{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:22:37Z","timestamp":1773246157549,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2017,9,6]],"date-time":"2017-09-06T00:00:00Z","timestamp":1504656000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11042-017-5117-8","type":"journal-article","created":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T22:12:55Z","timestamp":1504649575000},"page":"15321-15351","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An LSB based novel data hiding method using extended LBP"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8505-0044","authenticated-orcid":false,"given":"Sujit Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,6]]},"reference":[{"key":"5117_CR1","doi-asserted-by":"crossref","unstructured":"Ash S, Mukherjee S, Sanyal G (2015) A dwt based steganographic method using prime first mapping (pfm). In: 2015 second international conference on Advances in computing and communication engineering (ICACCE). IEEE, Piscataway, pp 471\u2013476","DOI":"10.1109\/ICACCE.2015.74"},{"key":"5117_CR2","doi-asserted-by":"crossref","unstructured":"Augot D, Barbier M, Fontaine C (2011) Ensuring message embedding in wet paper steganography. In: Cryptography and coding. Springer, Berlin Heidelberg, pp 244\u2013258","DOI":"10.1007\/978-3-642-25516-8_15"},{"key":"5117_CR3","doi-asserted-by":"crossref","unstructured":"Bhattacharya T, Dey N, Chaudhuri S (2012) A session based multiple image hiding technique using dwt and dct. arXiv:\n                        1208.0950","DOI":"10.5120\/4604-6808"},{"issue":"1","key":"5117_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40064-015-1659-2","volume":"5","author":"Z Cao","year":"2016","unstructured":"Cao Z, Yin Z, Hu H, Gao X, Wang L (2016) High capacity data hiding scheme based on (7, 4) hamming code. SpringerPlus 5(1):1\u201313","journal-title":"SpringerPlus"},{"issue":"2","key":"5117_CR5","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-lsb data embedding. IEEE Trans Image Process 14(2):253\u2013266","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"5117_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple lsb substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"issue":"12","key":"5117_CR7","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1016\/j.patrec.2004.05.006","volume":"25","author":"CC Chang","year":"2004","unstructured":"Chang CC, Tseng HW (2004) A steganographic method for digital images using side match. Pattern Recogn Lett 25(12):1431\u20131437","journal-title":"Pattern Recogn Lett"},{"issue":"7","key":"5117_CR8","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1016\/S0031-3203(02)00289-3","volume":"36","author":"CC Chang","year":"2003","unstructured":"Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36 (7):1583\u20131595","journal-title":"Pattern Recogn"},{"key":"5117_CR9","doi-asserted-by":"crossref","unstructured":"Chanu YJ, Tuithung T, Manglem Singh K (2012) A short survey on image steganography and steganalysis techniques. In: 2012 3rd national conference on emerging trends and applications in computer science (NCETACS). IEEE, Piscataway, pp 52\u201355","DOI":"10.1109\/NCETACS.2012.6203297"},{"issue":"7","key":"5117_CR10","doi-asserted-by":"crossref","first-page":"2141","DOI":"10.1016\/j.sigpro.2010.01.018","volume":"90","author":"CC Chen","year":"2010","unstructured":"Chen CC, Chang CC (2010) High capacity smvq-based hiding scheme using adaptive index. Signal Process 90(7):2141\u20132149","journal-title":"Signal Process"},{"issue":"3","key":"5117_CR11","doi-asserted-by":"crossref","first-page":"037,008","DOI":"10.1117\/1.3366654","volume":"49","author":"LST Chen","year":"2010","unstructured":"Chen LST, Lin JC (2010) Steganography scheme based on side match vector quantization. Opt Eng 49(3):037,008\u2013037,008","journal-title":"Opt Eng"},{"issue":"2","key":"5117_CR12","doi-asserted-by":"crossref","first-page":"1985","DOI":"10.1007\/s11042-013-1493-x","volume":"72","author":"B Chen","year":"2014","unstructured":"Chen B, Zhang W, Ma K, Yu N (2014) Recursive code construction for reversible data hiding in dct domain. Multimedia Tools and Applications 72(2):1985\u20132009","journal-title":"Multimedia Tools and Applications"},{"issue":"21","key":"5117_CR13","doi-asserted-by":"crossref","first-page":"13,679","DOI":"10.1007\/s11042-015-2825-9","volume":"75","author":"YH Chen","year":"2016","unstructured":"Chen YH, Huang HC, Lin CC (2016) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimedia Tools and Applications 75(21):13,679\u201313,704","journal-title":"Multimedia Tools and Applications"},{"key":"5117_CR14","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1016\/j.patcog.2004.02.008","volume":"37","author":"BC Dhara","year":"2004","unstructured":"Dhara BC, Chanda B (2004) Block truncation coding using pattern fitting. Pattern Recogn 37:2131\u2013 2139","journal-title":"Pattern Recogn"},{"issue":"2","key":"5117_CR15","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1016\/j.jvcir.2011.11.005","volume":"23","author":"BC Dhara","year":"2012","unstructured":"Dhara BC, Chanda B (2012) A fast progressive image transmission scheme using block truncation coding by pattern fitting. J Vis Commun Image Represent 23 (2):313\u2013322","journal-title":"J Vis Commun Image Represent"},{"key":"5117_CR16","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001) Reliable detection of lsb steganography in color and grayscale images. In: Proceedings of the 2001 workshop on multimedia and security: new challenges. ACM, New York, pp 27\u201330","DOI":"10.1145\/1232454.1232466"},{"issue":"10","key":"5117_CR17","doi-asserted-by":"crossref","first-page":"3923","DOI":"10.1109\/TSP.2005.855393","volume":"53","author":"J Fridrich","year":"2005","unstructured":"Fridrich J, Goljan M, Lison\u011bk P, Soukal D (2005) Writing on wet paper. IEEE Trans Signal Process 53(10):3923\u20133935","journal-title":"IEEE Trans Signal Process"},{"key":"5117_CR18","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1016\/j.sigpro.2013.12.005","volume":"98","author":"X Gui","year":"2014","unstructured":"Gui X, Li X, Yang B (2014) A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process 98:370\u2013380","journal-title":"Signal Process"},{"issue":"3","key":"5117_CR19","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1016\/j.patcog.2008.08.014","volume":"42","author":"M Heikkil\u00e4","year":"2009","unstructured":"Heikkil\u00e4 M, Pietik\u00e4inen M, Schmid C (2009) Description of interest regions with local binary patterns. Pattern Recogn 42(3):425\u2013436","journal-title":"Pattern Recogn"},{"issue":"23","key":"5117_CR20","doi-asserted-by":"crossref","first-page":"1424","DOI":"10.1049\/el:20020946","volume":"38","author":"J Jiang","year":"2002","unstructured":"Jiang J, Armstrong A (2002) Data hiding approach for efficient image indexing. Electron Lett 38(23):1424\u20131425","journal-title":"Electron Lett"},{"issue":"6","key":"5117_CR21","doi-asserted-by":"crossref","first-page":"2179","DOI":"10.1007\/s11042-014-2081-4","volume":"74","author":"KH Jung","year":"2015","unstructured":"Jung KH, Yoo KY (2015) High-capacity index based data hiding method. Multimedia Tools and Applications 74(6):2179\u20132193","journal-title":"Multimedia Tools and Applications"},{"key":"5117_CR22","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251\u2013272","journal-title":"Inf Sci"},{"issue":"3","key":"5117_CR23","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"HJ Kim","year":"2008","unstructured":"Kim HJ, Sachnev V, Shi YQ, Nam J, Choo HG (2008) A novel difference expansion transform for reversible data embedding. IEEE Trans Inf Forensics Secur 3 (3):456\u2013465","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"5117_CR24","doi-asserted-by":"crossref","first-page":"1349","DOI":"10.1109\/83.465100","volume":"4","author":"F Kossentini","year":"1995","unstructured":"Kossentini F, Smith MJ, Barnes CF (1995) Image coding using entropy-constrained residual vector quantization. IEEE Trans Image Process 4 (10):1349\u20131357","journal-title":"IEEE Trans Image Process"},{"key":"5117_CR25","doi-asserted-by":"crossref","unstructured":"Lee K, Westfeld A, Lee S (2006) Category attack for lsb steganalysis of jpeg images. In: Digital watermarking. Springer, Berlin, pp 35\u201348","DOI":"10.1007\/11922841_4"},{"issue":"12","key":"5117_CR26","doi-asserted-by":"crossref","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","volume":"20","author":"X Li","year":"2011","unstructured":"Li X, Yang B, Zeng T (2011) Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans Image Process 20 (12):3524\u20133533","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"5117_CR27","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"Li X, Li J, Li B, Yang B (2013) High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process 93 (1):198\u2013205","journal-title":"Signal Process"},{"key":"5117_CR28","doi-asserted-by":"crossref","unstructured":"Liao WH (2010) Region description using extended local ternary patterns. In: 2010 20th international conference on pattern recognition (ICPR). IEEE, Piscataway , pp 1003\u20131006","DOI":"10.1109\/ICPR.2010.251"},{"issue":"3","key":"5117_CR29","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"Lin CC, Shiu PF (2010) High capacity data hiding scheme for dct-based images. Journal of Information Hiding and Multimedia Signal Processing 1(3):220\u2013240","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"2","key":"5117_CR30","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1049\/iet-ipr.2014.1015","volume":"10","author":"Y Liu","year":"2016","unstructured":"Liu Y, Chang CC, Nguyen TS (2016) High capacity turtle shell-based data hiding. IET Image Process 10(2):130\u2013137","journal-title":"IET Image Process"},{"key":"5117_CR31","doi-asserted-by":"crossref","unstructured":"Lopes IO, Barcelos CA, Batista MA, Silva AM (2006) Enhanced watermarking scheme based on texture analysis. In: Advanced concepts for intelligent vision systems. Springer, Berlin Heidelberg, pp 746\u2013756","DOI":"10.1007\/11864349_68"},{"issue":"2","key":"5117_CR32","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.dsp.2011.09.003","volume":"22","author":"SN Mali","year":"2012","unstructured":"Mali SN, Patil PM, Jalnekar RM (2012) Robust and secured image-adaptive data hiding. Digital Signal Process 22(2):314\u2013323","journal-title":"Digital Signal Process"},{"issue":"5","key":"5117_CR33","first-page":"1","volume":"1","author":"N Manikandaprabu","year":"2014","unstructured":"Manikandaprabu N, Pavithra S, Thilagamani V (2014) Data hiding in color images. International Journal of Novel Research in Engineering & Pharmaceutical Sciences 1(5):1\u20137","journal-title":"International Journal of Novel Research in Engineering & Pharmaceutical Sciences"},{"key":"5117_CR34","doi-asserted-by":"crossref","unstructured":"Nedelcu T, Coltuc D (2015) Alternate embedding method for difference expansion reversible watermarking. In: 2015 international symposium on signals, circuits and systems (ISSCS). IEEE, Piscataway, pp 1\u20134","DOI":"10.1109\/ISSCS.2015.7204017"},{"issue":"3","key":"5117_CR35","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Su W (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"5117_CR36","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietik\u00e4inen M, M\u00e4enp\u00e4\u00e4 T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971\u2013987","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"21","key":"5117_CR37","doi-asserted-by":"crossref","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","volume":"74","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimedia Tools and Applications 74(21):9117\u20139139","journal-title":"Multimedia Tools and Applications"},{"key":"5117_CR38","first-page":"1","volume":"76","author":"SA Parah","year":"2016","unstructured":"Parah SA, Sheikh JA, Akhoon JA, Loan NA, Bhat GM (2016) Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimedia Tools and Applications 76:1\u201323","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"5117_CR39","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1016\/j.image.2014.09.008","volume":"29","author":"R Pourreza-Shahri","year":"2014","unstructured":"Pourreza-Shahri R, Yousefi S, Kehtarnavaz N (2014) A gradient-based optimization approach for reduction of blocking artifacts in jpeg images. Signal Process Image Commun 29(10):1079\u20131091","journal-title":"Signal Process Image Commun"},{"key":"5117_CR40","unstructured":"Powell RD, Nitzberg MJ (2000) Data hiding based on neighborhood attributes. US Patent 6,137,892"},{"issue":"15","key":"5117_CR41","doi-asserted-by":"crossref","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Hsu TJ (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 74(15):5861\u20135872","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"5117_CR42","doi-asserted-by":"crossref","first-page":"8627","DOI":"10.1007\/s11042-016-3501-4","volume":"76","author":"T Rabie","year":"2016","unstructured":"Rabie T, Kamel I (2016) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimedia Tools and Applications 76(6):8627\u20138650","journal-title":"Multimedia Tools and Applications"},{"key":"5117_CR43","first-page":"1","volume":"77","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I, Baziyad M (2017) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimedia Tools and Applications 77:1\u201332","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"5117_CR44","doi-asserted-by":"crossref","first-page":"3715","DOI":"10.1007\/s11042-016-3974-1","volume":"76","author":"JJ Ranjani","year":"2016","unstructured":"Ranjani JJ (2016) Data hiding using pseudo magic squares for embedding high payload in digital images. Multimedia Tools and Applications 76(3):3715\u20133729","journal-title":"Multimedia Tools and Applications"},{"key":"5117_CR45","doi-asserted-by":"crossref","unstructured":"Ren J, Liu J, Li M, Bai W, Guo Z (2013) Image blocking artifacts reduction via patch clustering and low-rank minimization. In: Data compression conference (DCC), 2013. IEEE, Piscataway, pp 516\u2013516","DOI":"10.1109\/DCC.2013.95"},{"key":"5117_CR46","unstructured":"Stanley CA (2005) Pairs of values and the chi-squared attack"},{"issue":"8","key":"5117_CR47","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"2","key":"5117_CR48","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11760-011-0229-5","volume":"7","author":"EE Varsaki","year":"2013","unstructured":"Varsaki EE, Fotopoulos V, Skodras AN (2013) Data hiding based on image texture classification. SIViP 7(2):247\u2013253","journal-title":"SIViP"},{"key":"5117_CR49","unstructured":"Wang Y, Yu Y (2008) An adaptive data hiding in wavelet domain based on texture analysis of image. In: ICALIP 2008. International conference on audio, language and image processing, 2008. IEEE, Piscataway, pp 1369\u20131372"},{"issue":"3","key":"5117_CR50","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"RZ Wang","year":"2001","unstructured":"Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recogn 34(3):671\u2013683","journal-title":"Pattern Recogn"},{"key":"5117_CR51","unstructured":"Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: International workshop on information hiding. Springer, Berlin, pp 61\u201376"},{"issue":"9","key":"5117_CR52","first-page":"1613","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"5","key":"5117_CR53","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1049\/ip-vis:20059022","volume":"152","author":"HC Wu","year":"2005","unstructured":"Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and lsb replacement methods. IEE Proceedings-Vision, Image and Signal Processing 152(5):611\u2013615","journal-title":"IEE Proceedings-Vision, Image and Signal Processing"},{"key":"5117_CR54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jisa.2015.08.003","volume":"26","author":"Q Wu","year":"2016","unstructured":"Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016) A magic cube based information hiding scheme of large payload. Journal of Information Security and Applications 26:1\u20137","journal-title":"Journal of Information Security and Applications"},{"issue":"8","key":"5117_CR55","doi-asserted-by":"crossref","first-page":"2674","DOI":"10.1016\/j.patcog.2008.01.019","volume":"41","author":"CH Yang","year":"2008","unstructured":"Yang CH (2008) Inverted pattern approach to improve image quality of information hiding by lsb substitution. Pattern Recogn 41(8):2674\u20132683","journal-title":"Pattern Recogn"},{"issue":"11","key":"5117_CR56","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/LSP.2007.903255","volume":"14","author":"W Zhang","year":"2007","unstructured":"Zhang W, Zhang X, Wang S (2007) A double layered plus-minus one data embedding scheme. IEEE Signal Process Lett 14(11):848\u2013851","journal-title":"IEEE Signal Process Lett"},{"issue":"3","key":"5117_CR57","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1109\/TIT.2009.2039087","volume":"56","author":"W Zhang","year":"2010","unstructured":"Zhang W, Zhang X, Wang S (2010) Near-optimal codes for information embedding in gray-scale signals. IEEE Trans Inf Theory 56(3):1262\u20131270","journal-title":"IEEE Trans Inf Theory"},{"issue":"10","key":"5117_CR58","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1016\/j.aeue.2011.01.014","volume":"65","author":"Z Zhao","year":"2011","unstructured":"Zhao Z, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int J Electron C 65 (10):814\u2013826","journal-title":"AEU-Int J Electron C"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5117-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5117-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5117-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T07:00:44Z","timestamp":1529996444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5117-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,6]]},"references-count":58,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["5117"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5117-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,6]]}}}