{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:24:49Z","timestamp":1773213889002,"version":"3.50.1"},"reference-count":65,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11042-018-5713-2","type":"journal-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T13:37:49Z","timestamp":1517492269000},"page":"23673-23698","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4003-1592","authenticated-orcid":false,"given":"Tamer","family":"Rabie","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Baziyad","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Kamel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,1]]},"reference":[{"issue":"6","key":"5713_CR1","first-page":"33","volume":"29","author":"EH Adelson","year":"1984","unstructured":"Adelson EH, Anderson CH, Bergen JR, Burt PJ, Ogden JM (1984) Pyramid methods in image processing. RCA Eng 29(6):33\u201341","journal-title":"RCA Eng"},{"issue":"3","key":"5713_CR2","first-page":"214","volume":"16","author":"M Amin","year":"2014","unstructured":"Amin M, Abdullkader HM, Ibrahem HM, Sakr AS (2014) A steganographic method based on dct and new quantization technique. IJ Netw Secur 16(3):214\u2013219","journal-title":"IJ Netw Secur"},{"issue":"4","key":"5713_CR3","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson RJ, Petitcolas FA (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474\u2013481","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"5713_CR4","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221\u2013229","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"5713_CR5","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1007\/s11042-013-1640-4","volume":"73","author":"C Balasubramanian","year":"2014","unstructured":"Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed Tools Appl 73(3):2223\u20132245","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"5713_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.5121\/ijsptm.2014.3102","volume":"3","author":"D Bandyopadhyay","year":"2014","unstructured":"Bandyopadhyay D, Dasgupta K, Mandal J, Dutta P (2014) A novel secure image steganography method based on chaos theory in spatial domain. Int J Secur Privacy Trust Manag (IJSPTM) 3(1):11\u201322","journal-title":"Int J Secur Privacy Trust Manag (IJSPTM)"},{"key":"5713_CR7","first-page":"102","volume":"10","author":"MJ Bawaneh","year":"2014","unstructured":"Bawaneh MJ (2014) A novel approach for image steganography using LCG. Int J Comput Appl 10:102","journal-title":"Int J Comput Appl"},{"issue":"7","key":"5713_CR8","first-page":"27","volume":"4","author":"S Bhattacharyya","year":"2012","unstructured":"Bhattacharyya S, Sanyal G (2012) A robust image steganography using dwt difference modulation (dwtdm). Int J Comput Netw Inf Secur 4(7):27","journal-title":"Int J Comput Netw Inf Secur"},{"key":"5713_CR9","unstructured":"Bhattacharyya S, Sanyal G, Majumdar A (2009) An image based steganography model for promoting global cyber security. In: Proceedings of international conference on systemics, cybernetics and informatics, Hyderabad, India"},{"issue":"6","key":"5713_CR10","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1049\/ip-vis:20045047","volume":"152","author":"G Brisbane","year":"2005","unstructured":"Brisbane G, Aini RS-N, Ogunbona P (2005) High-capacity steganography using a shared colour palette. IEE Proc Vis Image Signal Process 152(6):787\u2013792","journal-title":"IEE Proc Vis Image Signal Process"},{"issue":"4","key":"5713_CR11","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TCOM.1983.1095851","volume":"31","author":"P Burt","year":"1983","unstructured":"Burt P, Adelson E (1983) The laplacian pyramid as a compact image code. IEEE Trans Commun 31(4):532\u2013540","journal-title":"IEEE Trans Commun"},{"key":"5713_CR12","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in dct-based compressed images. Inf Sci 177:2768\u20132786","journal-title":"Inf Sci"},{"key":"5713_CR13","doi-asserted-by":"publisher","unstructured":"Chauhan DS, Singh AK, Kumar B, Saini J (2017) Quantization based multiple medical information watermarking for secure e-health. Multimed Tools Appl 1\u201313. https:\/\/doi.org\/10.1007\/s11042-017-4886-4","DOI":"10.1007\/s11042-017-4886-4"},{"issue":"4","key":"5713_CR14","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423\u20131443","journal-title":"IEEE Trans Inf Theory"},{"key":"5713_CR15","volume-title":"Hiding in plain sight: steganography and the art of covert communication, 1st edn","author":"E Cole","year":"2003","unstructured":"Cole E (2003) Hiding in plain sight: steganography and the art of covert communication, 1st edn. Wiley, New York"},{"issue":"2","key":"5713_CR16","first-page":"1","volume":"2","author":"K Curran","year":"2003","unstructured":"Curran K, Bailey K (2003) An evaluation of image based steganography methods. Int J Digit Evid 2(2):1\u201340","journal-title":"Int J Digit Evid"},{"key":"5713_CR17","doi-asserted-by":"crossref","unstructured":"Fontaine C (2011) Linear congruential generator. Encyclopedia of Cryptography and Security, pp 721\u2013721","DOI":"10.1007\/978-1-4419-5906-5_354"},{"issue":"6","key":"5713_CR18","doi-asserted-by":"publisher","first-page":"1898","DOI":"10.1016\/j.cnsns.2013.10.014","volume":"19","author":"M Ghebleh","year":"2014","unstructured":"Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898\u20131907","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"5713_CR19","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.compeleceng.2015.04.014","volume":"46","author":"J Hu","year":"2015","unstructured":"Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447\u2013455","journal-title":"Comput Electr Eng"},{"issue":"12","key":"5713_CR20","doi-asserted-by":"publisher","first-page":"3322","DOI":"10.1109\/TBME.2013.2264539","volume":"60","author":"A Ibaida","year":"2013","unstructured":"Ibaida A, Khalil I (2013) Wavelet-based ecg steganography for protecting patient confidential information in point-of-care systems. IEEE Trans Biomed Eng 60(12):3322\u20133330","journal-title":"IEEE Trans Biomed Eng"},{"issue":"4","key":"5713_CR21","first-page":"929","volume":"E87-A","author":"M Iwata","year":"2004","unstructured":"Iwata M, Miyake K, Shiozaki A (2004) Digital steganography utilizing features of jpeg images. IEICE Trans Fundam E87-A(4):929\u2013936","journal-title":"IEICE Trans Fundam"},{"issue":"3","key":"5713_CR22","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1049\/ip-vis:20000341","volume":"147","author":"Y Lee","year":"2000","unstructured":"Lee Y, Chen L (2000) High capacity image steganographic model. IEE Proc Vis Image Signal Process 147(3):288\u2013294","journal-title":"IEE Proc Vis Image Signal Process"},{"issue":"13","key":"5713_CR23","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.patrec.2010.01.019","volume":"31","author":"P-Y Lin","year":"2010","unstructured":"Lin P-Y, Chan C-S (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31(13):1887\u20131893","journal-title":"Pattern Recogn Lett"},{"key":"5713_CR24","doi-asserted-by":"crossref","unstructured":"Lin CC, Shiu PF (2009) Dct-based reversible data hiding scheme. In: Proceedings of the 3rd international conference on ubiquitous information management and communication (ICUIMC09), pp 327\u2013335","DOI":"10.1145\/1516241.1516298"},{"issue":"3","key":"5713_CR25","first-page":"220","volume":"1","author":"C-C Lin","year":"2010","unstructured":"Lin C-C, Shiu P-F (2010) High capacity data hiding scheme for dct-based images. J Inf Hiding Multimed Signal Process 1(3):220\u2013240","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"3","key":"5713_CR26","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1093\/ietisy\/e91-d.3.836","volume":"91-D","author":"CY Lin","year":"2008","unstructured":"Lin CY, Chang CC, Wang YZ (2008) Reversible steganographic method with high payload for jpeg images. IEICE Trans Inf Syst 91-D(3):836\u2013845","journal-title":"IEICE Trans Inf Syst"},{"key":"5713_CR27","unstructured":"Morkel T, Eloff JH, Olivier MS (2005) An overview of image steganography. In: ISSA, pp 1\u201311"},{"issue":"7","key":"5713_CR28","first-page":"5","volume":"5","author":"M Padmaa","year":"2010","unstructured":"Padmaa M, Venkataramani Y (2010) Zig-zag pvd\u2013a nontraditional approach. Int J Comput Appl 5(7):5\u201310","journal-title":"Int J Comput Appl"},{"issue":"22","key":"5713_CR29","doi-asserted-by":"publisher","first-page":"14381","DOI":"10.1007\/s11042-016-3536-6","volume":"75","author":"R Pandey","year":"2016","unstructured":"Pandey R, Singh A K, Kumar B, Mohan A (2016) Iris based secure nroi multiple eye image watermarking for teleophthalmology. Multimed Tools Appl 75(22):14381\u201314397","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"5713_CR30","first-page":"75","volume":"2","author":"M Parul","year":"2014","unstructured":"Parul M, Rohil DH (2014) Optimized image steganography using discrete wavelet transform (dwt). Int J Recent Dev Eng Technol 2(2):75\u201381","journal-title":"Int J Recent Dev Eng Technol"},{"issue":"7","key":"5713_CR31","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding\u2014a survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"issue":"1","key":"5713_CR32","first-page":"114","volume":"2007","author":"J-C Pinoli","year":"2007","unstructured":"Pinoli J-C, Debayle J (2007) Logarithmic adaptive neighborhood image processing (lanip): introduction, connections to human brightness perception, and application issues. EURASIP J Appl Signal Process 2007(1):114\u2013114","journal-title":"EURASIP J Appl Signal Process"},{"key":"5713_CR33","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","volume":"31","author":"C Qin","year":"2015","unstructured":"Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154\u2013164","journal-title":"J Vis Commun Image Represent"},{"issue":"7","key":"5713_CR34","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2013","unstructured":"Qin C, Chang C-C, Huang Y-H, Liao L-T (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109\u20131118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"15","key":"5713_CR35","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861\u20135872","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"5713_CR36","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.1007\/s11042-013-1733-0","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang C-C, Lin C-C (2015) An adaptive reversible steganographic scheme based on the just noticeable distortion. Multimed Tools Appl 74(6):1983\u20131995","journal-title":"Multimed Tools Appl"},{"key":"5713_CR37","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.ins.2016.04.036","volume":"361","author":"C Qin","year":"2016","unstructured":"Qin C, Chen X, Ye D, Wang J, Sun X (2016) A novel image hashing scheme with perceptual robustness using block truncation coding. Inf Sci 361:84\u201399","journal-title":"Inf Sci"},{"key":"5713_CR38","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280\u2013293","journal-title":"Signal Process"},{"issue":"3","key":"5713_CR39","first-page":"298","volume":"1","author":"T Rabie","year":"2007","unstructured":"Rabie T (2007) Frequency-domain data hiding based on the matryoshka principle. Special Issue on Advances in Video Processing and Security Analysis for Multimedia Communications, Int J Adv Media Commun 1(3):298\u2013312","journal-title":"Special Issue on Advances in Video Processing and Security Analysis for Multimedia Communications, Int J Adv Media Commun"},{"key":"5713_CR40","unstructured":"Rabie T (2012) Digital image steganography: an fft approach 4th international conference on networked digital technologies (NDT). Springer, Berlin, pp 217\u2013230"},{"key":"5713_CR41","doi-asserted-by":"crossref","unstructured":"Rabie T (2013) High-capacity steganography. In: 6th international congress on image and signal processing (CISP), vol 2, pp 858\u2013863","DOI":"10.1109\/CISP.2013.6745285"},{"key":"5713_CR42","doi-asserted-by":"crossref","unstructured":"Rabie T, BaziyadM, Bonny T (2018) Toward a unified performance measure for steganography systems. Multimed Tools Appl, submitted","DOI":"10.1142\/S0218126620500425"},{"key":"5713_CR43","doi-asserted-by":"publisher","unstructured":"Rabie T, Baziyad M (2017) Visual fidelity without sacrificing capacity: an adaptive laplacian pyramid approach to information hiding. J Electron Imaging 26(6). https:\/\/doi.org\/10.1117\/1.JEI.26.6.063001","DOI":"10.1117\/1.JEI.26.6.063001"},{"issue":"10","key":"5713_CR44","doi-asserted-by":"publisher","first-page":"5939","DOI":"10.1007\/s11042-015-2557-x","volume":"75","author":"T Rabie","year":"2016","unstructured":"Rabie T, Kamel I (2016) On the embedding limits of the discrete cosine transform. Multimed Tools Appl 75(10):5939\u20135957","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"5713_CR45","doi-asserted-by":"publisher","first-page":"6473","DOI":"10.1007\/s11042-016-3301-x","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76(5):6473\u20136493","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"5713_CR46","doi-asserted-by":"publisher","first-page":"8627","DOI":"10.1007\/s11042-016-3501-4","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimed Tools Appl 76(6):8627\u20138650","journal-title":"Multimed Tools Appl"},{"key":"5713_CR47","doi-asserted-by":"publisher","unstructured":"Rabie T, Kamel I, Baziyad M (2017) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-017-4727-5","DOI":"10.1007\/s11042-017-4727-5"},{"issue":"3","key":"5713_CR48","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1007\/s11277-015-2505-0","volume":"83","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in dwt domain. Wirel Pers Commun 83(3):2133\u20132150","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"5713_CR49","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1166\/jmihi.2015.1407","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain. J Med Imaging Health Inform 5(2):406\u2013414","journal-title":"J Med Imaging Health Inform"},{"issue":"3","key":"5713_CR50","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1166\/jmihi.2015.1432","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Inform 5(3):607\u2013614","journal-title":"J Med Imaging Health Inform"},{"issue":"14","key":"5713_CR51","doi-asserted-by":"publisher","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","volume":"75","author":"AK Singh","year":"2016","unstructured":"Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381\u20138401","journal-title":"Multimed Tools Appl"},{"key":"5713_CR52","doi-asserted-by":"publisher","unstructured":"Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. Future Generat Comput Syst, Elsevier. https:\/\/doi.org\/10.1016\/j.future.2016.11.023","DOI":"10.1016\/j.future.2016.11.023"},{"issue":"8","key":"5713_CR53","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/31.1856","volume":"35","author":"W-J Song","year":"1988","unstructured":"Song W-J, Pearlman W (1988) Edge-preserving noise filtering based on adaptive windowing. IEEE Trans Circ Syst 35(8):1048\u20131055","journal-title":"IEEE Trans Circ Syst"},{"issue":"2","key":"5713_CR54","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s00530-014-0446-1","volume":"22","author":"RC Streijl","year":"2016","unstructured":"Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (mos) revisited: methods and applications, limitations and alternatives. Multimed Syst 22(2):213\u2013227","journal-title":"Multimed Syst"},{"issue":"3","key":"5713_CR55","first-page":"219","volume":"5","author":"G Swain","year":"2014","unstructured":"Swain G, Lenka SK (2014) Classification of image steganography techniques in spatial domain: a study. Int J Comput Sci Eng Tech (IJCSET) 5(3):219\u2013232","journal-title":"Int J Comput Sci Eng Tech (IJCSET)"},{"issue":"15","key":"5713_CR56","doi-asserted-by":"publisher","first-page":"3972","DOI":"10.1016\/j.ijleo.2014.01.149","volume":"125","author":"M Tang","year":"2014","unstructured":"Tang M, Hu J, Song W (2014) A high capacity image steganography using multi-layer embedding. Optik-Int J Light Electron Opt 125(15):3972\u20133976","journal-title":"Optik-Int J Light Electron Opt"},{"issue":"4","key":"5713_CR57","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"5713_CR58","doi-asserted-by":"crossref","unstructured":"Yang B, Schmucker M, Funk W, Busch C, Sun S (2004) Integer DCT-based reversible watermarking for images using companding technique. In: Security, steganography, and watermarking of multimedia contents VI, vol 5306, pp 405\u2013416. International Society for Optics and Photonics","DOI":"10.1117\/12.527216"},{"issue":"2","key":"5713_CR59","first-page":"2","volume":"1","author":"W Yu","year":"2015","unstructured":"Yu W (2015) The lsb-based high payload information steganography. Methods 1(2):2","journal-title":"Methods"},{"key":"5713_CR60","doi-asserted-by":"publisher","unstructured":"Zear A, Singh AK, Kumar P (2016) A proposed secure multiple watermarking technique based on dwt, dct and svd for application in medicine. Multimed Tools Appl 1\u201320. https:\/\/doi.org\/10.1007\/s11042-016-3862-8","DOI":"10.1007\/s11042-016-3862-8"},{"key":"5713_CR61","doi-asserted-by":"crossref","unstructured":"Zear A, Singh AK, Kumar P (2018) Multiple watermarking for healthcare applications. J Intell Syst","DOI":"10.1515\/jisys-2016-0036"},{"issue":"1\u20132","key":"5713_CR62","first-page":"20","volume":"9","author":"A Zear","year":"2017","unstructured":"Zear A, Singh AK, Kumar P (2017) Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications. Int J Inf Comput Secur 9(1\u20132):20\u201335","journal-title":"Int J Inf Comput Secur"},{"issue":"8","key":"5713_CR63","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TIP.2011.2109730","volume":"20","author":"L Zhang","year":"2011","unstructured":"Zhang L, Zhang L, Mou X, Zhang D (2011) Fsim: a feature similarity index for image quality assessment. IEEE Trans Image Process 20(8):2378\u20132386","journal-title":"IEEE Trans Image Process"},{"key":"5713_CR64","unstructured":"Zhang X, Sun Z, Tang Z, Yu C, Wang X (2016) High capacity data hiding based on interpolated image. Multimed Tools Appl 76(7):9195\u20139218"},{"key":"5713_CR65","first-page":"19","volume-title":"Development trends in steganography, vol 15","author":"E Zieli\u0144ska","year":"2011","unstructured":"Zieli\u0144ska E, Mazurczyk W, Szczypiorski K (2011) Development trends in steganography, vol 15. Warsaw University of Technology, Institute of Telecommunications Warsaw, Poland, p 19"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5713-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5713-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5713-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T22:19:52Z","timestamp":1603750792000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5713-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,1]]},"references-count":65,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["5713"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5713-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,1]]},"assertion":[{"value":"25 May 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}