{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T00:33:07Z","timestamp":1774398787338,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2017,7,2]],"date-time":"2017-07-02T00:00:00Z","timestamp":1498953600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11042-017-4947-8","type":"journal-article","created":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T23:15:39Z","timestamp":1498950939000},"page":"13279-13308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":76,"title":["A modified DWT-based image steganography technique"],"prefix":"10.1007","volume":"77","author":[{"given":"Vijay","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Dinesh","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,2]]},"reference":[{"key":"4947_CR1","first-page":"1","volume-title":"A discrete wavelet transform based technique for image hiding","author":"AA Abdelwahab","year":"2008","unstructured":"Abdelwahab AA, Hassan LA (2008) A discrete wavelet transform based technique for image hiding. Proceedings of 25th National Radio Science Conference, Egypt, pp 1\u20139"},{"issue":"4","key":"4947_CR2","first-page":"358","volume":"7","author":"A Al-Ataby","year":"2010","unstructured":"Al-Ataby A, Al-Naima F (2010) A modified high capacity image steganography technique based on wavelet transform. Int Arab J Info Technol 7(4):358\u2013364","journal-title":"Int Arab J Info Technol"},{"key":"4947_CR3","first-page":"37","volume":"7","author":"OM Al-Shatanawi","year":"2015","unstructured":"Al-Shatanawi OM, El-Emam NN (2015) A new image steganography algorithm based on MLSB method with random pixels selection. Int J Netw Sec Appl 7:37\u201353","journal-title":"Int J Netw Sec Appl"},{"key":"4947_CR4","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1016\/j.procs.2015.02.105","volume":"46","author":"D Baby","year":"2015","unstructured":"Baby D, Thomas J, Augustine G, George E, Michael NR (2015) A novel DWT based image securing method using steganography. Procedia Comput Sci 46:612\u2013618","journal-title":"Procedia Comput Sci"},{"key":"4947_CR5","first-page":"59","volume-title":"Break our steganographic system-the ins and outs of organizing BOSS","author":"P Bas","year":"2011","unstructured":"Bas P, Filler T, Pevny T (2011) Break our steganographic system-the ins and outs of organizing BOSS. Proceeding of International Conference on Information Hiding, Prague, pp 59\u201370"},{"issue":"1","key":"4947_CR6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","volume":"192","author":"C Cachin","year":"2004","unstructured":"Cachin C (2004) An information-theoretic model for steganography. Inf Comput 192(1):41\u201356","journal-title":"Inf Comput"},{"key":"4947_CR7","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2003","unstructured":"Chan CK, Chang LM (2003) Hiding data in image by simple LSB substitution. Pattern Recogn 37:469\u2013474","journal-title":"Pattern Recogn"},{"key":"4947_CR8","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Kevitt PM (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727\u2013752","journal-title":"Signal Process"},{"issue":"3","key":"4947_CR9","first-page":"275","volume":"4","author":"PY Chen","year":"2006","unstructured":"Chen PY, Wu WE (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3):275\u2013290","journal-title":"Int J Appl Sci Eng"},{"issue":"1","key":"4947_CR10","first-page":"53","volume":"7","author":"PY Chen","year":"2009","unstructured":"Chen PY, Wu WE (2009) A modified side match scheme for image steganography. Int J Appl Sci Eng 7(1):53\u201360","journal-title":"Int J Appl Sci Eng"},{"issue":"8","key":"4947_CR11","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TIFS.2016.2555281","volume":"11","author":"T Denemark","year":"2016","unstructured":"Denemark T, Boroumand M, Fridrich J (2016) Steganalysis features of content-adaptive JPEG steganography. IEEE Trans Info Forens Sec 11(8):1736\u20131746","journal-title":"IEEE Trans Info Forens Sec"},{"key":"4947_CR12","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1016\/j.jss.2012.12.006","volume":"86","author":"N El-Emam","year":"2013","unstructured":"El-Emam N, Al-Zubidy R (2013) New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. J Syst Softw 86:1465\u20131481","journal-title":"J Syst Softw"},{"key":"4947_CR13","doi-asserted-by":"publisher","unstructured":"Ghazanfari, K., Ghaemmaghami, S. & Khosravi, S.R. 2011. LSB++: An improvement to LSB+ steganography. Proceedings of IEEE Region Conference TENCON, Pp. 364\u2013368. doi:\n10.1109\/TENCON.2011.6129126","DOI":"10.1109\/TENCON.2011.6129126"},{"key":"4947_CR14","doi-asserted-by":"crossref","first-page":"1898","DOI":"10.1016\/j.cnsns.2013.10.014","volume":"19","author":"M Ghebleh","year":"2014","unstructured":"Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19:1898\u20131907","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"4947_CR15","doi-asserted-by":"crossref","unstructured":"Guo, L., Ni, J., & Shi, Y.-Q. 2012. An efficient JPEG steganographic scheme using uniform embedding. Proceeding of 4th IEEE International Workshop on Information Forensics and Security, Spain, Pp. 169-174","DOI":"10.1109\/WIFS.2012.6412644"},{"key":"4947_CR16","first-page":"83","volume":"4","author":"S Hemalatha","year":"2013","unstructured":"Hemalatha S, Acharya UD, Renuka A, Kamath PR (2013) A secure and high capacity image steganography technique. Sign Image Proc 4:83\u201389","journal-title":"Sign Image Proc"},{"key":"4947_CR17","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1016\/j.procs.2015.03.207","volume":"47","author":"S Hemalatha","year":"2015","unstructured":"Hemalatha S, Acharya UD, Renuka A (2015) Wavelet transform based steganography technique to hide audio signals in image. Procedia Comput Sci 47:272\u2013281","journal-title":"Procedia Comput Sci"},{"key":"4947_CR18","doi-asserted-by":"crossref","unstructured":"Holub, V., & Fridrich, J. 2012. Designing steganographic distortion using directional filters. Proceeding of IEEE International Workshop on Information Hiding and Multimedia Security, 234\u2013239","DOI":"10.1109\/WIFS.2012.6412655"},{"key":"4947_CR19","first-page":"59","volume-title":"Digital image steganography using universal distortion","author":"V Holub","year":"2013","unstructured":"Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceeding of ACM Workshop on Information Hiding and Multimedia Security, France, pp 59\u201368"},{"key":"4947_CR20","first-page":"1","volume":"1","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion design for steganography in an arbitrary domain. EURASIP J Inf Secur 1:1\u201313","journal-title":"EURASIP J Inf Secur"},{"key":"4947_CR21","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.image.2016.10.005","volume":"50","author":"M Hussan","year":"2017","unstructured":"Hussan M, Wahab AWA, Ho ATS, Javed N, Jung K-H (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44\u201357","journal-title":"Signal Process Image Commun"},{"key":"4947_CR22","doi-asserted-by":"crossref","first-page":"11517","DOI":"10.1016\/j.eswa.2012.02.106","volume":"39","author":"A Ioannidou","year":"2012","unstructured":"Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517\u201311524","journal-title":"Expert Syst Appl"},{"key":"4947_CR23","unstructured":"Johnson, N.F. & Katzenbbeisser, S. 2000. A survey of steganographic techniques. Information Hiding, Artech House, 43\u201378"},{"key":"4947_CR24","first-page":"223","volume-title":"Performance evaluation of dwt based image steganography","author":"V Kumar","year":"2010","unstructured":"Kumar V, Kumar D (2010a) Performance evaluation of dwt based image steganography. Proceedings of 2nd International Conference on Advance Computing, Patiala, pp 223\u2013228"},{"key":"4947_CR25","volume-title":"Digital image steganography based on combination of DCT and DWT","author":"V Kumar","year":"2010","unstructured":"Kumar V, Kumar D (2010b) In: Das VV, Vijaykumar R (eds) Digital image steganography based on combination of DCT and DWT. Information and Communication Technologies, Kochi"},{"key":"4947_CR26","first-page":"4206","volume-title":"A new cost function for spatial image steganography","author":"B Li","year":"2014","unstructured":"Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. Proceedings of International Conference on Image Processing, Paris, pp 4206\u20134210"},{"issue":"5","key":"4947_CR27","first-page":"699","volume":"2","author":"S Masaebi","year":"2012","unstructured":"Masaebi S, Moghaddam AME (2012) A new approach for image hiding based on contourlet transform. Int J Electric Comput Eng 2(5):699\u2013708","journal-title":"Int J Electric Comput Eng"},{"key":"4947_CR28","doi-asserted-by":"crossref","unstructured":"Muhammad K, Ahmad J, Rho S, Baik SW (2017) Image steganography for authenticity of visual contents in social networks. Multi Tools Appl:1\u201320","DOI":"10.1007\/s11042-017-4420-8"},{"issue":"2","key":"4947_CR29","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1080\/03772063.2007.10876126","volume":"53","author":"S Mythreyi","year":"2007","unstructured":"Mythreyi S, Vaidehi V (2007) Gabor transform based image steganography. IETE J Res 53(2):103\u2013112","journal-title":"IETE J Res"},{"key":"4947_CR30","first-page":"88","volume-title":"Optimized discrete wavelet transform based steganography","author":"T Narasimmalou","year":"2012","unstructured":"Narasimmalou T, Joseph AR (2012) Optimized discrete wavelet transform based steganography. Proceedings of IEEE International Conference on Advanced Communication Control and Computing Technologies, Ramanathapuram, pp 88\u201391"},{"key":"4947_CR31","first-page":"295","volume-title":"Digital image steganography based on assignment algorithm and combination of DCT-IWT","author":"N Raftari","year":"2012","unstructured":"Raftari N, Moghadam AME (2012) Digital image steganography based on assignment algorithm and combination of DCT-IWT. Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks, Phuket, pp 295\u2013300"},{"issue":"2","key":"4947_CR32","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi V, Cogranne R, Fridrich J (2016) Content adaptive steganography by minimizing statistical detectability. IEEE Trans Info Forens Sec 11(2):221\u2013234","journal-title":"IEEE Trans Info Forens Sec"},{"issue":"6","key":"4947_CR33","first-page":"124","volume":"32","author":"S Shuliang","year":"2016","unstructured":"Shuliang S (2016) Image steganography based on nonsubsampled contourlet transform and hill cipher. Telecommun Sci 32(6):124\u2013128","journal-title":"Telecommun Sci"},{"key":"4947_CR34","first-page":"593","volume-title":"Singular value decomposition based image steganography using integer wavelet transform","author":"S Singh","year":"2015","unstructured":"Singh S, Singh R, Siddiqui TJ (2015) Singular value decomposition based image steganography using integer wavelet transform. Proceedings of International Symposium on Signal Processing and Intelligent Recognition Systems, Trivandrum, pp 593\u2013601"},{"key":"4947_CR35","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: A survey. Comput Sci Rev 13:95\u2013113","journal-title":"Comput Sci Rev"},{"issue":"4","key":"4947_CR36","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.csi.2008.09.003","volume":"31","author":"M-S Wang","year":"2009","unstructured":"Wang M-S, Chen W-C (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput Stand Interf 31(4):757\u2013762","journal-title":"Comput Stand Interf"},{"issue":"4","key":"4947_CR37","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"4947_CR38","first-page":"236","volume-title":"A data mapping method for steganography and its application to images","author":"H-T Wu","year":"2008","unstructured":"Wu H-T, Dugelay J-L, Cheung Y-M (2008) A data mapping method for steganography and its application to images. Proceedings of International Workshop on Information Hiding, USA, pp 236\u2013250"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4947-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4947-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4947-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,5]],"date-time":"2018-06-05T11:04:53Z","timestamp":1528196693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4947-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,2]]},"references-count":38,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["4947"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4947-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,2]]}}}