{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T17:23:07Z","timestamp":1775928187389,"version":"3.50.1"},"reference-count":271,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"crossref","award":["21-71-10113"],"award-info":[{"award-number":["21-71-10113"]}],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s10462-023-10537-w","type":"journal-article","created":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T14:01:32Z","timestamp":1687096892000},"page":"15375-15447","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Image data hiding schemes based on metaheuristic optimization: a review"],"prefix":"10.1007","volume":"56","author":[{"given":"Anna","family":"Melman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8257-2082","authenticated-orcid":false,"given":"Oleg","family":"Evsutin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"key":"10537_CR1","doi-asserted-by":"publisher","first-page":"27895","DOI":"10.1007\/s11042-018-6014-5","volume":"77","author":"AM Abdelhakim","year":"2018","unstructured":"Abdelhakim AM, Saad MH, Sayed M, Saleh HI (2018) Optimized SVD-based robust watermarking in the fractional Fourier domain. Multimed Tools Appl 77:27895\u201327917. https:\/\/doi.org\/10.1007\/s11042-018-6014-5","journal-title":"Multimed Tools Appl"},{"key":"10537_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1002\/cplx.21634","volume":"21","author":"O Abedinia","year":"2016","unstructured":"Abedinia O, Amjady N, Ghasemi A (2016) A new metaheuristic algorithm based on shark smell optimization. Complexity 21:97\u2013116. https:\/\/doi.org\/10.1002\/cplx.21634","journal-title":"Complexity"},{"key":"10537_CR3","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1007\/978-3-642-22170-5_57","volume":"179","author":"NE Abdul Khalid","year":"2011","unstructured":"Abdul Khalid NE, Md Ariff N, Yahya S, Mohamed Noor N (2011) A review of bio-inspired algorithms as image processing techniques. Commun Comput Inf Sci 179:660\u2013673. https:\/\/doi.org\/10.1007\/978-3-642-22170-5_57","journal-title":"Commun Comput Inf Sci"},{"key":"10537_CR4","doi-asserted-by":"publisher","first-page":"17027","DOI":"10.1007\/s11042-018-7085-z","volume":"78","author":"AK Abdulrahman","year":"2019","unstructured":"Abdulrahman AK, Ozturk S (2019) A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimed Tools Appl 78:17027\u201317049. https:\/\/doi.org\/10.1007\/s11042-018-7085-z","journal-title":"Multimed Tools Appl"},{"key":"10537_CR5","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","volume":"51","author":"SBB Ahmadi","year":"2021","unstructured":"Ahmadi SBB, Zhang G, Rabbani M et al (2021a) An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl Intell 51:1701\u20131732. https:\/\/doi.org\/10.1007\/s10489-020-01903-0","journal-title":"Appl Intell"},{"key":"10537_CR6","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s00371-020-01808-6","volume":"37","author":"SBB Ahmadi","year":"2021","unstructured":"Ahmadi SBB, Zhang G, Wei S, Boukela L (2021b) An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics. Vis Comput 37:385\u2013409. https:\/\/doi.org\/10.1007\/s00371-020-01808-6","journal-title":"Vis Comput"},{"key":"10537_CR7","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1007\/s11760-015-0758-4","volume":"9","author":"B Akay","year":"2015","unstructured":"Akay B, Karaboga D (2015) A survey on the applications of artificial bee colony in signal, image, and video processing. SIViP 9:967\u2013990. https:\/\/doi.org\/10.1007\/s11760-015-0758-4","journal-title":"SIViP"},{"key":"10537_CR8","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s10462-016-9486-6","volume":"47","author":"S Akyol","year":"2017","unstructured":"Akyol S, Alatas B (2017) Plant intelligence based metaheuristic optimization algorithms. Artif Intell Rev 47:417\u2013462. https:\/\/doi.org\/10.1007\/s10462-016-9486-6","journal-title":"Artif Intell Rev"},{"key":"10537_CR9","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/s13198-014-0288-4","volume":"9","author":"M Ali","year":"2018","unstructured":"Ali M, Ahn CW (2018) An optimal image watermarking approach through cuckoo search algorithm in wavelet domain. Int J Syst Assur Eng Manage 9:602\u2013611. https:\/\/doi.org\/10.1007\/s13198-014-0288-4","journal-title":"Int J Syst Assur Eng Manage"},{"key":"10537_CR10","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.3390\/electronics9091428","volume":"9","author":"M Ali","year":"2020","unstructured":"Ali M, Ahn CW, Pant M et al (2020) An optimized digital watermarking scheme based on invariant DC coefficients in spatial domain. Electronics 9:1428. https:\/\/doi.org\/10.3390\/electronics9091428","journal-title":"Electronics"},{"key":"10537_CR11","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s11045-021-00793-w","volume":"33","author":"AHM Almawgani","year":"2022","unstructured":"Almawgani AHM, Alhawari ARH, Hindi AT et al (2022) Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data. Multidimension Syst Signal Process 33:561\u2013578. https:\/\/doi.org\/10.1007\/s11045-021-00793-w","journal-title":"Multidimension Syst Signal Process"},{"key":"10537_CR12","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TPWRS.2014.2330628","volume":"30","author":"FR Alonso","year":"2015","unstructured":"Alonso FR, Oliveira DQ, Zambroni De Souza AC (2015) Artificial immune systems optimization approach for multiobjective distribution system reconfiguration. IEEE Trans Power Syst 30:840\u2013847. https:\/\/doi.org\/10.1109\/TPWRS.2014.2330628","journal-title":"IEEE Trans Power Syst"},{"key":"10537_CR13","doi-asserted-by":"publisher","first-page":"100316","DOI":"10.1016\/j.cosrev.2020.100316","volume":"38","author":"AA AlSabhany","year":"2020","unstructured":"AlSabhany AA, Ali AH, Ridzuan F et al (2020) Digital audio steganography: systematic review, classification, and analysis of the current state of the art. Comput Sci Rev 38:100316. https:\/\/doi.org\/10.1016\/j.cosrev.2020.100316","journal-title":"Comput Sci Rev"},{"key":"10537_CR14","doi-asserted-by":"publisher","first-page":"17077","DOI":"10.1007\/s11042-018-7061-7","volume":"78","author":"Y Alsalhi","year":"2019","unstructured":"Alsalhi Y (2019) An accurate and high-efficient QuBits steganography scheme based on hybrid neural networks. Multimed Tools Appl 78:17077\u201317093. https:\/\/doi.org\/10.1007\/s11042-018-7061-7","journal-title":"Multimed Tools Appl"},{"key":"10537_CR15","doi-asserted-by":"publisher","first-page":"23457","DOI":"10.1007\/s11042-020-10251-7","volume":"80","author":"\u015eY Altay","year":"2021","unstructured":"Altay \u015eY, Uluta\u015f G (2021) Self-adaptive step firefly algorithm based robust watermarking method in DWT-SVD domain. Multimed Tools Appl 80:23457\u201323484. https:\/\/doi.org\/10.1007\/s11042-020-10251-7","journal-title":"Multimed Tools Appl"},{"key":"10537_CR16","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s12553-018-00289-x","volume":"10","author":"Ambika","year":"2020","unstructured":"Ambika, Biradar RL (2020) Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique. Health Technol 10:231\u2013247. https:\/\/doi.org\/10.1007\/s12553-018-00289-x","journal-title":"Health Technol"},{"key":"10537_CR17","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2019.1692442","author":"Ambika","year":"2019","unstructured":"Ambika, Biradar RL, Burkpalli V (2019) Encryption-based steganography of images by multiobjective whale optimal pixel selection. Int J Comput Appl. https:\/\/doi.org\/10.1080\/1206212X.2019.1692442","journal-title":"Int J Comput Appl"},{"key":"10537_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104688","author":"Ambika","year":"2022","unstructured":"Ambika, Virupakshappa, Lim S-J (2022) Hybrid image embedding technique using Steganographic Signcryption and IWT-GWO methods. Microprocess Microsyst. https:\/\/doi.org\/10.1016\/j.micpro.2022.104688","journal-title":"Microprocess Microsyst"},{"key":"10537_CR19","doi-asserted-by":"publisher","first-page":"415","DOI":"10.3233\/JIFS-191911","volume":"40","author":"A Amsaveni","year":"2021","unstructured":"Amsaveni A, Bharathi M (2021) Use of firefly optimization algorithm for fractional fourier transform based reversible data hiding. J Intell Fuzzy Syst 40:415\u2013425. https:\/\/doi.org\/10.3233\/JIFS-191911","journal-title":"J Intell Fuzzy Syst"},{"key":"10537_CR20","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038","journal-title":"Comput Commun"},{"key":"10537_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3140862","author":"A Anand","year":"2022","unstructured":"Anand A, Singh AK (2022) Hybrid nature-inspired optimization and encryption-based watermarking for E-healthcare. IEEE Trans Comput Soc Syst. https:\/\/doi.org\/10.1109\/TCSS.2022.3140862","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"10537_CR22","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.diin.2013.01.005","volume":"9","author":"P Andriotis","year":"2013","unstructured":"Andriotis P, Oikonomou G, Tryfonas T (2013) JPEG steganography detection with Benford\u2019s Law. Digit Investig 9:246\u2013257. https:\/\/doi.org\/10.1016\/j.diin.2013.01.005","journal-title":"Digit Investig"},{"key":"10537_CR23","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1049\/cje.2021.05.016","volume":"30","author":"K Anis","year":"2021","unstructured":"Anis K, Zied K, Anis S (2021) A reframed watermark extraction approach using the ABC algorithm. Chin J Electron 30:736\u2013742. https:\/\/doi.org\/10.1049\/cje.2021.05.016","journal-title":"Chin J Electron"},{"key":"10537_CR24","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.patrec.2016.12.010","volume":"94","author":"IA Ansari","year":"2017","unstructured":"Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228\u2013236. https:\/\/doi.org\/10.1016\/j.patrec.2016.12.010","journal-title":"Pattern Recogn Lett"},{"key":"10537_CR25","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/s13198-016-0568-2","volume":"9","author":"IA Ansari","year":"2018","unstructured":"Ansari IA, Pant M (2018) Quality assured and optimized image watermarking using artificial bee colony. Int J Syst Assur Eng Manage 9:274\u2013286. https:\/\/doi.org\/10.1007\/s13198-016-0568-2","journal-title":"Int J Syst Assur Eng Manage"},{"key":"10537_CR26","doi-asserted-by":"publisher","first-page":"18001","DOI":"10.1007\/s11042-016-3680-z","volume":"76","author":"IA Ansari","year":"2017","unstructured":"Ansari IA, Pant M, Ahn CW (2017) Artificial bee colony optimized robust-reversible image watermarking. Multimed Tools Appl 76:18001\u201318025. https:\/\/doi.org\/10.1007\/s11042-016-3680-z","journal-title":"Multimed Tools Appl"},{"key":"10537_CR27","doi-asserted-by":"publisher","first-page":"12041","DOI":"10.1007\/s11042-019-08338-x","volume":"79","author":"D Ariatmanto","year":"2020","unstructured":"Ariatmanto D, Ernawan F (2020) An improved robust image watermarking by using different embedding strengths. Multimed Tools Appl 79:12041\u201312067. https:\/\/doi.org\/10.1007\/s11042-019-08338-x","journal-title":"Multimed Tools Appl"},{"key":"10537_CR28","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.asoc.2016.11.044","volume":"51","author":"M Arsalan","year":"2017","unstructured":"Arsalan M, Qureshi AS, Khan A, Rajarajan M (2017) Protection of medical images and patient related information in healthcare: using an intelligent and reversible watermarking technique. Appl Soft Comput 51:168\u2013179. https:\/\/doi.org\/10.1016\/j.asoc.2016.11.044","journal-title":"Appl Soft Comput"},{"key":"10537_CR29","doi-asserted-by":"publisher","first-page":"25075","DOI":"10.1007\/s11042-022-12456-4","volume":"81","author":"D Awasthi","year":"2022","unstructured":"Awasthi D, Srivastava VK (2022) LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks. Multimed Tools Appl 81:25075\u201325099. https:\/\/doi.org\/10.1007\/s11042-022-12456-4","journal-title":"Multimed Tools Appl"},{"key":"10537_CR30","doi-asserted-by":"publisher","first-page":"2230","DOI":"10.1016\/j.egyr.2020.08.009","volume":"6","author":"AS Azad","year":"2020","unstructured":"Azad AS, Rahaman MSA, Watada J et al (2020) Optimization of the hydropower energy generation using meta-heuristic approaches: a review. Energy Rep 6:2230\u20132248. https:\/\/doi.org\/10.1016\/j.egyr.2020.08.009","journal-title":"Energy Rep"},{"key":"10537_CR31","doi-asserted-by":"publisher","first-page":"116084","DOI":"10.1016\/j.image.2020.116084","volume":"91","author":"Y Bai","year":"2021","unstructured":"Bai Y, Jiang G, Zhu Z et al (2021) Reversible data hiding scheme for high dynamic range images based on multiple prediction error expansion. Signal Process: Image Commun 91:116084. https:\/\/doi.org\/10.1016\/j.image.2020.116084","journal-title":"Signal Process: Image Commun"},{"key":"10537_CR32","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.jisa.2018.05.003","volume":"41","author":"FY Bakhsh","year":"2018","unstructured":"Bakhsh FY, Moghaddam ME (2018) A robust HDR images watermarking method using artificial bee colony algorithm. J Inf Secur Appl 41:12\u201327. https:\/\/doi.org\/10.1016\/j.jisa.2018.05.003","journal-title":"J Inf Secur Appl"},{"key":"10537_CR33","doi-asserted-by":"publisher","first-page":"4431","DOI":"10.1007\/s10586-018-1991-8","volume":"22","author":"K Balasamy","year":"2019","unstructured":"Balasamy K, Ramakrishnan S (2019) An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Cluster Comput 22:4431\u20134442. https:\/\/doi.org\/10.1007\/s10586-018-1991-8","journal-title":"Cluster Comput"},{"key":"10537_CR34","doi-asserted-by":"publisher","first-page":"27491","DOI":"10.1007\/s11042-018-5933-5","volume":"77","author":"A Banharnsakun","year":"2018","unstructured":"Banharnsakun A (2018) Artificial bee colony approach for enhancing LSB based image steganography. Multimed Tools Appl 77:27491\u201327504. https:\/\/doi.org\/10.1007\/s11042-018-5933-5","journal-title":"Multimed Tools Appl"},{"key":"10537_CR35","doi-asserted-by":"publisher","first-page":"15219","DOI":"10.1007\/s11042-022-12526-7","volume":"81","author":"M Bansal","year":"2022","unstructured":"Bansal M, Mishra A, Sharma A (2022) Multiple scaling Fuzzy-PSO watermarking scheme for gray-scale and colored images. Multimed Tools Appl 81:15219\u201315248. https:\/\/doi.org\/10.1007\/s11042-022-12526-7","journal-title":"Multimed Tools Appl"},{"key":"10537_CR36","doi-asserted-by":"publisher","first-page":"7461","DOI":"10.1007\/s11042-021-11798-9","volume":"81","author":"SA Barlaskar","year":"2022","unstructured":"Barlaskar SA, Singh SV, Anish MK, Laskar RH (2022) Genetic algorithm based optimized watermarking technique using hybrid DCNN-SVR and statistical approach for watermark extraction. Multimed Tools Appl 81:7461\u20137500. https:\/\/doi.org\/10.1007\/s11042-021-11798-9","journal-title":"Multimed Tools Appl"},{"key":"10537_CR37","doi-asserted-by":"publisher","first-page":"39995","DOI":"10.1007\/s11042-022-12557-0","volume":"81","author":"S Basu","year":"2022","unstructured":"Basu S, Debnath A, Basu A, Das TS (2022) An image data hiding technique using differential evolution. Multimed Tools Appl 81:39995\u201340012. https:\/\/doi.org\/10.1007\/s11042-022-12557-0","journal-title":"Multimed Tools Appl"},{"key":"10537_CR38","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.swevo.2018.08.003","volume":"44","author":"YM Ben Ali","year":"2019","unstructured":"Ben Ali YM (2019) Smell Bees Optimization for new embedding steganographic scheme in spatial domain. Swarm Evol Comput 44:584\u2013596. https:\/\/doi.org\/10.1016\/j.swevo.2018.08.003","journal-title":"Swarm Evol Comput"},{"key":"10537_CR39","doi-asserted-by":"publisher","first-page":"7101","DOI":"10.1007\/s11042-019-08497-x","volume":"79","author":"R Biswas","year":"2020","unstructured":"Biswas R, Bandyapadhay SK (2020) Random selection based GA optimization in 2D-DCT domain color image steganography. Multimed Tools Appl 79:7101\u20137120. https:\/\/doi.org\/10.1007\/s11042-019-08497-x","journal-title":"Multimed Tools Appl"},{"key":"10537_CR40","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.3390\/math9151795","volume":"9","author":"M Cedillo-Hernandez","year":"2021","unstructured":"Cedillo-Hernandez M, Cedillo-Hernandez A, Garcia-Ugalde FJ (2021) Improving DFT-based image watermarking using particle swarm optimization algorithm. Mathematics 9:1795. https:\/\/doi.org\/10.3390\/math9151795","journal-title":"Mathematics"},{"key":"10537_CR41","doi-asserted-by":"publisher","first-page":"4810","DOI":"10.1002\/int.22742","volume":"37","author":"A Chacko","year":"2022","unstructured":"Chacko A, Chacko S (2022) Deep learning-based robust medical image watermarking exploiting DCT and Harris hawks optimization. Int J Intell Syst 37:4810\u20134844. https:\/\/doi.org\/10.1002\/int.22742","journal-title":"Int J Intell Syst"},{"key":"10537_CR42","doi-asserted-by":"publisher","first-page":"18693","DOI":"10.1007\/s11042-019-7265-5","volume":"78","author":"S Chakravarthy","year":"2019","unstructured":"Chakravarthy S, Jagannathan MA, Ranjani JJ et al (2019) An optimized hierarchical encryption technique for tamper recognition. Multimed Tools Appl 78:18693\u201318712. https:\/\/doi.org\/10.1007\/s11042-019-7265-5","journal-title":"Multimed Tools Appl"},{"key":"10537_CR43","doi-asserted-by":"publisher","first-page":"4850","DOI":"10.1109\/TCSVT.2021.3055612","volume":"31","author":"Q Chang","year":"2021","unstructured":"Chang Q, Li X, Zhao Y, Ni R (2021) Adaptive pairwise prediction-error expansion and multiple histograms modification for reversible data hiding. IEEE Trans Circuits Syst Video Technol 31:4850\u20134863. https:\/\/doi.org\/10.1109\/TCSVT.2021.3055612","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10537_CR44","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.1007\/s11042-017-4886-4","volume":"78","author":"DS Chauhan","year":"2019","unstructured":"Chauhan DS, Singh AK, Kumar B, Saini JP (2019) Quantization based multiple medical information watermarking for secure e-health. Multimed Tools Appl 78:3911\u20133923. https:\/\/doi.org\/10.1007\/s11042-017-4886-4","journal-title":"Multimed Tools Appl"},{"key":"10537_CR45","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727\u2013752. https:\/\/doi.org\/10.1016\/j.sigpro.2009.08.010","journal-title":"Signal Process"},{"key":"10537_CR46","doi-asserted-by":"publisher","first-page":"169525","DOI":"10.1109\/ACCESS.2020.3024181","volume":"8","author":"AM Cheema","year":"2020","unstructured":"Cheema AM, Adnan SM, Mehmood Z (2020) A novel optimized semi-blind scheme for color image watermarking. IEEE Access 8:169525\u2013169547. https:\/\/doi.org\/10.1109\/ACCESS.2020.3024181","journal-title":"IEEE Access"},{"key":"10537_CR47","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47:1423\u20131443. https:\/\/doi.org\/10.1109\/18.923725","journal-title":"IEEE Trans Inf Theory"},{"key":"10537_CR48","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1049\/joe.2018.8287","volume":"2018","author":"T Chen","year":"2018","unstructured":"Chen T, Zhu Y, Teng J (2018) Beetle swarm optimisation for solving investment portfolio problems. J Eng 2018:1600\u20131605. https:\/\/doi.org\/10.1049\/joe.2018.8287","journal-title":"J Eng"},{"key":"10537_CR49","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1109\/TVLSI.2019.2933722","volume":"27","author":"T-S Chen","year":"2019","unstructured":"Chen T-S, Hou K-N, Beh W-K, Wu A-Y (2019) Low-complexity compressed-sensing-based watermark cryptosystem and circuits implementation for wireless sensor networks. IEEE Trans Very Large Scale Integr (VLSI) Syst 27:2485\u20132497. https:\/\/doi.org\/10.1109\/TVLSI.2019.2933722","journal-title":"IEEE Trans Very Large Scale Integr (VLSI) Syst"},{"key":"10537_CR50","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1109\/TCYB.2014.2322602","volume":"45","author":"R Cheng","year":"2015","unstructured":"Cheng R, Jin Y (2015) A competitive swarm optimizer for large scale optimization. IEEE Trans Cybern 45:191\u2013204. https:\/\/doi.org\/10.1109\/TCYB.2014.2322602","journal-title":"IEEE Trans Cybern"},{"key":"10537_CR51","doi-asserted-by":"publisher","first-page":"e0196306","DOI":"10.1371\/journal.pone.0196306","volume":"13","author":"X Cui","year":"2018","unstructured":"Cui X, Niu Y, Zheng X, Han Y (2018) An optimized digital watermarking algorithm in wavelet domain based on differential evolution for color image. PLoS ONE 13:e0196306. https:\/\/doi.org\/10.1371\/journal.pone.0196306","journal-title":"PLoS ONE"},{"key":"10537_CR52","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/TPWRS.2009.2021226","volume":"24","author":"C Dai","year":"2009","unstructured":"Dai C, Chen W, Zhu Y, Zhang X (2009) Seeker optimization algorithm for optimal reactive power dispatch. IEEE Trans Power Syst 24:1218\u20131231. https:\/\/doi.org\/10.1109\/TPWRS.2009.2021226","journal-title":"IEEE Trans Power Syst"},{"key":"10537_CR53","doi-asserted-by":"publisher","first-page":"5831","DOI":"10.1007\/s10462-021-09968-0","volume":"54","author":"M Dalal","year":"2021","unstructured":"Dalal M, Juneja M (2021) A survey on information hiding using video steganography. Artif Intell Rev 54:5831\u20135895. https:\/\/doi.org\/10.1007\/s10462-021-09968-0","journal-title":"Artif Intell Rev"},{"key":"10537_CR54","doi-asserted-by":"publisher","first-page":"31103","DOI":"10.1007\/s11042-020-09433-0","volume":"79","author":"B Dappuri","year":"2020","unstructured":"Dappuri B, Rao MP, Sikha MB (2020) Non-blind RGB watermarking approach using SVD in translation invariant wavelet space with enhanced Grey-wolf optimizer. Multimed Tools Appl 79:31103\u201331124. https:\/\/doi.org\/10.1007\/s11042-020-09433-0","journal-title":"Multimed Tools Appl"},{"key":"10537_CR55","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-01085-9_2","volume":"203","author":"S Das","year":"2009","unstructured":"Das S, Biswas A, Dasgupta S, Abraham A (2009) Bacterial foraging optimization algorithm: theoretical foundations, analysis, and applications. Stud Comput Intell 203:23\u201355. https:\/\/doi.org\/10.1007\/978-3-642-01085-9_2","journal-title":"Stud Comput Intell"},{"key":"10537_CR56","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/S0045-7825(99)00389-8","volume":"186","author":"K Deb","year":"2000","unstructured":"Deb K (2000) An efficient constraint handling method for genetic algorithms. Comput Methods Appl Mech Eng 186:311\u2013338. https:\/\/doi.org\/10.1016\/S0045-7825(99)00389-8","journal-title":"Comput Methods Appl Mech Eng"},{"key":"10537_CR57","doi-asserted-by":"publisher","DOI":"10.3390\/math10163015","author":"KJ Devi","year":"2022","unstructured":"Devi KJ, Singh P, Dash JK et al (2022a) A new robust and secure 3-level digital image watermarking method based on G-BAT hybrid optimization. Mathematics. https:\/\/doi.org\/10.3390\/math10163015","journal-title":"Mathematics"},{"key":"10537_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109781","author":"KJ Devi","year":"2022","unstructured":"Devi KJ, Singh P, Thakkar HK, Kumar N (2022b) Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media. Appl Soft Comput. https:\/\/doi.org\/10.1016\/j.asoc.2022.109781","journal-title":"Appl Soft Comput"},{"key":"10537_CR59","doi-asserted-by":"publisher","first-page":"87563","DOI":"10.1109\/ACCESS.2021.3089357","volume":"9","author":"S Dhawan","year":"2021","unstructured":"Dhawan S, Chakraborty C, Frnda J et al (2021) SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT. IEEE Access 9:87563\u201387578. https:\/\/doi.org\/10.1109\/ACCESS.2021.3089357","journal-title":"IEEE Access"},{"key":"10537_CR60","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13798-9","author":"S Dhawan","year":"2022","unstructured":"Dhawan S, Gupta R, Bhuyan HK et al (2022) An efficient steganography technique based on S2OA & DESAE model. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-13798-9","journal-title":"Multimed Tools Appl"},{"key":"10537_CR61","doi-asserted-by":"publisher","first-page":"136186","DOI":"10.1109\/ACCESS.2020.3010513","volume":"8","author":"X Ding","year":"2020","unstructured":"Ding X, Xie Y, Li P et al (2020) Image steganography based on artificial immune in mobile edge computing with internet of things. IEEE Access 8:136186\u2013136197. https:\/\/doi.org\/10.1109\/ACCESS.2020.3010513","journal-title":"IEEE Access"},{"key":"10537_CR62","doi-asserted-by":"publisher","unstructured":"Dittmann J, Meg\u00edas D, Lang A, Herrera-Joancomart\u00ed J (2006) Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 4300 LNCS, 1\u201340. https:\/\/doi.org\/10.1007\/11926214_1","DOI":"10.1007\/11926214_1"},{"key":"10537_CR63","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/CI-M.2006.248054","volume":"1","author":"M Dorigo","year":"2006","unstructured":"Dorigo M, Birattari M, St\u00fctzle T (2006) Ant colony optimization artificial ants as a computational intelligence technique. IEEE Comput Intell Mag 1:28\u201339. https:\/\/doi.org\/10.1109\/CI-M.2006.248054","journal-title":"IEEE Comput Intell Mag"},{"key":"10537_CR64","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.ins.2022.07.071","volume":"609","author":"Y Du","year":"2022","unstructured":"Du Y, Yin Z (2022) New framework for code-mapping-based reversible data hiding in JPEG images. Inf Sci 609:319\u2013338. https:\/\/doi.org\/10.1016\/j.ins.2022.07.071","journal-title":"Inf Sci"},{"key":"10537_CR65","doi-asserted-by":"publisher","first-page":"116","DOI":"10.30919\/es8d491","volume":"15","author":"N Dubey","year":"2021","unstructured":"Dubey N, Modi H (2021) A robust discrete wavelet transform based adaptive watermarking scheme in ycbcr color space against camcorder recording in cinema\/movie theatres. Eng Sci 15:116\u2013128. https:\/\/doi.org\/10.30919\/es8d491","journal-title":"Eng Sci"},{"key":"10537_CR66","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny M, Ram\u00edrez-Gonz\u00e1lez G, Abu-Elnasr OM et al (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596\u201320608. https:\/\/doi.org\/10.1109\/ACCESS.2018.2817615","journal-title":"IEEE Access"},{"key":"10537_CR67","doi-asserted-by":"publisher","DOI":"10.3390\/app122010642","author":"E-SM El-Kenawy","year":"2022","unstructured":"El-Kenawy E-SM, Khodadadi N, Khoshnaw A et al (2022) Advanced dipper-throated meta-heuristic optimization algorithm for digital image watermarking. Appl Sci (switzerland). https:\/\/doi.org\/10.3390\/app122010642","journal-title":"Appl Sci (switzerland)"},{"key":"10537_CR68","doi-asserted-by":"publisher","first-page":"4173","DOI":"10.32604\/cmc.2022.028008","volume":"72","author":"AA Eshmawi","year":"2022","unstructured":"Eshmawi AA, Alsuhibany SA, Abdel-Khalek S, Mansour RF (2022) Competitive swarm optimization with encryption based steganography for digital i.security. Comput Mater Contin 72:4173\u20134184. https:\/\/doi.org\/10.32604\/cmc.2022.028008","journal-title":"Comput Mater Contin"},{"key":"10537_CR69","doi-asserted-by":"publisher","first-page":"166589","DOI":"10.1109\/ACCESS.2020.3022779","volume":"8","author":"O Evsutin","year":"2020","unstructured":"Evsutin O, Melman A, Meshcheryakov R (2020) Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access 8:166589\u2013166611. https:\/\/doi.org\/10.1109\/ACCESS.2020.3022779","journal-title":"IEEE Access"},{"key":"10537_CR70","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/s42235-020-0049-9","volume":"17","author":"X Fan","year":"2020","unstructured":"Fan X, Sayers W, Zhang S et al (2020) Review and classification of bio-inspired algorithms and their applications. J Bionic Eng 17:611\u2013631. https:\/\/doi.org\/10.1007\/s42235-020-0049-9","journal-title":"J Bionic Eng"},{"key":"10537_CR71","doi-asserted-by":"publisher","first-page":"125345","DOI":"10.1109\/ACCESS.2020.3007577","volume":"8","author":"S Fathi-Kazerooni","year":"2020","unstructured":"Fathi-Kazerooni S, Rojas-Cessa R (2020) GAN tunnel: network traffic steganography by using GANs to counter internet traffic classifiers. IEEE Access 8:125345\u2013125359. https:\/\/doi.org\/10.1109\/ACCESS.2020.3007577","journal-title":"IEEE Access"},{"key":"10537_CR72","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8:22\u201328. https:\/\/doi.org\/10.1109\/93.959097","journal-title":"IEEE Multimed"},{"key":"10537_CR73","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s00366-011-0241-y","volume":"29","author":"AH Gandomi","year":"2013","unstructured":"Gandomi AH, Yang X-S, Alavi AH (2013) Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems. Eng Comput 29:17\u201335. https:\/\/doi.org\/10.1007\/s00366-011-0241-y","journal-title":"Eng Comput"},{"key":"10537_CR74","doi-asserted-by":"publisher","first-page":"13449","DOI":"10.1007\/s11042-019-08178-9","volume":"79","author":"NM Ganguly","year":"2020","unstructured":"Ganguly NM, Paul G, Saha SK, Burman D (2020) A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimed Tools Appl 79:13449\u201313479. https:\/\/doi.org\/10.1007\/s11042-019-08178-9","journal-title":"Multimed Tools Appl"},{"key":"10537_CR75","doi-asserted-by":"publisher","first-page":"166954","DOI":"10.1016\/j.ijleo.2021.166954","volume":"242","author":"H Gao","year":"2021","unstructured":"Gao H, Chen Q (2021) A robust and secure image watermarking scheme using SURF and improved Artificial Bee Colony algorithm in DWT domain. Optik 242:166954. https:\/\/doi.org\/10.1016\/j.ijleo.2021.166954","journal-title":"Optik"},{"key":"10537_CR76","doi-asserted-by":"publisher","first-page":"36947","DOI":"10.1007\/s11042-021-11237-9","volume":"81","author":"P Garg","year":"2022","unstructured":"Garg P, Kishore RR (2022a) An efficient and secured blind image watermarking using ABC optimization in DWT and DCT domain. Multimed Tools Appl 81:36947\u201336964. https:\/\/doi.org\/10.1007\/s11042-021-11237-9","journal-title":"Multimed Tools Appl"},{"key":"10537_CR77","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-022-02631-x","author":"P Garg","year":"2022","unstructured":"Garg P, Kishore RR (2022b) A robust and secured adaptive image watermarking using social group optimization. Visual Comput. https:\/\/doi.org\/10.1007\/s00371-022-02631-x","journal-title":"Visual Comput"},{"key":"10537_CR78","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s00366-018-0620-8","volume":"35","author":"GF Gomes","year":"2019","unstructured":"Gomes GF, da Cunha SS Jr, Ancelotti AC Jr (2019) A sunflower optimization (SFO) algorithm applied to damage identification on laminated composite plates. Eng Comput 35:619\u2013626. https:\/\/doi.org\/10.1007\/s00366-018-0620-8","journal-title":"Eng Comput"},{"key":"10537_CR79","doi-asserted-by":"publisher","first-page":"3893","DOI":"10.1007\/s11042-019-7471-1","volume":"79","author":"K Gurunathan","year":"2020","unstructured":"Gurunathan K, Rajagopalan SP (2020) A stegano\u2014visual cryptography technique for multimedia security. Multimed Tools Appl 79:3893\u20133911. https:\/\/doi.org\/10.1007\/s11042-019-7471-1","journal-title":"Multimed Tools Appl"},{"key":"10537_CR80","doi-asserted-by":"publisher","first-page":"2323","DOI":"10.1007\/s10462-020-09906-6","volume":"54","author":"AH Halim","year":"2021","unstructured":"Halim AH, Ismail I, Das S (2021) Performance assessment of the metaheuristic optimization algorithms: an exhaustive review. Artif Intell Rev 54:2323\u20132409. https:\/\/doi.org\/10.1007\/s10462-020-09906-6","journal-title":"Artif Intell Rev"},{"key":"10537_CR81","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04366-y","author":"MA Hameed","year":"2022","unstructured":"Hameed MA, Abdel-Aleem OA, Hassaballah M (2022) A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-022-04366-y","journal-title":"J Ambient Intell Human Comput"},{"key":"10537_CR82","first-page":"103","volume":"12","author":"HS Hanizan","year":"2017","unstructured":"Hanizan HS, Din R, Hafiza AS et al (2017) A review of artificial intelligence techniques in image steganography domain. J Eng Sci Technol 12:103\u2013113","journal-title":"J Eng Sci Technol"},{"key":"10537_CR83","doi-asserted-by":"publisher","first-page":"5540","DOI":"10.3390\/s21165540","volume":"21","author":"N Hasan","year":"2021","unstructured":"Hasan N, Islam MS, Chen W et al (2021) Encryption based image watermarking algorithm in 2DWT-DCT domains. Sensors 21:5540. https:\/\/doi.org\/10.3390\/s21165540","journal-title":"Sensors"},{"key":"10537_CR84","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s10489-020-01893-z","volume":"51","author":"FA Hashim","year":"2021","unstructured":"Hashim FA, Hussain K, Houssein EH et al (2021) Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems. Appl Intell 51:1531\u20131551. https:\/\/doi.org\/10.1007\/s10489-020-01893-z","journal-title":"Appl Intell"},{"key":"10537_CR85","doi-asserted-by":"publisher","first-page":"7743","DOI":"10.1109\/TII.2021.3053595","volume":"17","author":"M Hassaballah","year":"2021","unstructured":"Hassaballah M, Hameed MA, Awad AI, Muhammad K (2021) A novel image steganography method for industrial internet of things security. IEEE Trans Ind Inf 17:7743\u20137751. https:\/\/doi.org\/10.1109\/TII.2021.3053595","journal-title":"IEEE Trans Ind Inf"},{"key":"10537_CR86","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","volume":"97","author":"AA Heidari","year":"2019","unstructured":"Heidari AA, Mirjalili S, Faris H et al (2019) Harris hawks optimization: algorithm and applications. Future Gener Comput Syst 97:849\u2013872. https:\/\/doi.org\/10.1016\/j.future.2019.02.028","journal-title":"Future Gener Comput Syst"},{"key":"10537_CR87","doi-asserted-by":"publisher","first-page":"8727","DOI":"10.1007\/s11042-018-6096-0","volume":"79","author":"B Hemamalini","year":"2020","unstructured":"Hemamalini B, Nagarajan V (2020) Wavelet transform and pixel strength-based robust watermarking using dragonflyoptimization. Multimed Tools Appl 79:8727\u20138746. https:\/\/doi.org\/10.1007\/s11042-018-6096-0","journal-title":"Multimed Tools Appl"},{"key":"10537_CR88","doi-asserted-by":"publisher","first-page":"38429","DOI":"10.1007\/s11042-022-13158-7","volume":"81","author":"S Hossain","year":"2022","unstructured":"Hossain S, Mukhopadhyay S, Ray B et al (2022) A secured image steganography method based on ballot transform and genetic algorithm. Multimed Tools Appl 81:38429\u201338458. https:\/\/doi.org\/10.1007\/s11042-022-13158-7","journal-title":"Multimed Tools Appl"},{"key":"10537_CR89","doi-asserted-by":"publisher","first-page":"113225","DOI":"10.1016\/j.eswa.2020.113225","volume":"149","author":"L-Y Hsu","year":"2020","unstructured":"Hsu L-Y, Hu H-T (2020) Blind watermarking for color images using EMMQ based on QDFT. Expert Syst Appl 149:113225. https:\/\/doi.org\/10.1016\/j.eswa.2020.113225","journal-title":"Expert Syst Appl"},{"key":"10537_CR90","doi-asserted-by":"publisher","first-page":"155138","DOI":"10.1109\/ACCESS.2021.3127917","volume":"9","author":"L-Y Hsu","year":"2021","unstructured":"Hsu L-Y, Hu H-T (2021) QDCT-based blind color image watermarking with aid of GWO and DnCNN for performance improvement. IEEE Access 9:155138\u2013155152. https:\/\/doi.org\/10.1109\/ACCESS.2021.3127917","journal-title":"IEEE Access"},{"key":"10537_CR91","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117134","author":"L-Y Hsu","year":"2022","unstructured":"Hsu L-Y, Hu H-T, Chou H-H (2022) A high-capacity QRD-based blind color image watermarking algorithm incorporated with AI technologies. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2022.117134","journal-title":"Expert Syst Appl"},{"key":"10537_CR92","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s00034-006-0104-z","volume":"26","author":"H-C Huang","year":"2007","unstructured":"Huang H-C, Pan J-S, Huang Y-H et al (2007) Progressive watermarking techniques using genetic algorithms. Circuits Syst Signal Process 26:671\u2013687. https:\/\/doi.org\/10.1007\/s00034-006-0104-z","journal-title":"Circuits Syst Signal Process"},{"key":"10537_CR93","first-page":"430","volume":"6","author":"H-C Huang","year":"2015","unstructured":"Huang H-C, Chang F-C, Chen Y-H, Chu S-C (2015) Survey of bio-inspired computing for information hiding. J Inf Hiding Multimed Signal Process 6:430\u2013443","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"10537_CR94","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1007\/s10462-017-9605-z","volume":"52","author":"K Hussain","year":"2019","unstructured":"Hussain K, Mohd Salleh MN, Cheng S, Shi Y (2019) Metaheuristic research: a comprehensive survey. Artif Intell Rev 52:2191\u20132233. https:\/\/doi.org\/10.1007\/s10462-017-9605-z","journal-title":"Artif Intell Rev"},{"key":"10537_CR95","doi-asserted-by":"publisher","first-page":"e6679284","DOI":"10.1155\/2021\/6679284","volume":"2021","author":"A Jaradat","year":"2021","unstructured":"Jaradat A, Taqieddin E, Mowafi M (2021) A high-capacity image steganography method using chaotic particle swarm optimization. Secur Commun Netw 2021:e6679284. https:\/\/doi.org\/10.1155\/2021\/6679284","journal-title":"Secur Commun Netw"},{"key":"10537_CR96","doi-asserted-by":"publisher","first-page":"4129","DOI":"10.1007\/s00371-021-02285-1","volume":"38","author":"S Jaya Prakash","year":"2022","unstructured":"Jaya Prakash S, Mahalakshmi K (2022) Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer. Visual Comput 38:4129\u20134150. https:\/\/doi.org\/10.1007\/s00371-021-02285-1","journal-title":"Visual Comput"},{"key":"10537_CR97","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s12553-018-00285-1","volume":"10","author":"S Jeevitha","year":"2020","unstructured":"Jeevitha S, Amutha Prabha N (2020) Effective payload and improved security using HMT Contourlet transform in medical image steganography. Health Technol 10:217\u2013229. https:\/\/doi.org\/10.1007\/s12553-018-00285-1","journal-title":"Health Technol"},{"key":"10537_CR98","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1460","author":"AC Johnvictor","year":"2022","unstructured":"Johnvictor AC, Amalanathan AJ, Pariti Venkata RM, Jethi N (2022) Critical review of bio-inspired data optimization techniques: an image steganalysis perspective. Wiley Interdisc Rev: Data Min Knowl Discov. https:\/\/doi.org\/10.1002\/widm.1460","journal-title":"Wiley Interdisc Rev: Data Min Knowl Discov"},{"key":"10537_CR99","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3233\/JIFS-169580","volume":"35","author":"D Jude Hemanth","year":"2018","unstructured":"Jude Hemanth D, Anitha J, Popescu DE, Son LH (2018) A modified genetic algorithm for performance improvement of transform based image steganography systems. J Intell Fuzzy Syst 35:197\u2013209. https:\/\/doi.org\/10.3233\/JIFS-169580","journal-title":"J Intell Fuzzy Syst"},{"key":"10537_CR102","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299\u2013326. https:\/\/doi.org\/10.1016\/j.neucom.2018.06.075","journal-title":"Neurocomputing"},{"key":"10537_CR103","doi-asserted-by":"publisher","first-page":"10561","DOI":"10.1007\/s00500-019-04563-6","volume":"24","author":"X Kang","year":"2020","unstructured":"Kang X, Chen Y, Zhao F, Lin G (2020) Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft Comput 24:10561\u201310584. https:\/\/doi.org\/10.1007\/s00500-019-04563-6","journal-title":"Soft Comput"},{"key":"10537_CR104","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-981-16-6448-9_48","volume":"806","author":"AM Kapadia","year":"2022","unstructured":"Kapadia AM, Nithyanandam P (2022) A review: reversible information hiding and bio-inspired optimization. Lect Notes Electr Eng 806:489\u2013506. https:\/\/doi.org\/10.1007\/978-981-16-6448-9_48","journal-title":"Lect Notes Electr Eng"},{"key":"10537_CR105","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s10898-007-9149-x","volume":"39","author":"D Karaboga","year":"2007","unstructured":"Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm. J Glob Optim 39:459\u2013471. https:\/\/doi.org\/10.1007\/s10898-007-9149-x","journal-title":"J Glob Optim"},{"key":"10537_CR106","doi-asserted-by":"publisher","first-page":"109691","DOI":"10.1016\/j.mehy.2020.109691","volume":"139","author":"S Karakus","year":"2020","unstructured":"Karakus S, Avci E (2020) A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses 139:109691. https:\/\/doi.org\/10.1016\/j.mehy.2020.109691","journal-title":"Med Hypotheses"},{"key":"10537_CR107","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.ijleo.2017.05.027","volume":"142","author":"G Kasana","year":"2017","unstructured":"Kasana G, Kasana SS (2017) Reference based semi blind image watermarking scheme in wavelet domain. Optik 142:191\u2013204. https:\/\/doi.org\/10.1016\/j.ijleo.2017.05.027","journal-title":"Optik"},{"key":"10537_CR108","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1504\/IJICS.2017.087561","volume":"9","author":"G Kasana","year":"2017","unstructured":"Kasana G, Singh K, Bhatia SS (2017) Data hiding using lifting scheme and genetic algorithm. Int J Inf Comput Secur 9:271\u2013287. https:\/\/doi.org\/10.1504\/IJICS.2017.087561","journal-title":"Int J Inf Comput Secur"},{"key":"10537_CR109","doi-asserted-by":"publisher","first-page":"20499","DOI":"10.1007\/s11042-016-3962-5","volume":"76","author":"B Kazemivash","year":"2017","unstructured":"Kazemivash B, Moghaddam ME (2017) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed Tools Appl 76:20499\u201320524. https:\/\/doi.org\/10.1007\/s11042-016-3962-5","journal-title":"Multimed Tools Appl"},{"key":"10537_CR110","doi-asserted-by":"publisher","first-page":"4083","DOI":"10.1007\/s00500-017-2617-4","volume":"22","author":"B Kazemivash","year":"2018","unstructured":"Kazemivash B, Moghaddam ME (2018) A predictive model-based image watermarking scheme using Regression Tree and Firefly algorithm. Soft Comput 22:4083\u20134098. https:\/\/doi.org\/10.1007\/s00500-017-2617-4","journal-title":"Soft Comput"},{"key":"10537_CR111","doi-asserted-by":"publisher","first-page":"379","DOI":"10.11591\/ijece.v8i1.pp379-389","volume":"8","author":"S Khan","year":"2018","unstructured":"Khan S (2018) Ant Colony Optimization (ACO) based data hiding in image complex region. Int J Electr Comput Eng (IJECE) 8:379\u2013389. https:\/\/doi.org\/10.11591\/ijece.v8i1.pp379-389","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"10537_CR112","doi-asserted-by":"publisher","first-page":"781","DOI":"10.3390\/sym12050781","volume":"12","author":"S Khan","year":"2020","unstructured":"Khan S, Irfan MA, Khan K et al (2020) ACO based variable least significant bits data hiding in edges using IDIBS algorithm. Symmetry 12:781. https:\/\/doi.org\/10.3390\/sym12050781","journal-title":"Symmetry"},{"key":"10537_CR113","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TSMC.2019.2903785","volume":"50","author":"M Khari","year":"2020","unstructured":"Khari M, Garg AK, Gandomi AH et al (2020) Securing data in internet of things (IoT) using cryptography and steganography techniques. IEEE Trans Syst Man Cybern: Syst 50:73\u201380. https:\/\/doi.org\/10.1109\/TSMC.2019.2903785","journal-title":"IEEE Trans Syst Man Cybern: Syst"},{"key":"10537_CR114","doi-asserted-by":"publisher","first-page":"19491","DOI":"10.1007\/s11042-021-11861-5","volume":"81","author":"S Koley","year":"2022","unstructured":"Koley S (2022) Bat optimized 3D anaglyph image watermarking based on maximum noise fraction in the digital Shearlet domain. Multimed Tools Appl 81:19491\u201319523. https:\/\/doi.org\/10.1007\/s11042-021-11861-5","journal-title":"Multimed Tools Appl"},{"key":"10537_CR115","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/BF00175355","volume":"4","author":"JR Koza","year":"1994","unstructured":"Koza JR (1994) Genetic programming as a means for programming computers by natural selection. Stat Comput 4:87\u2013112. https:\/\/doi.org\/10.1007\/BF00175355","journal-title":"Stat Comput"},{"key":"10537_CR116","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ejor.2015.10.008","volume":"250","author":"AJ Kulkarni","year":"2016","unstructured":"Kulkarni AJ, Baki MF, Chaouch BA (2016) Application of the cohort-intelligence optimization method to three selected combinatorial optimization problems. Eur J Oper Res 250:427\u2013447. https:\/\/doi.org\/10.1016\/j.ejor.2015.10.008","journal-title":"Eur J Oper Res"},{"key":"10537_CR117","doi-asserted-by":"publisher","first-page":"20149","DOI":"10.1007\/s11042-020-08881-y","volume":"79","author":"S Kumar","year":"2020","unstructured":"Kumar S, Singh BK, Yadav M (2020) A Recent survey on multimedia and database watermarking. Multimed Tools Appl 79:20149\u201320197. https:\/\/doi.org\/10.1007\/s11042-020-08881-y","journal-title":"Multimed Tools Appl"},{"key":"10537_CR118","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1080\/09720529.2021.1936901","volume":"24","author":"S Kumar","year":"2021","unstructured":"Kumar S, Singh MK, Saini D (2021) An image watermarking framework based on PSO and FrQWT. J Discr Math Sci Cryptogr 24:1293\u20131308. https:\/\/doi.org\/10.1080\/09720529.2021.1936901","journal-title":"J Discr Math Sci Cryptogr"},{"key":"10537_CR119","doi-asserted-by":"publisher","first-page":"7373","DOI":"10.1007\/s10489-021-02789-2","volume":"52","author":"S Kumar","year":"2022","unstructured":"Kumar S, Gupta A, Walia GS (2022) Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges. Appl Intell 52:7373\u20137406. https:\/\/doi.org\/10.1007\/s10489-021-02789-2","journal-title":"Appl Intell"},{"key":"10537_CR120","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2022.1054481","author":"R Kumari","year":"2022","unstructured":"Kumari R, Mustafi A (2022) The spatial frequency domain designated watermarking framework uses linear blind source separation for intelligent visual signal processing. Front Neurorobot. https:\/\/doi.org\/10.3389\/fnbot.2022.1054481","journal-title":"Front Neurorobot"},{"key":"10537_CR121","doi-asserted-by":"publisher","first-page":"22001","DOI":"10.1007\/s11042-021-11246-8","volume":"81","author":"Laxmanika","year":"2022","unstructured":"Laxmanika, Singh PK (2022) Robust and imperceptible image watermarking technique based on SVD, DCT, BEMD and PSO in wavelet domain. Multimed Tools Appl 81:22001\u201322026. https:\/\/doi.org\/10.1007\/s11042-021-11246-8","journal-title":"Multimed Tools Appl"},{"key":"10537_CR122","doi-asserted-by":"publisher","first-page":"27085","DOI":"10.1007\/s11042-017-4743-5","volume":"78","author":"B Lei","year":"2019","unstructured":"Lei B, Zhao X, Lei H et al (2019) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 78:27085\u201327107. https:\/\/doi.org\/10.1007\/s11042-017-4743-5","journal-title":"Multimed Tools Appl"},{"key":"10537_CR123","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.jisa.2018.10.006","volume":"43","author":"Z Li","year":"2018","unstructured":"Li Z, He Y (2018) Steganography with pixel-value differencing and modulus function based on PSO. J Inf Secur Appl 43:47\u201352. https:\/\/doi.org\/10.1016\/j.jisa.2018.10.006","journal-title":"J Inf Secur Appl"},{"key":"10537_CR124","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.sigpro.2016.07.002","volume":"130","author":"M Li","year":"2017","unstructured":"Li M, Li Y (2017) Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding. Signal Process 130:190\u2013196. https:\/\/doi.org\/10.1016\/j.sigpro.2016.07.002","journal-title":"Signal Process"},{"key":"10537_CR125","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2017.01.013","volume":"93","author":"X-W Li","year":"2017","unstructured":"Li X-W, Liu Y, Kim S-T, Wang Q-H (2017) Designing a genetic watermarking approach for 3D scenes. Opt Lasers Eng 93:83\u201391. https:\/\/doi.org\/10.1016\/j.optlaseng.2017.01.013","journal-title":"Opt Lasers Eng"},{"key":"10537_CR126","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s00500-016-2320-x","volume":"22","author":"J Li","year":"2018","unstructured":"Li J, Lin Q, Yu C et al (2018) A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22:47\u201365. https:\/\/doi.org\/10.1007\/s00500-016-2320-x","journal-title":"Soft Comput"},{"key":"10537_CR127","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1016\/j.future.2020.03.055","volume":"111","author":"S Li","year":"2020","unstructured":"Li S, Chen H, Wang M et al (2020) Slime mould algorithm: a new method for stochastic optimization. Future Gener Comput Syst 111:300\u2013323. https:\/\/doi.org\/10.1016\/j.future.2020.03.055","journal-title":"Future Gener Comput Syst"},{"key":"10537_CR128","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ins.2020.11.020","volume":"551","author":"Y-M Li","year":"2021","unstructured":"Li Y-M, Wei D, Zhang L (2021) Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain. Inf Sci 551:205\u2013227. https:\/\/doi.org\/10.1016\/j.ins.2020.11.020","journal-title":"Inf Sci"},{"key":"10537_CR129","doi-asserted-by":"publisher","first-page":"103244","DOI":"10.1016\/j.jvcir.2021.103244","volume":"79","author":"X Liao","year":"2021","unstructured":"Liao X, Peng J, Cao Y (2021) GIFMarking: the robust watermarking for animated GIF based deep learning. J vis Commun Image Represent 79:103244. https:\/\/doi.org\/10.1016\/j.jvcir.2021.103244","journal-title":"J vis Commun Image Represent"},{"key":"10537_CR130","doi-asserted-by":"publisher","first-page":"433","DOI":"10.3390\/a5040433","volume":"5","author":"J-L Lin","year":"2012","unstructured":"Lin J-L, Tsai Y-H, Yu C-Y, Li M-S (2012) Interaction enhanced imperialist competitive algorithms. Algorithms 5:433\u2013448. https:\/\/doi.org\/10.3390\/a5040433","journal-title":"Algorithms"},{"key":"10537_CR131","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"X-L Liu","year":"2018","unstructured":"Liu X-L, Lin C-C, Yuan S-M (2018) Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Trans Circuits Syst Video Technol 28:1047\u20131055. https:\/\/doi.org\/10.1109\/TCSVT.2016.2633878","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10537_CR132","doi-asserted-by":"publisher","first-page":"80849","DOI":"10.1109\/ACCESS.2019.2915596","volume":"7","author":"J Liu","year":"2019","unstructured":"Liu J, Huang J, Luo Y et al (2019) An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7:80849\u201380860. https:\/\/doi.org\/10.1109\/ACCESS.2019.2915596","journal-title":"IEEE Access"},{"key":"10537_CR133","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1007\/s00521-020-05260-4","volume":"33","author":"J Lu","year":"2021","unstructured":"Lu J, Zhang W, Deng Z et al (2021) Research on information steganography based on network data stream. Neural Comput Appl 33:851\u2013866. https:\/\/doi.org\/10.1007\/s00521-020-05260-4","journal-title":"Neural Comput Appl"},{"key":"10537_CR134","doi-asserted-by":"publisher","first-page":"e3771","DOI":"10.1002\/ett.3771","volume":"32","author":"EL Lydia","year":"2021","unstructured":"Lydia EL, Raj JS, Pandi Selvam R et al (2021) Application of discrete transforms with selective coefficients for blind image watermarking. Trans Emerg Telecommun Technol 32:e3771. https:\/\/doi.org\/10.1002\/ett.3771","journal-title":"Trans Emerg Telecommun Technol"},{"key":"10537_CR135","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13795-y","author":"DK Mahto","year":"2022","unstructured":"Mahto DK, Singh AK (2022) Firefly optimization-based dual watermarking for colour images with improved capacity. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-13795-y","journal-title":"Multimed Tools Appl"},{"key":"10537_CR136","doi-asserted-by":"publisher","first-page":"8105","DOI":"10.1007\/s00500-022-07155-z","volume":"26","author":"DK Mahto","year":"2022","unstructured":"Mahto DK, Anand A, Singh AK (2022) Hybrid optimisation-based robust watermarking using denoising convolutional neural network. Soft Comput 26:8105\u20138116. https:\/\/doi.org\/10.1007\/s00500-022-07155-z","journal-title":"Soft Comput"},{"key":"10537_CR137","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ins.2017.07.026","volume":"417","author":"NM Makbol","year":"2017","unstructured":"Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf Sci 417:381\u2013400. https:\/\/doi.org\/10.1016\/j.ins.2017.07.026","journal-title":"Inf Sci"},{"key":"10537_CR138","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jestch.2016.06.005","volume":"20","author":"A Malik","year":"2017","unstructured":"Malik A, Sikka G, Verma HK (2017) A high capacity text steganography scheme based on LZW compression and color coding. Eng Sci Technol Int J 20:72\u201379. https:\/\/doi.org\/10.1016\/j.jestch.2016.06.005","journal-title":"Eng Sci Technol Int J"},{"key":"10537_CR139","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1016\/j.ins.2022.07.120","volume":"609","author":"PC Mandal","year":"2022","unstructured":"Mandal PC, Mukherjee I, Paul G, Chatterji BN (2022) Digital image steganography: a literature survey. Inf Sci 609:1451\u20131488. https:\/\/doi.org\/10.1016\/j.ins.2022.07.120","journal-title":"Inf Sci"},{"issue":"4","key":"10537_CR140","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2010324.1964935","volume":"30","author":"R Mantiuk","year":"2011","unstructured":"Mantiuk R, Kim KJ, Rempel AG, Heidrich W (2011) HDR-VDP-2: a calibrated visual metric for visibility and quality predictions in all luminance conditions. ACM Trans Graph 30(4):1\u201314. https:\/\/doi.org\/10.1145\/2010324.1964935","journal-title":"ACM Trans Graph"},{"key":"10537_CR141","doi-asserted-by":"publisher","DOI":"10.3390\/pr10050858","author":"A Mehbodniya","year":"2022","unstructured":"Mehbodniya A, Douraki BK, Webber JL et al (2022) Multilayer reversible data hiding based on the difference expansion method using multilevel thresholding of host images based on the slime mould algorithm. Processes. https:\/\/doi.org\/10.3390\/pr10050858","journal-title":"Processes"},{"key":"10537_CR142","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ecoinf.2006.07.003","volume":"1","author":"AR Mehrabian","year":"2006","unstructured":"Mehrabian AR, Lucas C (2006) A novel numerical optimization algorithm inspired from weed colonization. Ecol Inform 1:355\u2013366. https:\/\/doi.org\/10.1016\/j.ecoinf.2006.07.003","journal-title":"Ecol Inform"},{"key":"10537_CR143","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.patrec.2021.08.015","volume":"151","author":"S Mellimi","year":"2021","unstructured":"Mellimi S, Rajput V, Ansari IA, Ahn CW (2021) A fast and efficient image watermarking scheme based on Deep Neural Network. Pattern Recogn Lett 151:222\u2013228. https:\/\/doi.org\/10.1016\/j.patrec.2021.08.015","journal-title":"Pattern Recogn Lett"},{"key":"10537_CR144","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.advengsoft.2015.01.010","volume":"83","author":"S Mirjalili","year":"2015","unstructured":"Mirjalili S (2015) The ant lion optimizer. Adv Eng Softw 83:80\u201398. https:\/\/doi.org\/10.1016\/j.advengsoft.2015.01.010","journal-title":"Adv Eng Softw"},{"key":"10537_CR145","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s00521-015-1920-1","volume":"27","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S (2016a) Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput Appl 27:1053\u20131073. https:\/\/doi.org\/10.1007\/s00521-015-1920-1","journal-title":"Neural Comput Appl"},{"key":"10537_CR146","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","volume":"96","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S (2016b) SCA: a sine cosine algorithm for solving optimization problems. Knowl-Based Syst 96:120\u2013133. https:\/\/doi.org\/10.1016\/j.knosys.2015.12.022","journal-title":"Knowl-Based Syst"},{"key":"10537_CR147","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367. https:\/\/doi.org\/10.1016\/j.advengsoft.2016.01.008","journal-title":"Adv Eng Softw"},{"key":"10537_CR148","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361. https:\/\/doi.org\/10.1016\/j.advengsoft.2013.12.007","journal-title":"Adv Eng Softw"},{"key":"10537_CR149","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.advengsoft.2017.07.002","volume":"114","author":"S Mirjalili","year":"2017","unstructured":"Mirjalili S, Gandomi AH, Mirjalili SZ et al (2017) Salp Swarm Algorithm: a bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163\u2013191. https:\/\/doi.org\/10.1016\/j.advengsoft.2017.07.002","journal-title":"Adv Eng Softw"},{"key":"10537_CR150","doi-asserted-by":"publisher","first-page":"9685","DOI":"10.1007\/s00500-018-3535-9","volume":"23","author":"E Moeinaddini","year":"2019","unstructured":"Moeinaddini E (2019) Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm. Soft Comput 23:9685\u20139699. https:\/\/doi.org\/10.1007\/s00500-018-3535-9","journal-title":"Soft Comput"},{"key":"10537_CR151","doi-asserted-by":"publisher","first-page":"26083","DOI":"10.1007\/s11042-018-5838-3","volume":"77","author":"E Moeinaddini","year":"2018","unstructured":"Moeinaddini E, Afsari F (2018) Robust watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm. Multimed Tools Appl 77:26083\u201326105. https:\/\/doi.org\/10.1007\/s11042-018-5838-3","journal-title":"Multimed Tools Appl"},{"key":"10537_CR152","doi-asserted-by":"publisher","first-page":"107385","DOI":"10.1016\/j.compeleceng.2021.107385","volume":"95","author":"A Mohan","year":"2021","unstructured":"Mohan A, Anand A, Singh AK et al (2021) Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput Electr Eng 95:107385. https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107385","journal-title":"Comput Electr Eng"},{"key":"10537_CR153","doi-asserted-by":"publisher","first-page":"168994","DOI":"10.1109\/ACCESS.2019.2949622","volume":"7","author":"AH Mohsin","year":"2019","unstructured":"Mohsin AH, Zaidan AA, Zaidan BB et al (2019) New method of image steganography based on particle swarm optimization algorithm in spatial domain for high embedding capacity. IEEE Access 7:168994\u2013169010. https:\/\/doi.org\/10.1109\/ACCESS.2019.2949622","journal-title":"IEEE Access"},{"key":"10537_CR154","doi-asserted-by":"publisher","first-page":"14137","DOI":"10.1007\/s11042-020-10284-y","volume":"80","author":"AH Mohsin","year":"2021","unstructured":"Mohsin AH, Zaidan AA, Zaidan BB et al (2021) PSO\u2013blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture. Multimed Tools Appl 80:14137\u201314161. https:\/\/doi.org\/10.1007\/s11042-020-10284-y","journal-title":"Multimed Tools Appl"},{"key":"10537_CR155","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10044-018-00773-0","volume":"22","author":"AM Molaei","year":"2019","unstructured":"Molaei AM, Ebrahimzadeh A (2019) Optimal steganography with blind detection based on Bayesian optimization algorithm. Pattern Anal Appl 22:205\u2013219. https:\/\/doi.org\/10.1007\/s10044-018-00773-0","journal-title":"Pattern Anal Appl"},{"key":"10537_CR156","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.jisa.2019.04.001","volume":"47","author":"M Moosazadeh","year":"2019","unstructured":"Moosazadeh M, Ekbatanifard G (2019) A new DCT-based robust image watermarking method using teaching-learning-based optimization. J Inf Secur Appl 47:28\u201338. https:\/\/doi.org\/10.1016\/j.jisa.2019.04.001","journal-title":"J Inf Secur Appl"},{"key":"10537_CR157","doi-asserted-by":"publisher","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rehman NU et al (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76:8597\u20138626. https:\/\/doi.org\/10.1007\/s11042-016-3383-5","journal-title":"Multimed Tools Appl"},{"key":"10537_CR158","doi-asserted-by":"publisher","first-page":"106257","DOI":"10.1016\/j.asoc.2020.106257","volume":"92","author":"PK Muhuri","year":"2020","unstructured":"Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:106257. https:\/\/doi.org\/10.1016\/j.asoc.2020.106257","journal-title":"Appl Soft Comput"},{"key":"10537_CR159","doi-asserted-by":"publisher","first-page":"10615","DOI":"10.1007\/s11042-020-10032-2","volume":"80","author":"M Nazari","year":"2021","unstructured":"Nazari M, Mehrabian M (2021) A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images. Multimed Tools Appl 80:10615\u201310655. https:\/\/doi.org\/10.1007\/s11042-020-10032-2","journal-title":"Multimed Tools Appl"},{"key":"10537_CR160","doi-asserted-by":"publisher","first-page":"e6617944","DOI":"10.1155\/2021\/6617944","volume":"2021","author":"H Nazir","year":"2021","unstructured":"Nazir H, Bajwa IS, Samiullah M et al (2021) Robust secure color image watermarking using 4D hyperchaotic system, DWT, HbD, and SVD based on improved FOA algorithm. Secur Commun Netw 2021:e6617944. https:\/\/doi.org\/10.1155\/2021\/6617944","journal-title":"Secur Commun Netw"},{"key":"10537_CR161","doi-asserted-by":"publisher","first-page":"2343","DOI":"10.1016\/j.aej.2017.09.005","volume":"57","author":"SI Nipanikar","year":"2018","unstructured":"Nipanikar SI, Hima Deepthi V, Kulkarni N (2018) A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alex Eng J 57:2343\u20132356. https:\/\/doi.org\/10.1016\/j.aej.2017.09.005","journal-title":"Alex Eng J"},{"key":"10537_CR162","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.knosys.2011.07.001","volume":"26","author":"W-T Pan","year":"2012","unstructured":"Pan W-T (2012) A new Fruit Fly Optimization Algorithm: taking the financial distress model as an example. Knowl-Based Syst 26:69\u201374. https:\/\/doi.org\/10.1016\/j.knosys.2011.07.001","journal-title":"Knowl-Based Syst"},{"key":"10537_CR163","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.future.2020.04.034","volume":"111","author":"HM Pandey","year":"2020","unstructured":"Pandey HM (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Gener Comput Syst 111:213\u2013225. https:\/\/doi.org\/10.1016\/j.future.2020.04.034","journal-title":"Future Gener Comput Syst"},{"key":"10537_CR164","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/s13198-019-00859-w","volume":"11","author":"MK Pandey","year":"2020","unstructured":"Pandey MK, Parmar G, Gupta R, Sikander A (2020) Lossless robust color image watermarking using lifting scheme and GWO. Int J Syst Assur Eng Manage 11:320\u2013331. https:\/\/doi.org\/10.1007\/s13198-019-00859-w","journal-title":"Int J Syst Assur Eng Manage"},{"key":"10537_CR165","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230. https:\/\/doi.org\/10.1016\/j.jbi.2017.01.006","journal-title":"J Biomed Inform"},{"key":"10537_CR166","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s11042-016-4253-x","volume":"77","author":"SA Parah","year":"2018","unstructured":"Parah SA, Sheikh JA, Akhoon JA et al (2018) Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimed Tools Appl 77:185\u2013207. https:\/\/doi.org\/10.1007\/s11042-016-4253-x","journal-title":"Multimed Tools Appl"},{"key":"10537_CR167","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/S0888-613X(02)00095-6","volume":"31","author":"M Pelikan","year":"2002","unstructured":"Pelikan M, Sastry K, Goldberg DE (2002) Scalability of the Bayesian optimization algorithm. Int J Approx Reason 31:221\u2013258. https:\/\/doi.org\/10.1016\/S0888-613X(02)00095-6","journal-title":"Int J Approx Reason"},{"key":"10537_CR168","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-45496-9_25","volume-title":"Information hiding","author":"S Pereira","year":"2001","unstructured":"Pereira S, Voloshynovskiy S, Madueno M et al (2001) Second generation benchmarking and application oriented evaluation. In: Moskowitz IS (ed) Information hiding. Springer, Berlin, pp 340\u2013353"},{"key":"10537_CR169","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/79.879339","volume":"17","author":"FAP Petitcolas","year":"2000","unstructured":"Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process Mag 17:58\u201364. https:\/\/doi.org\/10.1109\/79.879339","journal-title":"IEEE Signal Process Mag"},{"key":"10537_CR170","unstructured":"Petitcolas FAP, Fat\u00e8s N (2004) StirMark Benchmark manual. https:\/\/www.petitcolas.net\/watermarking\/stirmark\/. Accessed 30 May 2023"},{"key":"10537_CR171","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information hiding","author":"FAP Petitcolas","year":"1998","unstructured":"Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: Aucsmith D (ed) Information hiding. Springer, Berlin, pp 218\u2013238"},{"key":"10537_CR172","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1016\/j.cose.2017.06.003","volume":"74","author":"R Pizzolante","year":"2018","unstructured":"Pizzolante R, Castiglione A, Carpentieri B et al (2018) On the protection of consumer genomic data in the Internet of Living Things. Comput Secur 74:384\u2013400. https:\/\/doi.org\/10.1016\/j.cose.2017.06.003","journal-title":"Comput Secur"},{"key":"10537_CR173","doi-asserted-by":"publisher","first-page":"21653","DOI":"10.1007\/s11042-020-08960-0","volume":"79","author":"A Pourhadi","year":"2020","unstructured":"Pourhadi A, Mahdavi-Nasab H (2020) A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimed Tools Appl 79:21653\u201321677. https:\/\/doi.org\/10.1007\/s11042-020-08960-0","journal-title":"Multimed Tools Appl"},{"key":"10537_CR174","doi-asserted-by":"publisher","first-page":"4057","DOI":"10.1007\/s11042-019-07772-1","volume":"79","author":"KR Prabha","year":"2020","unstructured":"Prabha KR, Jagadeeswari M (2020) Enhanced imperialist competitive algorithm based efficient reversible data hiding technique. Multimed Tools Appl 79:4057\u20134074. https:\/\/doi.org\/10.1007\/s11042-019-07772-1","journal-title":"Multimed Tools Appl"},{"key":"10537_CR175","doi-asserted-by":"publisher","first-page":"e1804953","DOI":"10.1155\/2018\/1804953","volume":"2018","author":"A Pradhan","year":"2018","unstructured":"Pradhan A, Sekhar KR, Swain G (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng 2018:e1804953. https:\/\/doi.org\/10.1155\/2018\/1804953","journal-title":"Math Probl Eng"},{"key":"10537_CR176","doi-asserted-by":"publisher","first-page":"17463","DOI":"10.1007\/s11042-020-08676-1","volume":"79","author":"S Pramanik","year":"2020","unstructured":"Pramanik S, Singh RP, Ghosh R (2020) Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography. Multimed Tools Appl 79:17463\u201317482. https:\/\/doi.org\/10.1007\/s11042-020-08676-1","journal-title":"Multimed Tools Appl"},{"key":"10537_CR177","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. IEEE Trans Inf Forensics Secur 13:1670\u20131681. https:\/\/doi.org\/10.1109\/TIFS.2018.2799381","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10537_CR178","doi-asserted-by":"publisher","first-page":"39471","DOI":"10.1007\/s11042-022-12712-7","volume":"81","author":"M Rai","year":"2022","unstructured":"Rai M, Goyal S (2022) A hybrid digital image watermarking technique based on fuzzy-BPNN and shark smell optimization. Multimed Tools Appl 81:39471\u201339489. https:\/\/doi.org\/10.1007\/s11042-022-12712-7","journal-title":"Multimed Tools Appl"},{"key":"10537_CR179","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.cad.2010.12.015","volume":"43","author":"RV Rao","year":"2011","unstructured":"Rao RV, Savsani VJ, Vakharia DP (2011) Teaching-learning-based optimization: a novel method for constrained mechanical design optimization problems. CAD Comput Aided Des 43:303\u2013315. https:\/\/doi.org\/10.1016\/j.cad.2010.12.015","journal-title":"CAD Comput Aided Des"},{"key":"10537_CR180","doi-asserted-by":"publisher","first-page":"33475","DOI":"10.1007\/s11042-021-11177-4","volume":"80","author":"B Ray","year":"2021","unstructured":"Ray B, Mukhopadhyay S, Hossain S et al (2021) Image steganography using deep learning based edge detection. Multimed Tools Appl 80:33475\u201333503. https:\/\/doi.org\/10.1007\/s11042-021-11177-4","journal-title":"Multimed Tools Appl"},{"key":"10537_CR181","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.1007\/s12065-020-00387-8","volume":"15","author":"VK Reshma","year":"2022","unstructured":"Reshma VK, Vinod Kumar RS, Shahi D, Shyjith MB (2022) Optimized support vector neural network and contourlet transform for image steganography. Evol Intell 15:1295\u20131311. https:\/\/doi.org\/10.1007\/s12065-020-00387-8","journal-title":"Evol Intell"},{"key":"10537_CR182","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s11045-019-00697-w","volume":"32","author":"R Roselin Kiruba","year":"2021","unstructured":"Roselin Kiruba R, Sree Sharmila T (2021) Secure data hiding by fruit fly optimization improved hybridized seeker algorithm. Multimed Syst Signal Process 32:405\u2013430. https:\/\/doi.org\/10.1007\/s11045-019-00697-w","journal-title":"Multimed Syst Signal Process"},{"key":"10537_CR183","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.aeue.2016.12.003","volume":"72","author":"S Roy","year":"2017","unstructured":"Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU-Int J Electron C 72:149\u2013161. https:\/\/doi.org\/10.1016\/j.aeue.2016.12.003","journal-title":"AEU-Int J Electron C"},{"key":"10537_CR184","doi-asserted-by":"publisher","first-page":"843","DOI":"10.5829\/ije.2021.34.04a.10","volume":"34","author":"M Saadati","year":"2021","unstructured":"Saadati M, Vahidi J, Seydi V, Sheikholharam Mashhadi P (2021) Proposing a new image watermarking method using shearlet transform and whale optimization algorithm. Int J Eng Trans A 34:843\u2013853. https:\/\/doi.org\/10.5829\/ije.2021.34.04a.10","journal-title":"Int J Eng Trans A"},{"key":"10537_CR185","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14166-3","author":"V Sabeti","year":"2022","unstructured":"Sabeti V, Aghabagheri A (2022) Developing an adaptive DCT-based steganography method using a genetic algorithm. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-022-14166-3","journal-title":"Multimed Tools Appl"},{"key":"10537_CR186","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107809","author":"V Sabeti","year":"2022","unstructured":"Sabeti V, Sobhani M, Hasheminejad SMH (2022) An adaptive image steganography method based on integer wavelet transform using genetic algorithm. Comput Electr Eng. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107809","journal-title":"Comput Electr Eng"},{"key":"10537_CR187","doi-asserted-by":"publisher","first-page":"115058","DOI":"10.1016\/j.eswa.2021.115058","volume":"179","author":"T Salehnia","year":"2021","unstructured":"Salehnia T, Fathi A (2021) Fault tolerance in LWT-SVD based image watermarking systems using three module redundancy technique. Expert Syst Appl 179:115058. https:\/\/doi.org\/10.1016\/j.eswa.2021.115058","journal-title":"Expert Syst Appl"},{"key":"10537_CR188","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2014.07.025","volume":"75","author":"H Salimi","year":"2015","unstructured":"Salimi H (2015) Stochastic fractal search: a powerful metaheuristic algorithm. Knowl-Based Syst 75:1\u201318. https:\/\/doi.org\/10.1016\/j.knosys.2014.07.025","journal-title":"Knowl-Based Syst"},{"key":"10537_CR189","doi-asserted-by":"publisher","first-page":"11357","DOI":"10.1007\/s11042-019-08455-7","volume":"79","author":"L Salimi","year":"2020","unstructured":"Salimi L, Haghighi A, Fathi A (2020) A novel watermarking method based on differential evolutionary algorithm and wavelet transform. Multimed Tools Appl 79:11357\u201311374. https:\/\/doi.org\/10.1007\/s11042-019-08455-7","journal-title":"Multimed Tools Appl"},{"key":"10537_CR190","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.advengsoft.2017.01.004","volume":"105","author":"S Saremi","year":"2017","unstructured":"Saremi S, Mirjalili S, Lewis A (2017) Grasshopper optimisation algorithm: theory and application. Adv Eng Softw 105:30\u201347. https:\/\/doi.org\/10.1016\/j.advengsoft.2017.01.004","journal-title":"Adv Eng Softw"},{"key":"10537_CR191","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.ins.2017.11.027","volume":"430\u2013431","author":"DK Sarmah","year":"2018","unstructured":"Sarmah DK, Kulkarni AJ (2018) JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms. Inf Sci 430\u2013431:378\u2013396. https:\/\/doi.org\/10.1016\/j.ins.2017.11.027","journal-title":"Inf Sci"},{"key":"10537_CR192","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jisa.2019.01.002","volume":"45","author":"DK Sarmah","year":"2019","unstructured":"Sarmah DK, Kulkarni AJ (2019) Improved cohort intelligence\u2014a high capacity, swift and secure approach on JPEG image steganography. J Inf Secur Appl 45:90\u2013106. https:\/\/doi.org\/10.1016\/j.jisa.2019.01.002","journal-title":"J Inf Secur Appl"},{"key":"10537_CR193","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s40747-016-0022-8","volume":"2","author":"S Satapathy","year":"2016","unstructured":"Satapathy S, Naik A (2016) Social group optimization (SGO): a new population evolutionary optimization technique. Complex Intell Syst 2:173\u2013203. https:\/\/doi.org\/10.1007\/s40747-016-0022-8","journal-title":"Complex Intell Syst"},{"key":"10537_CR194","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1007\/s10489-016-0889-5","volume":"47","author":"N Saxena","year":"2017","unstructured":"Saxena N, Mishra KK (2017) Improved multi-objective particle swarm optimization algorithm for optimizing watermark strength in color image watermarking. Appl Intell 47:362\u2013381. https:\/\/doi.org\/10.1007\/s10489-016-0889-5","journal-title":"Appl Intell"},{"key":"10537_CR195","doi-asserted-by":"publisher","first-page":"8423","DOI":"10.1007\/s11042-020-10035-z","volume":"80","author":"DRIM Setiadi","year":"2021","unstructured":"Setiadi DRIM (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423\u20138444. https:\/\/doi.org\/10.1007\/s11042-020-10035-z","journal-title":"Multimed Tools Appl"},{"key":"10537_CR196","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10710-020-09396-z","volume":"22","author":"N Sharma","year":"2021","unstructured":"Sharma N, Batra U (2021) An enhanced Huffman-PSO based image optimization algorithm for image steganography. Genet Program Evolvable Mach 22:189\u2013205. https:\/\/doi.org\/10.1007\/s10710-020-09396-z","journal-title":"Genet Program Evolvable Mach"},{"key":"10537_CR197","doi-asserted-by":"publisher","first-page":"105696","DOI":"10.1016\/j.asoc.2019.105696","volume":"84","author":"S Sharma","year":"2019","unstructured":"Sharma S, Sharma H, Sharma JB (2019) An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization. Appl Soft Comput 84:105696. https:\/\/doi.org\/10.1016\/j.asoc.2019.105696","journal-title":"Appl Soft Comput"},{"key":"10537_CR198","doi-asserted-by":"publisher","first-page":"e5580098","DOI":"10.1155\/2021\/5580098","volume":"2021","author":"C Sharma","year":"2021","unstructured":"Sharma C, Bagga A, Singh BK, Shabaz M (2021a) A novel optimized graph-based transform watermarking technique to address security issues in real-time application. Math Probl Eng 2021:e5580098. https:\/\/doi.org\/10.1155\/2021\/5580098","journal-title":"Math Probl Eng"},{"key":"10537_CR199","doi-asserted-by":"publisher","first-page":"36","DOI":"10.22059\/JITM.2020.78888","volume":"12","author":"S Sharma","year":"2021","unstructured":"Sharma S, Chauhan U, Khanam R, Singh KK (2021b) Digital watermarking using dragonfly optimization algorithm. J Inf Technol Manage 12:36\u201347. https:\/\/doi.org\/10.22059\/JITM.2020.78888","journal-title":"J Inf Technol Manage"},{"key":"10537_CR200","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1515\/comp-2019-0023","volume":"11","author":"S Sharma","year":"2021","unstructured":"Sharma S, Chauhan U, Khanam R, Singh KK (2021c) Digital watermarking using grasshopper optimization algorithm. Open Comput Sci 11:330\u2013336. https:\/\/doi.org\/10.1515\/comp-2019-0023","journal-title":"Open Comput Sci"},{"key":"10537_CR201","doi-asserted-by":"publisher","first-page":"18753","DOI":"10.1007\/s11042-021-10610-y","volume":"80","author":"S Sharma","year":"2021","unstructured":"Sharma S, Sharma H, Sharma JB (2021d) Artificial bee colony based perceptually tuned blind color image watermarking in hybrid LWT-DCT domain. Multimed Tools Appl 80:18753\u201318785. https:\/\/doi.org\/10.1007\/s11042-021-10610-y","journal-title":"Multimed Tools Appl"},{"key":"10537_CR202","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05634-8","author":"S Sharma","year":"2021","unstructured":"Sharma S, Sharma H, Sharma JB, Poonia RC (2021e) A secure and robust color image watermarking using nature-inspired intelligence. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-020-05634-8","journal-title":"Neural Comput Appl"},{"key":"10537_CR203","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-022-00918-6","author":"N Sharma","year":"2022","unstructured":"Sharma N, Chakraborty C, Kumar R (2022a) Optimized multimedia data through computationally intelligent algorithms. Multimed Syst. https:\/\/doi.org\/10.1007\/s00530-022-00918-6","journal-title":"Multimed Syst"},{"key":"10537_CR204","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116860","author":"NK Sharma","year":"2022","unstructured":"Sharma NK, Kumar S, Rajpal A, Kumar N (2022b) MantaRayWmark: an image adaptive multiple embedding strength optimization based watermarking using Manta Ray Foraging and bi-directional ELM. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2022.116860","journal-title":"Expert Syst Appl"},{"key":"10537_CR205","doi-asserted-by":"publisher","first-page":"4297","DOI":"10.1007\/s12652-021-03408-1","volume":"13","author":"S Sharma","year":"2022","unstructured":"Sharma S, Sharma H, Sharma JB (2022c) A new optimization based color image watermarking using non-negative matrix factorization in discrete cosine transform domain. J Ambient Intell Humaniz Comput 13:4297\u20134319. https:\/\/doi.org\/10.1007\/s12652-021-03408-1","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10537_CR206","doi-asserted-by":"publisher","first-page":"114414","DOI":"10.1016\/j.eswa.2020.114414","volume":"168","author":"Y Shen","year":"2021","unstructured":"Shen Y, Tang C, Xu M et al (2021) A DWT-SVD based adaptive color multi-watermarking scheme for copyright protection using AMEF and PSO-GWO. Expert Syst Appl 168:114414. https:\/\/doi.org\/10.1016\/j.eswa.2020.114414","journal-title":"Expert Syst Appl"},{"key":"10537_CR207","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.ins.2005.01.013","volume":"175","author":"FY Shih","year":"2005","unstructured":"Shih FY, Wu Y-T (2005) Robust watermarking and compression for medical images based on genetic algorithms. Inf Sci 175:200\u2013216. https:\/\/doi.org\/10.1016\/j.ins.2005.01.013","journal-title":"Inf Sci"},{"key":"10537_CR208","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1007\/s11042-017-4367-9","volume":"77","author":"FY Shih","year":"2018","unstructured":"Shih FY, Zhong X, Chang I-C, Satoh S (2018) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimed Tools Appl 77:1623\u20131642. https:\/\/doi.org\/10.1007\/s11042-017-4367-9","journal-title":"Multimed Tools Appl"},{"key":"10537_CR209","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.image.2018.10.004","volume":"70","author":"S Shojae Chaeikar","year":"2019","unstructured":"Shojae Chaeikar S, Ahmadi A (2019) Ensemble SW image steganalysis: a low dimension method for LSBR detection. Signal Process: Image Commun 70:233\u2013245. https:\/\/doi.org\/10.1016\/j.image.2018.10.004","journal-title":"Signal Process: Image Commun"},{"key":"10537_CR210","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.11591\/ijece.v8i2.pp1156-1168","volume":"8","author":"WA Shukur","year":"2018","unstructured":"Shukur WA, Jabbar KK (2018) Information hiding using LSB technique based on developed PSO algorithm. Int J Electr Comput Eng (IJECE) 8:1156\u20131168. https:\/\/doi.org\/10.11591\/ijece.v8i2.pp1156-1168","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"10537_CR211","doi-asserted-by":"publisher","first-page":"13001","DOI":"10.1007\/s11042-016-3706-6","volume":"76","author":"D Singh","year":"2017","unstructured":"Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76:13001\u201313024. https:\/\/doi.org\/10.1007\/s11042-016-3706-6","journal-title":"Multimed Tools Appl"},{"key":"10537_CR212","doi-asserted-by":"publisher","first-page":"15901","DOI":"10.1007\/s11042-018-6407-5","volume":"79","author":"L Singh","year":"2020","unstructured":"Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79:15901\u201315921. https:\/\/doi.org\/10.1007\/s11042-018-6407-5","journal-title":"Multimed Tools Appl"},{"key":"10537_CR213","doi-asserted-by":"publisher","first-page":"30367","DOI":"10.1007\/s11042-020-09606-x","volume":"80","author":"OP Singh","year":"2021","unstructured":"Singh OP, Singh AK, Srivastava G, Kumar N (2021a) Image watermarking using soft computing techniques: a comprehensive survey. Multimed Tools Appl 80:30367\u201330398. https:\/\/doi.org\/10.1007\/s11042-020-09606-x","journal-title":"Multimed Tools Appl"},{"key":"10537_CR214","doi-asserted-by":"publisher","first-page":"1650","DOI":"10.3390\/e23121650","volume":"23","author":"P Singh","year":"2021","unstructured":"Singh P, Devi KJ, Thakkar HK, Santamar\u00eda J (2021b) Blind and secured adaptive digital image watermarking approach for high imperceptibility and robustness. Entropy 23:1650. https:\/\/doi.org\/10.3390\/e23121650","journal-title":"Entropy"},{"key":"10537_CR215","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.future.2022.12.015","volume":"141","author":"R Singh","year":"2023","unstructured":"Singh R, Saraswat M, Ashok A et al (2023) From classical to soft computing based watermarking techniques: a comprehensive review. Future Gener Comput Syst 141:738\u2013754. https:\/\/doi.org\/10.1016\/j.future.2022.12.015","journal-title":"Future Gener Comput Syst"},{"key":"10537_CR216","doi-asserted-by":"publisher","first-page":"13931","DOI":"10.1007\/s11042-020-10353-2","volume":"80","author":"A Singhal","year":"2021","unstructured":"Singhal A, Bedi P (2021) Multi-class blind steganalysis using deep residual networks. Multimed Tools Appl 80:13931\u201313956. https:\/\/doi.org\/10.1007\/s11042-020-10353-2","journal-title":"Multimed Tools Appl"},{"key":"10537_CR217","doi-asserted-by":"publisher","first-page":"6370","DOI":"10.1007\/s00034-022-02090-8","volume":"41","author":"R Sinhal","year":"2022","unstructured":"Sinhal R, Ansari IA (2022) Tunable Q-factor wavelet transform-based robust image watermarking scheme using logistic mapping and antlion optimization. Circuits Syst Signal Process 41:6370\u20136410. https:\/\/doi.org\/10.1007\/s00034-022-02090-8","journal-title":"Circuits Syst Signal Process"},{"key":"10537_CR218","doi-asserted-by":"publisher","first-page":"8667","DOI":"10.1007\/s11042-020-10028-y","volume":"80","author":"V Sisaudia","year":"2021","unstructured":"Sisaudia V, Vishwakarma VP (2021) Copyright protection using KELM-PSO based multi-spectral image watermarking in DCT domain with local texture information based selection. Multimed Tools Appl 80:8667\u20138688. https:\/\/doi.org\/10.1007\/s11042-020-10028-y","journal-title":"Multimed Tools Appl"},{"key":"10537_CR219","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s00034-021-01773-y","volume":"41","author":"P Sivananthamaitrey","year":"2022","unstructured":"Sivananthamaitrey P, Kumar PR (2022a) Optimal dual watermarking of color images with SWT and SVD through genetic algorithm. Circuits Syst Signal Process 41:224\u2013248. https:\/\/doi.org\/10.1007\/s00034-021-01773-y","journal-title":"Circuits Syst Signal Process"},{"key":"10537_CR220","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1007\/s11042-021-11204-4","volume":"81","author":"P Sivananthamaitrey","year":"2022","unstructured":"Sivananthamaitrey P, Kumar PR (2022b) Performance analysis of meta-heuristics on dual watermarking of color images based on SWT and SVD. Multimed Tools Appl 81:1001\u20131027. https:\/\/doi.org\/10.1007\/s11042-021-11204-4","journal-title":"Multimed Tools Appl"},{"key":"10537_CR221","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-662-43616-5_4","volume":"70","author":"MM Soliman","year":"2014","unstructured":"Soliman MM, Hassanien AE, Onsi HM (2014) Bio-inspiring techniques in watermarking medical images: a review. Intell Syst Ref Libr 70:93\u2013114. https:\/\/doi.org\/10.1007\/978-3-662-43616-5_4","journal-title":"Intell Syst Ref Libr"},{"key":"10537_CR222","doi-asserted-by":"publisher","DOI":"10.1007\/s41315-022-00241-3","author":"K Soppari","year":"2022","unstructured":"Soppari K, Chandra NS (2022) Automated digital image watermarking based on multi-objective hybrid meta-heuristic-based clustering approach. Int J Intell Robot Appl. https:\/\/doi.org\/10.1007\/s41315-022-00241-3","journal-title":"Int J Intell Robot Appl"},{"key":"10537_CR223","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s11047-020-09824-0","volume":"21","author":"H Stegherr","year":"2022","unstructured":"Stegherr H, Heider M, H\u00e4hner J (2022) Classifying metaheuristics: towards a unified multi-level classification system. Nat Comput 21:155\u2013171. https:\/\/doi.org\/10.1007\/s11047-020-09824-0","journal-title":"Nat Comput"},{"key":"10537_CR224","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn R, Price K (1997) Differential evolution\u2014a simple and efficient heuristic for global optimization over continuous spaces. J Global Optim 11:341\u2013359. https:\/\/doi.org\/10.1023\/A:1008202821328","journal-title":"J Global Optim"},{"key":"10537_CR225","doi-asserted-by":"publisher","first-page":"23409","DOI":"10.1109\/ACCESS.2021.3053998","volume":"9","author":"N Subramanian","year":"2021","unstructured":"Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: a review of the recent advances. IEEE Access 9:23409\u201323423. https:\/\/doi.org\/10.1109\/ACCESS.2021.3053998","journal-title":"IEEE Access"},{"key":"10537_CR100","doi-asserted-by":"publisher","first-page":"101665","DOI":"10.1016\/j.bspc.2019.101665","volume":"55","author":"K Swaraja","year":"2020","unstructured":"Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55:101665. https:\/\/doi.org\/10.1016\/j.bspc.2019.101665","journal-title":"Biomed Signal Process Control"},{"key":"10537_CR101","doi-asserted-by":"publisher","first-page":"102688","DOI":"10.1016\/j.bspc.2021.102688","volume":"68","author":"K Swaraja","year":"2021","unstructured":"Swaraja K, Meenakshi K, Kora P (2021) Hierarchical multilevel framework using RDWT-QR optimized watermarking in telemedicine. Biomed Signal Process Control 68:102688. https:\/\/doi.org\/10.1016\/j.bspc.2021.102688","journal-title":"Biomed Signal Process Control"},{"key":"10537_CR226","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.32604\/cmc.2022.026026","volume":"72","author":"AE Takieldeen","year":"2022","unstructured":"Takieldeen AE, El-Kenawy E-SM, Hadwan M, Zaki RM (2022) Dipper throated optimization algorithm for unconstrained function and feature selection. Comput Mater Contin 72:1465\u20131481. https:\/\/doi.org\/10.32604\/cmc.2022.026026","journal-title":"Comput Mater Contin"},{"key":"10537_CR227","doi-asserted-by":"publisher","first-page":"39145","DOI":"10.1007\/s11042-022-13127-0","volume":"81","author":"L Tang","year":"2022","unstructured":"Tang L, Xie J, Wu D (2022) An interval type-2 fuzzy edge detection and matrix coding approach for color image adaptive steganography. Multimed Tools Appl 81:39145\u201339167. https:\/\/doi.org\/10.1007\/s11042-022-13127-0","journal-title":"Multimed Tools Appl"},{"key":"10537_CR228","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar FN, Srivastava VK (2017a) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669\u20133697. https:\/\/doi.org\/10.1007\/s11042-016-3928-7","journal-title":"Multimed Tools Appl"},{"key":"10537_CR229","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.3906\/elk-1603-17","volume":"25","author":"FN Thakkar","year":"2017","unstructured":"Thakkar FN, Srivastava VK (2017b) A particle swarm optimization and block-SVD-based watermarking for digital images. Turk J Electr Eng Comput Sci 25:3273\u20133288. https:\/\/doi.org\/10.3906\/elk-1603-17","journal-title":"Turk J Electr Eng Comput Sci"},{"key":"10537_CR230","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1007\/s11045-018-0627-8","volume":"30","author":"FN Thakkar","year":"2019","unstructured":"Thakkar FN, Srivastava VK (2019) Performance comparison of recent optimization algorithm Jaya with particle swarm optimization for digital image watermarking in complex wavelet domain. Multidimens Syst Sign Process 30:1769\u20131791. https:\/\/doi.org\/10.1007\/s11045-018-0627-8","journal-title":"Multidimens Syst Sign Process"},{"key":"10537_CR231","doi-asserted-by":"publisher","first-page":"12275","DOI":"10.1007\/s11042-020-10220-0","volume":"80","author":"FN Thakkar","year":"2021","unstructured":"Thakkar FN, Srivastava VK (2021) An adaptive, secure and imperceptive image watermarking using swarm intelligence, Arnold transform, SVD and DWT. Multimed Tools Appl 80:12275\u201312292. https:\/\/doi.org\/10.1007\/s11042-020-10220-0","journal-title":"Multimed Tools Appl"},{"key":"10537_CR232","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/S0020-0190(02)00447-7","volume":"85","author":"IC Trelea","year":"2003","unstructured":"Trelea IC (2003) The particle swarm optimization algorithm: convergence analysis and parameter selection. Inf Process Lett 85:317\u2013325. https:\/\/doi.org\/10.1016\/S0020-0190(02)00447-7","journal-title":"Inf Process Lett"},{"key":"10537_CR233","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s11042-015-3035-1","volume":"76","author":"S Uma Maheswari","year":"2017","unstructured":"Uma Maheswari S, Jude Hemanth D (2017) Performance enhanced image steganography systems using transforms and optimization techniques. Multimed Tools Appl 76:415\u2013436. https:\/\/doi.org\/10.1007\/s11042-015-3035-1","journal-title":"Multimed Tools Appl"},{"key":"10537_CR234","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2018.07.004","volume":"114","author":"MH Vali","year":"2018","unstructured":"Vali MH, Aghagolzadeh A, Baleghi Y (2018) Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition. Expert Syst Appl 114:296\u2013312. https:\/\/doi.org\/10.1016\/j.eswa.2018.07.004","journal-title":"Expert Syst Appl"},{"key":"10537_CR235","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2022.1031299","author":"E Vazquez","year":"2022","unstructured":"Vazquez E, Torres S, Sanchez G et al (2022) Confidentiality in medical images through a genetic-based steganography algorithm in artificial intelligence. Front Robot AI. https:\/\/doi.org\/10.3389\/frobt.2022.1031299","journal-title":"Front Robot AI"},{"key":"10537_CR236","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5267\/j.ijiec.2015.8.004","volume":"7","author":"R Venkata Rao","year":"2016","unstructured":"Venkata Rao R (2016) Jaya: a simple and new optimization algorithm for solving constrained and unconstrained optimization problems. Int J Ind Eng Comput 7:19\u201334. https:\/\/doi.org\/10.5267\/j.ijiec.2015.8.004","journal-title":"Int J Ind Eng Comput"},{"key":"10537_CR237","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.eswa.2015.08.054","volume":"44","author":"OP Verma","year":"2016","unstructured":"Verma OP, Aggarwal D, Patodi T (2016) Opposition and dimensional based modified firefly algorithm. Expert Syst Appl 44:168\u2013176. https:\/\/doi.org\/10.1016\/j.eswa.2015.08.054","journal-title":"Expert Syst Appl"},{"key":"10537_CR238","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.ijleo.2018.04.135","volume":"170","author":"GS Walia","year":"2018","unstructured":"Walia GS, Makhija S, Singh K, Sharma K (2018) Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map. Optik 170:106\u2013124. https:\/\/doi.org\/10.1016\/j.ijleo.2018.04.135","journal-title":"Optik"},{"key":"10537_CR239","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","volume":"488","author":"W Wan","year":"2022","unstructured":"Wan W, Wang J, Zhang Y et al (2022) A comprehensive survey on robust image watermarking. Neurocomputing 488:226\u2013247. https:\/\/doi.org\/10.1016\/j.neucom.2022.02.083","journal-title":"Neurocomputing"},{"key":"10537_CR240","doi-asserted-by":"publisher","first-page":"107376","DOI":"10.1109\/ACCESS.2022.3212691","volume":"10","author":"W Wang","year":"2022","unstructured":"Wang W, Li Q (2022) An image steganography algorithm based on PSO and IWT for underwater acoustic communication. IEEE Access 10:107376\u2013107385. https:\/\/doi.org\/10.1109\/ACCESS.2022.3212691","journal-title":"IEEE Access"},{"key":"10537_CR241","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R-Z Wang","year":"2001","unstructured":"Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671\u2013683. https:\/\/doi.org\/10.1016\/S0031-3203(00)00015-7","journal-title":"Pattern Recogn"},{"key":"10537_CR242","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1504\/IJBIC.2016.081335","volume":"8","author":"G-G Wang","year":"2016","unstructured":"Wang G-G, Deb S, Gao X-Z, Dos Santos CL (2016) A new metaheuristic optimisation algorithm motivated by elephant herding behaviour. Int J Bio-Inspired Comput 8:394\u2013409. https:\/\/doi.org\/10.1504\/IJBIC.2016.081335","journal-title":"Int J Bio-Inspired Comput"},{"key":"10537_CR243","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/TCYB.2015.2514110","volume":"47","author":"J Wang","year":"2017","unstructured":"Wang J, Ni J, Zhang X, Shi Y-Q (2017) Rate and distortion optimization for reversible data hiding using multiple histogram shifting. IEEE Trans Cybern 47:315\u2013326. https:\/\/doi.org\/10.1109\/TCYB.2015.2514110","journal-title":"IEEE Trans Cybern"},{"key":"10537_CR244","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/s12351-016-0251-z","volume":"18","author":"G-G Wang","year":"2018","unstructured":"Wang G-G, Deb S, Zhao X, Cui Z (2018a) A new monarch butterfly optimization with an improved crossover operator. Oper Res Int J 18:731\u2013755. https:\/\/doi.org\/10.1007\/s12351-016-0251-z","journal-title":"Oper Res Int J"},{"key":"10537_CR245","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/LSP.2018.2865888","volume":"25","author":"Z Wang","year":"2018","unstructured":"Wang Z, Zhang X, Yin Z (2018b) Joint cover-selection and payload-allocation by steganographic distortion optimization. IEEE Signal Process Lett 25:1530\u20131534. https:\/\/doi.org\/10.1109\/LSP.2018.2865888","journal-title":"IEEE Signal Process Lett"},{"key":"10537_CR246","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1109\/TCSVT.2019.2915584","volume":"30","author":"J Wang","year":"2020","unstructured":"Wang J, Chen X, Ni J et al (2020) Multiple histograms-based reversible data hiding: framework and realization. IEEE Trans Circuits Syst Video Technol 30:2313\u20132328. https:\/\/doi.org\/10.1109\/TCSVT.2019.2915584","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10537_CR247","doi-asserted-by":"publisher","DOI":"10.3390\/e24060749","author":"D Wang","year":"2022","unstructured":"Wang D, Li M, Zhang Y (2022) Adversarial data hiding in digital images. Entropy. https:\/\/doi.org\/10.3390\/e24060749","journal-title":"Entropy"},{"key":"10537_CR248","doi-asserted-by":"publisher","first-page":"133496","DOI":"10.1109\/ACCESS.2019.2941440","volume":"7","author":"R Wazirali","year":"2019","unstructured":"Wazirali R, Alasmary W, Mahmoud MMEA, Alhindi A (2019) An optimized steganography hiding capacity and imperceptibly using genetic algorithms. IEEE Access 7:133496\u2013133508. https:\/\/doi.org\/10.1109\/ACCESS.2019.2941440","journal-title":"IEEE Access"},{"key":"10537_CR249","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3198877","author":"S Weng","year":"2022","unstructured":"Weng S, Zhou Y, Zhang T et al (2022) General framework to reversible data hiding for JPEG images with multiple two-dimensional histograms. IEEE Trans Multimed. https:\/\/doi.org\/10.1109\/TMM.2022.3198877","journal-title":"IEEE Trans Multimed"},{"key":"10537_CR250","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1080\/09500340.2020.1810346","volume":"67","author":"J-Y Wu","year":"2020","unstructured":"Wu J-Y, Huang W-L, Zuo M-J, Gong L-H (2020) Optical watermark scheme based on singular value decomposition ghost imaging and particle swarm optimization algorithm. J Mod Opt 67:1059\u20131071. https:\/\/doi.org\/10.1080\/09500340.2020.1810346","journal-title":"J Mod Opt"},{"key":"10537_CR252","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1049\/iet-ifs.2017.0092","volume":"12","author":"S Xiang","year":"2018","unstructured":"Xiang S, He J (2018) Database authentication watermarking scheme in encrypted domain. IET Inf Secur 12:42\u201351. https:\/\/doi.org\/10.1049\/iet-ifs.2017.0092","journal-title":"IET Inf Secur"},{"key":"10537_CR251","doi-asserted-by":"publisher","first-page":"541","DOI":"10.3970\/cmc.2018.03510","volume":"55","author":"L Xiang","year":"2018","unstructured":"Xiang L, Li Y, Hao W et al (2018) Reversible natural language watermarking using synonym substitution and arithmetic coding. Comput Mater Contin 55:541\u2013559. https:\/\/doi.org\/10.3970\/cmc.2018.03510","journal-title":"Comput Mater Contin"},{"key":"10537_CR253","doi-asserted-by":"publisher","first-page":"145516","DOI":"10.1109\/ACCESS.2019.2945177","volume":"7","author":"Y Xiao","year":"2019","unstructured":"Xiao Y, Gao G (2019) Digital watermark-based independent individual certification scheme in WSNs. IEEE Access 7:145516\u2013145523. https:\/\/doi.org\/10.1109\/ACCESS.2019.2945177","journal-title":"IEEE Access"},{"key":"10537_CR255","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1504\/IJBIC.2010.032124","volume":"2","author":"X-S Yang","year":"2010","unstructured":"Yang X-S (2010) Firefly algorithm, stochastic test functions and design optimization. Int J Bio-Inspired Comput 2:78\u201384. https:\/\/doi.org\/10.1504\/IJBIC.2010.032124","journal-title":"Int J Bio-Inspired Comput"},{"key":"10537_CR256","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1108\/02644401211235834","volume":"29","author":"X-S Yang","year":"2012","unstructured":"Yang X-S, Gandomi AH (2012) Bat algorithm: a novel approach for global engineering optimization. Eng Comput (swansea, Wales) 29:464\u2013483. https:\/\/doi.org\/10.1108\/02644401211235834","journal-title":"Eng Comput (swansea, Wales)"},{"key":"10537_CR254","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.csi.2016.10.005","volume":"50","author":"C-N Yang","year":"2017","unstructured":"Yang C-N, Hsu S-C, Kim C (2017) Improving stego image quality in image interpolation based data hiding. Comput Stand Interfaces 50:209\u2013215. https:\/\/doi.org\/10.1016\/j.csi.2016.10.005","journal-title":"Comput Stand Interfaces"},{"key":"10537_CR257","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.sigpro.2016.10.017","volume":"133","author":"S Yi","year":"2017","unstructured":"Yi S, Zhou Y (2017) Binary-block embedding for reversible data hiding in encrypted images. Signal Process 133:40\u201351. https:\/\/doi.org\/10.1016\/j.sigpro.2016.10.017","journal-title":"Signal Process"},{"key":"10537_CR258","doi-asserted-by":"publisher","first-page":"46506","DOI":"10.1109\/ACCESS.2019.2909560","volume":"7","author":"Q Ying","year":"2019","unstructured":"Ying Q, Qian Z, Zhang X, Ye D (2019) Reversible data hiding with image enhancement using histogram shifting. IEEE Access 7:46506\u201346521. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909560","journal-title":"IEEE Access"},{"key":"10537_CR259","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s00500-008-0327-7","volume":"13","author":"L Yu","year":"2009","unstructured":"Yu L, Zhao Y, Ni R, Zhu Z (2009) PM1 steganography in JPEG images using genetic algorithm. Soft Comput 13:393\u2013400. https:\/\/doi.org\/10.1007\/s00500-008-0327-7","journal-title":"Soft Comput"},{"key":"10537_CR260","doi-asserted-by":"publisher","first-page":"2199","DOI":"10.3390\/app8112199","volume":"8","author":"AA Zakaria","year":"2018","unstructured":"Zakaria AA, Hussain M, Wahab AWA et al (2018) High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl Sci 8:2199. https:\/\/doi.org\/10.3390\/app8112199","journal-title":"Appl Sci"},{"key":"10537_CR261","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.3934\/dcdss.2019098","volume":"12","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Ma X-L (2019) Research on image digital watermarking optimization algorithm under virtual reality technology. Discr Contin Dyn Syst\u2014S 12:1427. https:\/\/doi.org\/10.3934\/dcdss.2019098","journal-title":"Discr Contin Dyn Syst\u2014S"},{"key":"10537_CR262","doi-asserted-by":"publisher","first-page":"28003","DOI":"10.1007\/s11042-019-07902-9","volume":"78","author":"L Zhang","year":"2019","unstructured":"Zhang L, Wei D (2019) Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed Tools Appl 78:28003\u201328023. https:\/\/doi.org\/10.1007\/s11042-019-07902-9","journal-title":"Multimed Tools Appl"},{"key":"10537_CR263","doi-asserted-by":"publisher","first-page":"9195","DOI":"10.1007\/s11042-016-3521-0","volume":"76","author":"X Zhang","year":"2017","unstructured":"Zhang X, Sun Z, Tang Z et al (2017) High capacity data hiding based on interpolated image. Multimed Tools Appl 76:9195\u20139218. https:\/\/doi.org\/10.1007\/s11042-016-3521-0","journal-title":"Multimed Tools Appl"},{"key":"10537_CR264","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3970\/cmc.2018.02464","volume":"56","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Ye D, Gan J et al (2018) An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection. Comput Mater Contin 56:151\u2013167. https:\/\/doi.org\/10.3970\/cmc.2018.02464","journal-title":"Comput Mater Contin"},{"key":"10537_CR265","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.32604\/cmc.2020.011359","volume":"64","author":"X Zhang","year":"2020","unstructured":"Zhang X, Zhang W, Sun W et al (2020) A robust watermarking scheme based on roi and IWT for remote consultation of covid-19. Comput Mater Contin 64:1435\u20131452. https:\/\/doi.org\/10.32604\/cmc.2020.011359","journal-title":"Comput Mater Contin"},{"key":"10537_CR266","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2022.103637","author":"T Zhang","year":"2022","unstructured":"Zhang T, Yang C, Weng S, Hou T (2022) Adaptive multi-histogram reversible data hiding with contrast enhancement. J vis Commun Image Represent. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103637","journal-title":"J vis Commun Image Represent"},{"key":"10537_CR267","doi-asserted-by":"publisher","first-page":"3091","DOI":"10.3390\/s19143091","volume":"19","author":"B Zhao","year":"2019","unstructured":"Zhao B, Fang L, Zhang H et al (2019) Y-DWMS: a digital watermark management system based on smart contracts. Sensors 19:3091. https:\/\/doi.org\/10.3390\/s19143091","journal-title":"Sensors"},{"key":"10537_CR268","doi-asserted-by":"publisher","first-page":"103300","DOI":"10.1016\/j.engappai.2019.103300","volume":"87","author":"W Zhao","year":"2020","unstructured":"Zhao W, Zhang Z, Wang L (2020) Manta ray foraging optimization: an effective bio-inspired optimizer for engineering applications. Eng Appl Artif Intell 87:103300. https:\/\/doi.org\/10.1016\/j.engappai.2019.103300","journal-title":"Eng Appl Artif Intell"},{"key":"10537_CR269","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.future.2018.05.027","volume":"88","author":"Z Zheng","year":"2018","unstructured":"Zheng Z, Saxena N, Mishra KK, Sangaiah AK (2018) Guided dynamic particle swarm optimization for optimizing digital image watermarking in industry applications. Future Gener Comput Syst 88:92\u2013106. https:\/\/doi.org\/10.1016\/j.future.2018.05.027","journal-title":"Future Gener Comput Syst"},{"key":"10537_CR270","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1007\/s11042-018-6322-9","volume":"78","author":"NR Zhou","year":"2019","unstructured":"Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78:2507\u20132523. https:\/\/doi.org\/10.1007\/s11042-018-6322-9","journal-title":"Multimed Tools Appl"},{"key":"10537_CR271","doi-asserted-by":"publisher","first-page":"917","DOI":"10.3390\/e23070917","volume":"23","author":"L Zhou","year":"2021","unstructured":"Zhou L, Han H, Wu H (2021) Generalized reversible data hiding with content-adaptive operation and fast histogram shifting optimization. Entropy 23:917. https:\/\/doi.org\/10.3390\/e23070917","journal-title":"Entropy"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-023-10537-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-023-10537-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-023-10537-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T10:32:24Z","timestamp":1696501944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-023-10537-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":271,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["10537"],"URL":"https:\/\/doi.org\/10.1007\/s10462-023-10537-w","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,18]]},"assertion":[{"value":"18 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}