Heptner, V.: Mammals of the Soviet Union: Vol. 2, Part 1b: Carnivora (Weasels, Additional Species). Smithsonian Institution Libraries & The National Science Foundation, Washington (2001)"},{"key":"1148_CR68","doi-asserted-by":"crossref","first-page":"7665","DOI":"10.1007\/s00521-018-3592-0","volume":"31","author":"K Hussain","year":"2018","unstructured":"Hussain, K., Salleh, M.N.M., Cheng, S., Shi, Y.: On the exploration and exploitation in popular swarm-based metaheuristic algorithms. Neural Comput. Appl. 31, 7665\u20137683 (2018)","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"1148_CR69","first-page":"72","volume":"37","author":"D Cui","year":"2017","unstructured":"Cui, D.: Application of whale optimization algorithm in reservoir optimal operation. Adv. Sci. Technol. Water Resour. 37(3), 72\u201379, 94 (2017)","journal-title":"Adv. Sci. Technol. Water Resour."},{"issue":"2","key":"1148_CR70","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1515\/jaiscr-2015-0001","volume":"4","author":"S Cheng","year":"2014","unstructured":"Cheng, S., Shi, Y., Qin, Q., Zhang, Q., Bai, R.: Population diversity maintenance in brain storm optimization algorithm. J. Artif. Intell. Soft Comput. Res. 4(2), 83\u201397 (2014)","journal-title":"J. Artif. Intell. Soft Comput. Res."},{"issue":"7","key":"1148_CR71","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1109\/TCSVT.2012.2189793","volume":"22","author":"Y Jin","year":"2012","unstructured":"Jin, Y., Lee, H.J.: A block-based pass-parallel SPIHT algorithm. IEEE Trans. Circuits Syst. Video Technol. 22(7), 1064\u20131075 (2012)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1148_CR72","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.asoc.2014.03.009","volume":"21","author":"T Xiang","year":"2014","unstructured":"Xiang, T., QuXiao, J.: Joint SPIHT compression and selective encryption. Appl. Soft Comput. 21, 159\u2013170 (2014)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"1148_CR73","first-page":"39","volume":"6","author":"M Satone","year":"2014","unstructured":"Satone, M., Kharate, G.: Feature selection using genetic algorithm for face recognition based on PCA, wavelet and SVM. Int. J. Electr. Eng. Inform. 6(1), 39\u201352 (2014)","journal-title":"Int. J. Electr. Eng. Inform."},{"key":"1148_CR74","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s13042-011-0023-2","volume":"2","author":"B Poon","year":"2011","unstructured":"Poon, B., Ashraful Amin, M., Yan, H.: Performance evaluation and comparison of PCA based humanface recognition methods for distorted images. Int. J. Mach. Learn. Cybern. 2, 245\u2013259 (2011)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"1","key":"1148_CR75","first-page":"55","volume":"2","author":"IK Timotius","year":"2010","unstructured":"Timotius, I.K., Setyawan, I., Febrianto, A.: A Face recognition between two person using kernel principal component analysis and support vector machines. Int. J. Electr. Eng. Inf. 2(1), 55\u201363 (2010)","journal-title":"Int. J. Electr. Eng. Inf."}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01148-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-023-01148-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-023-01148-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T11:10:17Z","timestamp":1700133017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-023-01148-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":75,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1148"],"URL":"https:\/\/doi.org\/10.1007\/s00530-023-01148-0","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"value":"0942-4962","type":"print"},{"value":"1432-1882","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,25]]},"assertion":[{"value":"29 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}