{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:19:40Z","timestamp":1770153580683,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2015,4,10]],"date-time":"2015-04-10T00:00:00Z","timestamp":1428624000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s11042-015-2557-x","type":"journal-article","created":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T01:22:48Z","timestamp":1428542568000},"page":"5939-5957","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["On the embedding limits of the discrete cosine transform"],"prefix":"10.1007","volume":"75","author":[{"given":"Tamer","family":"Rabie","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Kamel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,10]]},"reference":[{"issue":"1","key":"2557_CR1","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"23","author":"N Ahmed","year":"1974","unstructured":"Ahmed N, Natarajan T, Rao K (1974) Discrete cosine transform. IEEE Trans Comput 23(1):90\u201393","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"2557_CR2","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson RJ, Petitcolas FA (1998) On the limits of steganography. IEEE Journal on Selected Areas in Communications 16(4):474\u2013481","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"6","key":"2557_CR3","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1049\/ip-vis:20045047","volume":"152","author":"G Brisbane","year":"2005","unstructured":"Brisbane G, aini RSN, Ogunbona P (2005) High-capacity steganography using a shared colour palette. IEE Proc, Vis Image Signal Process 152(6):787\u2013792","journal-title":"IEE Proc, Vis Image Signal Process"},{"key":"2557_CR4","volume-title":"Digital Image Processing","author":"K Castleman","year":"1996","unstructured":"Castleman K (1996) Digital Image Processing. Prentice Hall, Upper Saddle"},{"issue":"2","key":"2557_CR5","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"key":"2557_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng L (2004) Hiding data in images by simple LSB substitution. Pattern Recog 37:469\u2013474","journal-title":"Pattern Recog"},{"key":"2557_CR7","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon jpeg and quantization table modification. Inform Sci 141:123\u2013138","journal-title":"Inform Sci"},{"issue":"1","key":"2557_CR8","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon jpeg and quantization table modification. Inform Sci 141(1):123\u2013138","journal-title":"Inform Sci"},{"key":"2557_CR9","first-page":"21","volume":"13","author":"CC Chang","year":"2008","unstructured":"Chang CC, Chen YH, Lin CC (2008) A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput 13:21\u2013331","journal-title":"Soft Comput"},{"issue":"7","key":"2557_CR10","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.1016\/S0031-3203(02)00289-3","volume":"36","author":"CC Chang","year":"2003","unstructured":"Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recog 36 (7):1595\u20131683","journal-title":"Pattern Recog"},{"key":"2557_CR11","doi-asserted-by":"crossref","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in dct-based compressed images. Inform Sci 177:2768\u20132786","journal-title":"Inform Sci"},{"issue":"10","key":"2557_CR12","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1109\/TCSVT.2006.882380","volume":"16","author":"CC Chang","year":"2006","unstructured":"Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits and Systems for Video Technology 16(10):1301\u2013 1308","journal-title":"IEEE Trans Circuits and Systems for Video Technology"},{"issue":"4","key":"2557_CR13","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell G (2001) Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423\u20131443","journal-title":"IEEE Trans Inf Theory"},{"issue":"9","key":"2557_CR14","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1016\/S0167-8655(01)00044-7","volume":"22","author":"KL Chung","year":"2001","unstructured":"Chung KL, Shen CH, Chang LC (2001) A novel svd- and vq-based image hiding scheme. Pattern Recogn Lett 22(9):1051\u20131058","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"2557_CR15","first-page":"1","volume":"2","author":"K Curran","year":"2003","unstructured":"Curran K, Bailey K (2003) An evaluation of image based steganography methods. International Journal of Digital Evidence 2(2):1\u201340","journal-title":"International Journal of Digital Evidence"},{"key":"2557_CR16","unstructured":"IEC I (1994) Information technology-digital compression and coding of continuous-tone still images: Requirements and guidelines. Standard, ISO IEC pp 10,918\u20131"},{"issue":"4","key":"2557_CR17","first-page":"929","volume":"E87-A","author":"M Iwata","year":"2004","unstructured":"Iwata M, Miyake K, Shiozaki A (2004) Digital steganography utilizing features of jpeg images. IEICE Trans Fundamentals E87-A(4):929\u2013936","journal-title":"IEICE Trans Fundamentals"},{"key":"2557_CR18","doi-asserted-by":"crossref","unstructured":"Jain A, Uludag U, Hsu R (2002) Hiding a face in a fingerprint image. In: Proceedings of the International Conference on Pattern Recognition (ICPR). Quebec City, Canada","DOI":"10.1109\/ICPR.2002.1048100"},{"issue":"3","key":"2557_CR19","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1049\/ip-vis:20000341","volume":"147","author":"Y Lee","year":"2000","unstructured":"Lee Y, Chen L (2000) High capacity image steganographic model. IEE Proc, Vis Image Signal Process 147(3):288\u2013294","journal-title":"IEE Proc, Vis Image Signal Process"},{"key":"2557_CR20","doi-asserted-by":"crossref","unstructured":"Lin CC, Shiu PF (2009) Dct-based reversible data hiding scheme. In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC09), pp 327\u2013335","DOI":"10.1145\/1516241.1516298"},{"issue":"3","key":"2557_CR21","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"Lin CC, Shiu PF (2010) High capacity data hiding scheme for dct-based images. Journal of Information Hiding and Multimedia Signal Processing 1(3):220\u2013240","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"3","key":"2557_CR22","doi-asserted-by":"crossref","first-page":"836","DOI":"10.1093\/ietisy\/e91-d.3.836","volume":"91-D","author":"CY Lin","year":"2008","unstructured":"Lin CY, Chang CC, Wang YZ (2008) Reversible steganographic method with high payload for jpeg images. IEICE Trans Inf Syst 91-D(3):836\u2013845","journal-title":"IEICE Trans Inf Syst"},{"issue":"8","key":"2557_CR23","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"LM Marvel","year":"1999","unstructured":"Marvel LM, Charles G, Boncelet J, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Processing 8(8):1075\u20131083","journal-title":"IEEE Trans Image Processing"},{"key":"2557_CR24","doi-asserted-by":"crossref","unstructured":"Nozaki K, Niimi M, Eason RO, Kawaguchi E (1998) A large capacity steganography using color bmp images. In: ACCV \u201998: Proceedings of the Third Asian Conference on Computer Vision-Volume I, pp 112\u2013119. Springer-Verlag, London","DOI":"10.1007\/3-540-63930-6_111"},{"issue":"6","key":"2557_CR25","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/S0923-5965(03)00038-9","volume":"18","author":"G Pavlidis","year":"2003","unstructured":"Pavlidis G, Tsompanopoulos A, Papamarkos N, Chamzas C (2003) Jpeg2000 over noisy communication channels thorough evaluation and cost analysis. Signal Process Image Commun 18(6):497\u2013514","journal-title":"Signal Process Image Commun"},{"issue":"7","key":"2557_CR26","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-A survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"key":"2557_CR27","doi-asserted-by":"crossref","unstructured":"Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE Computer Society","DOI":"10.1109\/MSECP.2003.1203220"},{"issue":"3","key":"2557_CR28","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1504\/IJAMC.2007.013952","volume":"1","author":"T Rabie","year":"2007","unstructured":"Rabie T (2007) Frequency-domain data hiding based on the matryoshka principle. Special Issue on Advances in Video Processing and Security Analysis for Multimedia Communications. International Journal of Advanced Media and Communication 1(3):298\u2013312","journal-title":"International Journal of Advanced Media and Communication"},{"key":"2557_CR29","doi-asserted-by":"crossref","unstructured":"Rabie T (2012) Digital image steganography: An fft approach. In: 4th International Conference on Networked Digital Technologies (NDT), pp 217\u2013230. Springer Verlag","DOI":"10.1007\/978-3-642-30567-2_18"},{"key":"2557_CR30","doi-asserted-by":"crossref","unstructured":"Rabie T (2013) High-capacity steganography. In: 6th International Congress on Image and Signal Processing (CISP), vol 2, pp 858\u2013863","DOI":"10.1109\/CISP.2013.6745285"},{"key":"2557_CR31","volume-title":"Discrete Cosine Transform: Algorithms, Advantages, Applications","author":"K Rao","year":"1990","unstructured":"Rao K, Yip P (1990) Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press, ISBN 0-12-580203-X, Boston"},{"key":"2557_CR32","unstructured":"Rodrigues J, Rios J, Puech W et al (2004) Ssb-4 system of steganography using bit 4. In: 5th International Workshop on Image Analysis for Multimedia Interactive Services"},{"issue":"12","key":"2557_CR33","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1109\/TIP.2004.837557","volume":"13","author":"K Solanki","year":"2004","unstructured":"Solanki K, Jacobsen N, Madhow U, Manjunath BS, Chandrasekaran S (2004) Robust image-adaptive data hiding using erasure and error correction. IEEE Trans Image Process 13(12):1627\u20131639","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"2557_CR34","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits and Systems for Video Technology 13(8):890\u2013896","journal-title":"IEEE Trans Circuits and Systems for Video Technology"},{"key":"2557_CR35","unstructured":"Tsai P, Hu YC, Chang CC (2002) An image hiding technique using block truncation coding. In: Proceedings of Pacific Rim Workshop on Digital Steganography, pp 54\u201364"},{"key":"2557_CR36","unstructured":"Wang X, Yao Z, Li CT (2005) A palette-based image steganographic method using colour quantisation. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), pp II \u2013 1090\u20133"},{"issue":"6","key":"2557_CR37","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TIP.2003.810588","volume":"12","author":"M Wu","year":"2003","unstructured":"Wu M, Liu B (2003) Data hiding in image and video: Part I - fundamental issues and solutions. IEEE Trans Image Process 12(6):685\u2013695","journal-title":"IEEE Trans Image Process"},{"key":"2557_CR38","doi-asserted-by":"crossref","unstructured":"Yang B, Schmucker M, Funk W, Busch C, Sun S (2004) Integer dct-based reversible watermarking for images using companding technique. In: Proceedings of the SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents. vol 6 (405)","DOI":"10.1117\/12.527216"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2557-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2557-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2557-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T00:59:03Z","timestamp":1566521943000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2557-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,10]]},"references-count":38,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["2557"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2557-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,10]]}}}