{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:14:58Z","timestamp":1768011298246,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,2,13]],"date-time":"2016-02-13T00:00:00Z","timestamp":1455321600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002724","name":"University of Sharjah","doi-asserted-by":"crossref","award":["15020403005-P"],"award-info":[{"award-number":["15020403005-P"]}],"id":[{"id":"10.13039\/501100002724","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s11042-016-3301-x","type":"journal-article","created":{"date-parts":[[2016,2,13]],"date-time":"2016-02-13T08:45:27Z","timestamp":1455353127000},"page":"6473-6493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["High-capacity steganography: a global-adaptive-region discrete cosine transform approach"],"prefix":"10.1007","volume":"76","author":[{"given":"Tamer","family":"Rabie","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Kamel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,13]]},"reference":[{"issue":"1","key":"3301_CR1","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"23","author":"N Ahmed","year":"1974","unstructured":"Ahmed N, Natarajan T, Rao K (1974) Discrete cosine transform. IEEE Trans Comput 23(1):90\u201393","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"3301_CR2","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson RJ, Petitcolas FA (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474\u2013481","journal-title":"IEEE J Sel Areas Commun"},{"key":"3301_CR3","unstructured":"Bracamonte J, Ansorge M, Pellandini F, Farine PA (2000) Low complexity image matching in the compressed domain by using the dct-phase. In: Proc. of the 6th COST, vol 276, pp 88\u201393"},{"key":"3301_CR4","doi-asserted-by":"crossref","unstructured":"Bracamonte J, Ansorge M, Pellandini F, Farine PA (2005) Efficient compressed domain target image search and retrieval. In: Image and Video Retrieval, pp 154\u2013163. Springer","DOI":"10.1007\/11526346_19"},{"issue":"6","key":"3301_CR5","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1049\/ip-vis:20045047","volume":"152","author":"G Brisbane","year":"2005","unstructured":"Brisbane G, aini RSN, Ogunbona P (2005) High-capacity steganography using a shared colour palette. IEE Proc., Vis. Image Signal Process 152(6):787\u2013792","journal-title":"Image Signal Process"},{"key":"3301_CR6","unstructured":"Castleman K (1996) Digital Image Processing. Prentice Hall, Upper Saddle NJ"},{"issue":"2","key":"3301_CR7","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"key":"3301_CR8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng L (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37:469\u2013474","journal-title":"Pattern Recogn"},{"key":"3301_CR9","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon jpeg and quantization table modification. Inform Sci 141:123\u2013138","journal-title":"Inform Sci"},{"issue":"1","key":"3301_CR10","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon jpeg and quantization table modification. Inform Sci 141(1):123\u2013138","journal-title":"Inform Sci"},{"key":"3301_CR11","first-page":"21","volume":"13","author":"CC Chang","year":"2008","unstructured":"Chang CC, Chen YH, Lin CC (2008) A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput 13:21\u2013331","journal-title":"Soft Comput"},{"issue":"7","key":"3301_CR12","doi-asserted-by":"crossref","first-page":"1595","DOI":"10.1016\/S0031-3203(02)00289-3","volume":"36","author":"CC Chang","year":"2003","unstructured":"Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36 (7):1595\u20131683","journal-title":"Pattern Recogn"},{"key":"3301_CR13","doi-asserted-by":"crossref","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in dct-based compressed images. Inform Sci 177:2768\u20132786","journal-title":"Inform Sci"},{"issue":"10","key":"3301_CR14","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1109\/TCSVT.2006.882380","volume":"16","author":"CC Chang","year":"2006","unstructured":"Chang CC, Tai WL, Lin CC (2006) A reversible data hiding scheme based on side match vector quantization. IEEE Trans Circuits Syst Video Technol 16(10):1301\u20131308","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"4","key":"3301_CR15","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell G (2001) Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423\u20131443","journal-title":"IEEE Trans Inf Theory"},{"issue":"9","key":"3301_CR16","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1016\/S0167-8655(01)00044-7","volume":"22","author":"KL Chung","year":"2001","unstructured":"Chung KL, Shen CH, Chang LC (2001) A novel svd- and vq-based image hiding scheme. Pattern Recogn Lett 22(9):1051\u20131058","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"3301_CR17","first-page":"1","volume":"2","author":"K Curran","year":"2003","unstructured":"Curran K, Bailey K (2003) An evaluation of image based steganography methods. Intern J Digital Evidence 2(2):1\u201340","journal-title":"Intern J Digital Evidence"},{"key":"3301_CR18","unstructured":"IEC I (1994) Information technology-digital compression and coding of continuous-tone still images: Requirements and guidelines. Standard, ISO IEC pp. 10, 918\u20131"},{"issue":"4","key":"3301_CR19","first-page":"929","volume":"E87-A","author":"M Iwata","year":"2004","unstructured":"Iwata M, Miyake K, Shiozaki A (2004) Digital steganography utilizing features of jpeg images. IEICE Trans Fundam E87-A(4):929\u2013936","journal-title":"IEICE Trans Fundam"},{"key":"3301_CR20","doi-asserted-by":"crossref","unstructured":"Jain A, Uludag U, Hsu R (2002) Hiding a face in a fingerprint image. In: Proc. of the International Conference on Pattern Recognition (ICPR). Quebec City, Canada","DOI":"10.1109\/ICPR.2002.1048100"},{"issue":"3","key":"3301_CR21","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1049\/ip-vis:20000341","volume":"147","author":"Y Lee","year":"2000","unstructured":"Lee Y, Chen L (2000) High capacity image steganographic model. IEE Proc., Vis. Image Signal Process 147(3):288\u2013294","journal-title":"Image Signal Process"},{"key":"3301_CR22","doi-asserted-by":"crossref","unstructured":"Lin CC, Shiu PF (2009) Dct-based reversible data hiding scheme. In: Proc. of the 3rd International Conference on Ubiquitous Information Management and Communication (ICUIMC09), pp 327\u2013335","DOI":"10.1145\/1516241.1516298"},{"issue":"3","key":"3301_CR23","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"Lin CC, Shiu PF (2010) High capacity data hiding scheme for dct-based images. J Inform Hiding Multi Signal Process 1(3):220\u2013240","journal-title":"J Inform Hiding Multi Signal Process"},{"issue":"3","key":"3301_CR24","first-page":"836","volume":"91-D","author":"CY Lin","year":"2008","unstructured":"Lin CY, Chang CC, Wang YZ (2008) Reversible steganographic method with high payload for jpeg images. IEICE Trans. Inf Syst 91-D(3):836\u2013845","journal-title":"Inf Syst"},{"issue":"8","key":"3301_CR25","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"LM Marvel","year":"1999","unstructured":"Marvel LM, Charles G, Boncelet J, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075\u20131083","journal-title":"IEEE Trans Image Process"},{"key":"3301_CR26","doi-asserted-by":"crossref","unstructured":"Nozaki K, Niimi M, Eason RO, Kawaguchi E (1998) A large capacity steganography using color bmp images","DOI":"10.1007\/3-540-63930-6_111"},{"issue":"6","key":"3301_CR27","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1016\/S0923-5965(03)00038-9","volume":"18","author":"G Pavlidis","year":"2003","unstructured":"Pavlidis G, Tsompanopoulos A, Papamarkos N, Chamzas C (2003) Jpeg2000 over noisy communication channels thorough evaluation and cost analysis. Signal Process Image Commun 18(6):497\u2013514","journal-title":"Signal Process Image Commun"},{"issue":"7","key":"3301_CR28","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-A survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"key":"3301_CR29","doi-asserted-by":"crossref","unstructured":"Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. In: IEEE Security & Privacy Magazine, pp 32\u201344. IEEE Computer Society","DOI":"10.1109\/MSECP.2003.1203220"},{"issue":"4","key":"3301_CR30","doi-asserted-by":"crossref","first-page":"043,009","DOI":"10.1117\/1.JEI.22.4.043009","volume":"22","author":"K Qazanfari","year":"2013","unstructured":"Qazanfari K, Safabakhsh R (2013) High-capacity method for hiding data in the discrete cosine transform domain. J Electron Imaging 22(4):043,009\u2013043,009","journal-title":"J Electron Imaging"},{"issue":"3","key":"3301_CR31","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1504\/IJAMC.2007.013952","volume":"1","author":"T Rabie","year":"2007","unstructured":"Rabie T (2007) Frequency-domain data hiding based on the matryoshka principle. Special Issue on Advances in Video Processing and Security Analysis for Multimedia Communications. Intern J Advanced Media and Commun 1(3):298\u2013312","journal-title":"Intern J Advanced Media and Commun"},{"key":"3301_CR32","doi-asserted-by":"crossref","unstructured":"Rabie T (2012) Digital image steganography: An fft approach. In: 4th International Conference on Networked Digital Technologies (NDT), pp 217\u2013230. Springer Verlag","DOI":"10.1007\/978-3-642-30567-2_18"},{"key":"3301_CR33","doi-asserted-by":"crossref","unstructured":"Rabie T (2013) High-capacity steganography. In: 6th International Congress on Image and Signal Processing (CISP), vol 2, pp 858\u2013863","DOI":"10.1109\/CISP.2013.6745285"},{"key":"3301_CR34","doi-asserted-by":"crossref","unstructured":"Rabie T, Kamel I (2015) On the embedding limits of the discrete cosine transform. Multimedia Tools Appl. http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2557-x","DOI":"10.1007\/s11042-015-2557-x"},{"key":"3301_CR35","doi-asserted-by":"crossref","unstructured":"Rao K, Yip P (1990) Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press, ISBN 0-12-580203-X Boston","DOI":"10.1016\/B978-0-08-092534-9.50007-2"},{"key":"3301_CR36","unstructured":"Rodrigues J, Rios J, Puech W, et al. (2004) Ssb-4 system of steganography using bit 4. In: 5th International Workshop on Image Analysis for Multimedia Interactive Services"},{"issue":"12","key":"3301_CR37","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1109\/TIP.2004.837557","volume":"13","author":"K Solanki","year":"2004","unstructured":"Solanki K, Jacobsen N, Madhow U, Manjunath BS, Chandrasekaran S (2004) Robust image-adaptive data hiding using erasure and error correction. IEEE Trans Image Process 13(12):1627\u20131639","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"3301_CR38","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"3301_CR39","unstructured":"Tsai P, Hu YC, Chang CC (2002) An image hiding technique using block truncation coding. In: Proc. of Pacific Rim Workshop on Digital Steganography, pp 54\u201364"},{"key":"3301_CR40","unstructured":"Wang X, Yao Z, Li CT (2005) A palette-based image steganographic method using colour quantisation. In: Proc. of the IEEE International Conference on Image Processing (ICIP), pp II \u2013 1090\u20133"},{"issue":"6","key":"3301_CR41","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/TIP.2003.810588","volume":"12","author":"M Wu","year":"2003","unstructured":"Wu M, Liu B (2003) Data hiding in image and video:part I - fundamental issues and solutions. IEEE Trans Image Process 12(6):685\u2013695","journal-title":"IEEE Trans Image Process"},{"key":"3301_CR42","doi-asserted-by":"crossref","unstructured":"Yang B, Schmucker M, Funk W, Busch C, Sun S (2004) Integer dct-based reversible watermarking for images using companding technique. Proc SPIE 5306, Security, Steganography and Watermarking of Multimedia Contents, vol 6","DOI":"10.1117\/12.527216"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3301-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3301-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3301-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3301-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T10:37:08Z","timestamp":1567593428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3301-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,13]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["3301"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3301-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,13]]}}}