{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T15:17:27Z","timestamp":1767626247996},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2014,9,14]],"date-time":"2014-09-14T00:00:00Z","timestamp":1410652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s11042-014-2237-2","type":"journal-article","created":{"date-parts":[[2014,9,13]],"date-time":"2014-09-13T06:28:07Z","timestamp":1410589687000},"page":"11429-11450","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An efficient steganographic framework based on dynamic blocking and genetic algorithm"],"prefix":"10.1007","volume":"74","author":[{"given":"Mehran","family":"Iranpour","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Rahmati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,14]]},"reference":[{"issue":"1","key":"2237_CR1","doi-asserted-by":"crossref","first-page":"013014","DOI":"10.1117\/1.3295709","volume":"19","author":"M Abolghasemi","year":"2010","unstructured":"Abolghasemi M, Aghaeinia H, Faez K, Mehrabi MA (2010) Detection of LSB\u2009\u00b1\u20091 steganography based on co-occurrence matrix and bit plane clipping. J Electron Imaging 19(1):013014","journal-title":"J Electron Imaging"},{"issue":"1","key":"2237_CR2","doi-asserted-by":"crossref","first-page":"013016","DOI":"10.1117\/1.3554413","volume":"20","author":"H Amirkhani","year":"2011","unstructured":"Amirkhani H, Rahmati M (2011) New framework for using image contents in blind steganalysis systems. J Electron Imaging 20(1):013016","journal-title":"J Electron Imaging"},{"key":"2237_CR3","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.ins.2012.01.010","volume":"193","author":"R Amirtharajan","year":"2012","unstructured":"Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115\u2013124","journal-title":"Inf Sci"},{"key":"2237_CR4","doi-asserted-by":"crossref","unstructured":"Back T, Fogel DB, Michalewicz Z (2000) Evolutionary computation vol.2 - Advanced algorithms and operators. Institute of physics publishing, Bristol and Philadelphia","DOI":"10.1201\/9781420034349"},{"key":"2237_CR5","doi-asserted-by":"crossref","first-page":"49","DOI":"10.3233\/FI-2009-166","volume":"96","author":"CS Chan","year":"2010","unstructured":"Chan CS (2010) On using LSB matching function for data hiding in pixels. Fundam Informaticae 96:49\u201359","journal-title":"Fundam Informaticae"},{"issue":"3","key":"2237_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"key":"2237_CR7","doi-asserted-by":"crossref","unstructured":"Chang CC, Lin CJ (2011) LIBSVM: A library for support vector machines. ACM Trans. Intelligent Systems and Technology 2(3), 1\u201327 (software available at: http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm )","DOI":"10.1145\/1961189.1961199"},{"key":"2237_CR8","unstructured":"Chao RM, Wu HC, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Security, 1\u20139, Article ID 658047"},{"issue":"4","key":"2237_CR9","doi-asserted-by":"crossref","first-page":"043007","DOI":"10.1117\/1.JEI.22.4.043007","volume":"22","author":"M Fakhredanesh","year":"2013","unstructured":"Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlet transform. J of Electronic Imaging 22(4):043007","journal-title":"J of Electronic Imaging"},{"key":"2237_CR10","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-04431-1_3","volume":"5806","author":"T Filler","year":"2009","unstructured":"Filler T, Fridrich J (2009) Fisher information determines capacity of epsilon-secure steganography. Proc 11th Int Hiding Work, Lect Notes in Comput Sci 5806:31\u201347","journal-title":"Proc 11th Int Hiding Work, Lect Notes in Comput Sci"},{"key":"2237_CR11","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2010","unstructured":"Fridrich J (2010) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, New York, USA"},{"key":"2237_CR12","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. Proc. ACM Workshop on Multimedia and Security, Ottawa, CA, pp 27\u201330","DOI":"10.1145\/1232454.1232466"},{"issue":"1","key":"2237_CR13","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS (2012) A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forens Secur 7(1):176\u2013184","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"2237_CR14","volume-title":"A practical guide to support vector classification","author":"CW Hsu","year":"2010","unstructured":"Hsu CW, Chang CC, Lin CJ (2010) A practical guide to support vector classification. Dept. of Computer Science, National Taiwan University, Taiwan"},{"key":"2237_CR15","unstructured":"Iranpour M (2013) Adaptive edge tracing steganography. Proc. 55th IEEE International Symposium ELMAR-2013, Zadar, Croatia, pp 27\u201330"},{"key":"2237_CR16","doi-asserted-by":"crossref","unstructured":"Iranpour M (2013) A novel steganographic method based on edge detection and adaptive multiple bits substitution. Proc. 18th IEEE International Conference on Digital Signal Processing (DSP\u201913), Santorini, Greece, pp 1\u20136","DOI":"10.1109\/ICDSP.2013.6622828"},{"key":"2237_CR17","doi-asserted-by":"crossref","unstructured":"Iranpour M (2013) LSB-based steganography using Hamiltonian paths. Proc. 9th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP\u201913), Beijing, China","DOI":"10.1109\/IIH-MSP.2013.151"},{"key":"2237_CR18","doi-asserted-by":"crossref","unstructured":"Iranpour M, Rahmati M (2013) A novel block-based steganographic method. Proc. 3rd IEEE International eConference on Computer and Knowledge Engineering (ICCKE 2013), Mashhad, Iran, pp 167\u2013172","DOI":"10.1109\/ICCKE.2013.6682811"},{"key":"2237_CR19","doi-asserted-by":"crossref","unstructured":"Iranpour M, Safabakhsh R (2014) Reducing the embedding impact in steganography using Hamiltonian paths and writing on wet paper. Multimed Tools Appl: 1\u201316, doi: 10.1007\/s11042-014-1921-6","DOI":"10.1007\/s11042-014-1921-6"},{"key":"2237_CR20","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1080\/19361610.2013.825753","volume":"8","author":"L Joseph","year":"2013","unstructured":"Joseph L, Renjit JA, Kumar PM (2013) Dynamic programming based encrypted reversible data hiding in images. J Appl Secur and Res 8:467\u2013476","journal-title":"J Appl Secur and Res"},{"key":"2237_CR21","unstructured":"Jung KH, Yoo KY (2012) Data hiding using edge detector for scalable images. Multimed Tools Appl: 1\u201314"},{"key":"2237_CR22","unstructured":"Ker AD, Bohme R (2008) Revisiting weighted stego-image steganalysis. Proc. SPIE, EI, Security, Forensics, Steganography, Watermarking of Multimedia Contents X, vol. 6819, San Jose, CA, pp 1\u201317"},{"issue":"4","key":"2237_CR23","doi-asserted-by":"crossref","first-page":"041104","DOI":"10.1117\/1.2400672","volume":"15","author":"M Kharrazi","year":"2006","unstructured":"Kharrazi M, Sencar HT, Memon N (2006) Performance study of common image steganography and steganalysis techniques. J Electron Imaging 15(4):041104","journal-title":"J Electron Imaging"},{"key":"2237_CR24","unstructured":"Kim C (2012) Data hiding by an improved exploiting modification direction. Multimed Tools Appl: 1\u201316"},{"issue":"5","key":"2237_CR25","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TMM.2010.2051243","volume":"12","author":"GS Lin","year":"2010","unstructured":"Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans Multimedia 12(5):345\u2013357","journal-title":"IEEE Trans Multimedia"},{"key":"2237_CR26","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11042-009-0440-3","volume":"52","author":"W Luo","year":"2011","unstructured":"Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52:407\u2013430","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"2237_CR27","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285\u2013287","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"2237_CR28","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11042-010-0517-z","volume":"54","author":"M Omoomi","year":"2011","unstructured":"Omoomi M, Samavi S, Dumitrescu S (2011) An efficient high payload \u00b11 data embedding scheme. Multimed Tools Appl 54(2):201\u2013218","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"2237_CR29","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang CC, Huang YH, Liao LT (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circ and Systems for Vi Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circ and Systems for Vi Technol"},{"issue":"3","key":"2237_CR30","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on smvq and image inpainting. IEEE Trans Image Process 23(3):969\u2013978","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"2237_CR31","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1007\/s11042-011-0975-y","volume":"64","author":"V Sabeti","year":"2013","unstructured":"Sabeti V, Samavi S, Shirani S (2013) An adaptive LSB matching steganography based on octonary complexity measure. Multimed Tools Appl 64(3):777\u2013793","journal-title":"Multimed Tools Appl"},{"key":"2237_CR32","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0871-6","volume-title":"Space-filling curves","author":"H Sagan","year":"1994","unstructured":"Sagan H (1994) Space-filling curves. Springer, New York"},{"key":"2237_CR33","unstructured":"Schaefer G, Stich M (2004) UCID - An Uncompressed Color Image Database. Proc. SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA, pp. 472\u2013480, (available at: http:\/\/homepages.lboro.ac.uk\/~cogs\/datasets\/ucid\/ucid.html )"},{"key":"2237_CR34","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-45496-9_2","volume":"2137","author":"T Sharp","year":"2001","unstructured":"Sharp T (2001) An implementation of key-based digital signal steganography. Proc inf hiding work 2137:13\u201326","journal-title":"Proc inf hiding work"},{"key":"2237_CR35","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"VN Vapnik","year":"1995","unstructured":"Vapnik VN (1995) The nature of statistical learning theory. Springer, New York"},{"key":"2237_CR36","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.ins.2010.07.011","volume":"192","author":"ZH Wang","year":"2012","unstructured":"Wang ZH, Chang CC, Li MC (2012) Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf Sci 192:98\u2013108","journal-title":"Inf Sci"},{"key":"2237_CR37","unstructured":"Westfeld A (2013)BOWS2 image database. http:\/\/dud.inf.tu-dresden.de\/~westfeld\/rsp\/rsp.html . Accessed 20 May 2013"},{"key":"2237_CR38","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1016\/j.asoc.2011.09.002","volume":"12","author":"NI Wu","year":"2012","unstructured":"Wu NI, Wu KC, Wang CM (2012) Exploring pixel-value differencing and base decomposition for low distortion data embedding. Appl Soft Comput 12:942\u2013960","journal-title":"Appl Soft Comput"},{"issue":"8","key":"2237_CR39","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1016\/j.ins.2009.12.027","volume":"180","author":"H Xu","year":"2010","unstructured":"Xu H, Wanga J, Kim HJ (2010) Near-optimal solution to pair-wise LSB matching via an immune programming strategy. Inf Sci 180(8):1201\u20131217","journal-title":"Inf Sci"},{"key":"2237_CR40","doi-asserted-by":"crossref","first-page":"2674","DOI":"10.1016\/j.patcog.2008.01.019","volume":"41","author":"CH Yang","year":"2008","unstructured":"Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recogn 41:2674\u20132683","journal-title":"Pattern Recogn"},{"issue":"11","key":"2237_CR41","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Comm Lett 10(11):781\u2013783","journal-title":"IEEE Comm Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2237-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2237-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2237-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T10:28:09Z","timestamp":1598264889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2237-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,14]]},"references-count":41,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["2237"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2237-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,14]]}}}