{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T17:21:16Z","timestamp":1770830476833,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T00:00:00Z","timestamp":1501632000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11042-017-5056-4","type":"journal-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T06:07:33Z","timestamp":1501654053000},"page":"14705-14723","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":68,"title":["An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD)"],"prefix":"10.1007","volume":"77","author":[{"given":"Mohamed","family":"Abdel Hameed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1772-4254","authenticated-orcid":false,"given":"Saleh","family":"Aly","sequence":"additional","affiliation":[]},{"given":"M.","family":"Hassaballah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"issue":"8","key":"5056_CR1","doi-asserted-by":"crossref","first-page":"1479","DOI":"10.1109\/TMM.2008.2007294","volume":"10","author":"PVK Borges","year":"2008","unstructured":"Borges PVK, Mayer J, Izquierdo E (2008) Robust and transparent color modulation for text data hiding. IEEE Trans Multimed 10(8):1479\u20131489","journal-title":"IEEE Trans Multimed"},{"issue":"7","key":"5056_CR2","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1016\/S0031-3203(02)00289-3","volume":"36","author":"CC Chang","year":"2003","unstructured":"Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583\u20131595","journal-title":"Pattern Recogn"},{"issue":"2","key":"5056_CR3","first-page":"37","volume":"3","author":"KC Chang","year":"2008","unstructured":"Chang KC, Chang CP, Huang PS, Tu TM (2008) A novel image steganographic method using tri-way pixel-value differencing. J Multimed 3(2):37\u201344","journal-title":"J Multimed"},{"issue":"3","key":"5056_CR4","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"issue":"3","key":"5056_CR5","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.image.2014.01.003","volume":"29","author":"J Chen","year":"2014","unstructured":"Chen J (2014) A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Process Image Commun 29(3):375\u2013384","journal-title":"Signal Process Image Commun"},{"issue":"13","key":"5056_CR6","doi-asserted-by":"crossref","first-page":"610","DOI":"10.14445\/22315381\/IJETT-V35P323","volume":"35","author":"T Gulati","year":"2016","unstructured":"Gulati T, Gupta S (2016) A secured method for image steganography based on pixel values. Int J Eng Trends Technol 35(13):610\u2013614","journal-title":"Int J Eng Trends Technol"},{"key":"5056_CR7","unstructured":"Hemalatha S, Acharya UD, Renuka A (2013) Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains. arXiv:\n                        1307.3026\n                        \n                     3(3):1\u20139"},{"issue":"2","key":"5056_CR8","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26\u201334","journal-title":"Computer"},{"issue":"6","key":"5056_CR9","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1049\/iet-ipr.2011.0059","volume":"6","author":"M Khodaei","year":"2012","unstructured":"Khodaei M, Faez K (2012) New adaptive steganographic method using least significant-bit substitution and pixel-value differencing. IET Image Process 6(6):677\u2013686","journal-title":"IET Image Process"},{"issue":"3","key":"5056_CR10","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Secur 2(3):321\u2013330","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"5056_CR11","doi-asserted-by":"crossref","first-page":"2529","DOI":"10.1016\/j.sigpro.2013.03.029","volume":"93","author":"X Li","year":"2013","unstructured":"Li X, Li B, Luo X, Yang B, Zhu R (2013) Steganalysis of a PVD-based content adaptive image steganography. Signal Process 93(9):2529\u20132538","journal-title":"Signal Process"},{"issue":"1","key":"5056_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jvcir.2010.08.007","volume":"22","author":"X Liao","year":"2011","unstructured":"Liao X, Wen QY, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified lsb substitution. J Vis Commun Image Represent 22(1):1\u20138","journal-title":"J Vis Commun Image Represent"},{"issue":"2\u20133","key":"5056_CR13","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11042-009-0440-3","volume":"52","author":"W Luo","year":"2011","unstructured":"Luo W, Huang F, Huang J (2011) A more secure steganography based on adaptive pixel-value differencing scheme. Multimed Tools Appl 52(2\u20133):407\u2013430","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"5056_CR14","first-page":"83","volume":"2","author":"J Mandal","year":"2012","unstructured":"Mandal J, Das D (2012) Colour image steganography based on pixel value differencing in spatial domain. Int J Inf Sci Tech 2(4):83\u201393","journal-title":"Int J Inf Sci Tech"},{"key":"5056_CR15","unstructured":"Neeta D, Snehal K, Jacobs D (2006) Implementation of LSB steganography and its evaluation for various bits. In: 2006 1st international conference on digital information management. IEEE, pp 173\u2013178"},{"key":"5056_CR16","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat G (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230","journal-title":"J Biomed Inform"},{"issue":"3","key":"5056_CR17","doi-asserted-by":"crossref","first-page":"3943","DOI":"10.1007\/s11042-016-4196-2","volume":"76","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat G (2017) A new reversible and high capacity data hiding technique for e-healthcare applications. Multimed Tools Appl 76(3):3943\u20133975","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"5056_CR18","doi-asserted-by":"crossref","first-page":"10599","DOI":"10.1007\/s11042-015-3127-y","volume":"76","author":"SA Parah","year":"2017","unstructured":"Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for e-healthcare. Multimed Tools Appl 76(8):10599\u201310633","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"5056_CR19","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11045-015-0358-z","volume":"28","author":"SA Parah","year":"2017","unstructured":"Parah SA, Sheikh JA, Assad UI, Bhat GM (2017) Hiding in encrypted images: a three tier security data hiding technique. Multidim Syst Sign Process 28(2):549\u2013572","journal-title":"Multidim Syst Sign Process"},{"issue":"1","key":"5056_CR20","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.compeleceng.2013.11.006","volume":"40","author":"SA Parah","year":"2014","unstructured":"Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70\u201382","journal-title":"Comput Electr Eng"},{"issue":"7","key":"5056_CR21","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding\u2014a survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"issue":"3","key":"5056_CR22","first-page":"161","volume":"8","author":"C Prema","year":"2014","unstructured":"Prema C, Manimegalai D (2014) Adaptive color image steganography using intra color pixel value differencing. Aust J Basic Appl Sci 8(3):161\u2013167","journal-title":"Aust J Basic Appl Sci"},{"issue":"3","key":"5056_CR23","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32\u201344","journal-title":"IEEE Secur Priv"},{"key":"5056_CR24","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.asoc.2015.01.032","volume":"30","author":"S Sajasi","year":"2015","unstructured":"Sajasi S, Moghadam AME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375\u2013389","journal-title":"Appl Soft Comput"},{"issue":"3","key":"5056_CR25","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/s11042-014-2016-0","volume":"74","author":"S Shen","year":"2015","unstructured":"Shen S, Huang L, Tian Q (2015) A novel data hiding for color images based on pixel value difference and modulus function. Multimed Tools Appl 74(3):707\u2013728","journal-title":"Multimed Tools Appl"},{"key":"5056_CR26","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","volume":"48","author":"SY Shen","year":"2015","unstructured":"Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131\u2013141","journal-title":"Comput Secur"},{"issue":"21","key":"5056_CR27","doi-asserted-by":"crossref","first-page":"13541","DOI":"10.1007\/s11042-015-2937-2","volume":"75","author":"G Swain","year":"2016","unstructured":"Swain G (2016) Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimed Tools Appl 75(21):13541\u201313556","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"5056_CR28","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.jss.2007.01.049","volume":"81","author":"CM Wang","year":"2008","unstructured":"Wang CM, Wu NI, Tsai CS, Hwang MS (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81(1):150\u2013158","journal-title":"J Syst Softw"},{"issue":"9","key":"5056_CR29","first-page":"1613","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"5056_CR30","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1016\/j.asoc.2011.09.002","volume":"12","author":"NI Wu","year":"2012","unstructured":"Wu NI, Wu KC, Wang CM (2012) Exploring pixel-value differencing and base decomposition for low distortion data embedding. Appl Soft Comput 12(2):942\u2013960","journal-title":"Appl Soft Comput"},{"issue":"4","key":"5056_CR31","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.jss.2010.11.889","volume":"84","author":"CH Yang","year":"2011","unstructured":"Yang CH, Weng CY, Tso HK, Wang SJ (2011) A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J Syst Softw 84(4):669\u2013678","journal-title":"J Syst Softw"},{"issue":"3","key":"5056_CR32","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.patrec.2003.10.014","volume":"25","author":"X Zhang","year":"2004","unstructured":"Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331\u2013339","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"5056_CR33","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/2566590.2566610","volume":"57","author":"E Zieli\u0144ska","year":"2014","unstructured":"Zieli\u0144ska E, Mazurczyk W, Szczypiorski K (2014) Trends in steganography. Commun ACM 57(3):86\u201395","journal-title":"Commun ACM"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5056-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5056-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5056-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T06:37:52Z","timestamp":1529995072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5056-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,2]]},"references-count":33,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5056"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5056-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,2]]}}}