{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T18:36:46Z","timestamp":1772217406136,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T00:00:00Z","timestamp":1527120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T00:00:00Z","timestamp":1527120000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11042-018-6126-y","type":"journal-article","created":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T19:29:51Z","timestamp":1527190191000},"page":"30403-30418","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["High payload image steganography based on Laplacian of Gaussian (LoG) edge detector"],"prefix":"10.1007","volume":"77","author":[{"given":"S. K.","family":"Ghosal","sequence":"first","affiliation":[]},{"given":"J. K.","family":"Mandal","sequence":"additional","affiliation":[]},{"given":"R.","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,24]]},"reference":[{"issue":"3\u20134","key":"6126_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3\u20134):313\u2013336","journal-title":"IBM Syst J"},{"issue":"1","key":"6126_CR2","doi-asserted-by":"publisher","DOI":"10.1186\/1687-417X-2009-658047","volume":"2009","author":"RM Chao","year":"2009","unstructured":"Chao RM, Wu HC, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009(1):658047","journal-title":"EURASIP J Inf Secur"},{"key":"6126_CR3","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.image.2014.01.003","volume":"29","author":"J Chen","year":"2014","unstructured":"Chen J (2014) A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Process Image Commun 29:375\u2013384","journal-title":"Signal Process Image Commun"},{"key":"6126_CR4","doi-asserted-by":"crossref","unstructured":"Chen KN, Chang CC, Lin HC (2010) A large payload EMD embedding scheme with high stego-image quality. Proc of IEEE Int Conf Comput Aspects Soc Netw (CASoN):126\u2013130","DOI":"10.1109\/CASoN.2010.35"},{"key":"6126_CR5","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1016\/j.eswa.2009.09.050","volume":"37","author":"WJ Chen","year":"2010","unstructured":"Chen WJ, Chang CC, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292\u20133301","journal-title":"Expert Syst Appl"},{"key":"6126_CR6","first-page":"44","volume":"50(C","author":"M Hussain","year":"2017","unstructured":"Hussain M, Wahid A, Wahab A, Ho ATS, Javed N, Jung K-H (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. J Image Comm 50(C:44\u201357","journal-title":"J Image Comm"},{"key":"6126_CR7","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1007\/s11042-014-2081-4","volume":"74","author":"K-H Jung","year":"2015","unstructured":"Jung K-H, Yoo K-Y (2015) High-capacity index based data hiding method. Multimed Tools Appl 74:2179\u20132193","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"6126_CR8","doi-asserted-by":"publisher","first-page":"10648","DOI":"10.1016\/j.eswa.2011.02.122","volume":"38","author":"TD Kieu","year":"2011","unstructured":"Kieu TD, Chang CC (2011) A steganographic scheme by fully exploiting modification directions. Expert Syst Appl 38(8):10648\u201310657","journal-title":"Expert Syst Appl"},{"issue":"2","key":"6126_CR9","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.camwa.2010.01.006","volume":"60","author":"HJ Kim","year":"2010","unstructured":"Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction methods. Comput Math Appl 60(2):319\u2013325","journal-title":"Comput Math Appl"},{"issue":"3","key":"6126_CR10","first-page":"420","volume":"5","author":"WC Kuo","year":"2014","unstructured":"Kuo WC, Chang SY (2014) Hybrid GEMD Data Hiding. J Info Hiding Multimed Sign Proc 5(3):420\u2013430","journal-title":"J Info Hiding Multimed Sign Proc"},{"issue":"6","key":"6126_CR11","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1179\/1743131X12Y.0000000011","volume":"61","author":"WC Kuo","year":"2013","unstructured":"Kuo WC, Wang CC (2013) Data hiding based on generalized exploiting modification direction method. Imaging Sci 61(6):484\u2013490","journal-title":"Imaging Sci"},{"key":"6126_CR12","first-page":"497","volume":"1","author":"CF Lee","year":"2007","unstructured":"Lee CF, Wang YR, Chang CC (2007) A steganographic method with high embedding capacity by improving exploiting modification direction. Proc 3rd Int Conf Intel Info Hiding Mult Sign Proc Kaohsiung 1:497\u2013500","journal-title":"Proc 3rd Int Conf Intel Info Hiding Mult Sign Proc Kaohsiung"},{"key":"6126_CR13","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1587\/transfun.E95.A.1189","volume":"95","author":"X Liao","year":"2012","unstructured":"Liao X, Qiaoyan W, Zhang J (2012) A novel Steganographic method with four-pixel differencing and exploiting modification direction. IEICE Trans Fundam Electron Commun Comput Sci 95:1189\u20131192","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"6126_CR14","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","volume":"48","author":"S-Y Shen","year":"2015","unstructured":"Shen S-Y, Huang L-H (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Security 48:131\u2013141","journal-title":"Comput Security"},{"key":"6126_CR15","unstructured":"Shen S.-Y., Huang L.-H., and Wu S.-S. (2017) A novel adaptive data hiding based on improved EMD and interpolation, Multimed Tools Appl 1-17. doi:101007\/s11042-017-4905-5"},{"key":"6126_CR16","unstructured":"Sonka, M., Hlavac, V., & Boyle, R. (1999). Image processing, analysis, and machine vision. Thomson Brooks\/Cole"},{"key":"6126_CR17","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1049\/iet-ipr.2013.0584","volume":"8","author":"HW Tseng","year":"2014","unstructured":"Tseng HW, Leng HS (2014) High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process 8:647\u2013654","journal-title":"IET Image Process"},{"key":"6126_CR18","unstructured":"Weber A. G. (2014) The USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. http:\/\/sipi.usc.edu\/database\/ (accessed on 23rd September, 2014)"},{"issue":"9\u201310","key":"6126_CR19","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D-C Wu","year":"2003","unstructured":"Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9\u201310):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"4","key":"6126_CR20","first-page":"836","volume":"7","author":"B-B Xia","year":"2016","unstructured":"Xia B-B, Wang A-H, Chang C-C, Liu L (2016) An Image Steganography Scheme Using 3D-Sudoku. J Info Hiding Multimed Sign Proc 7(4):836\u2013845","journal-title":"J Info Hiding Multimed Sign Proc"},{"key":"6126_CR21","doi-asserted-by":"crossref","unstructured":"Xie, X.; Livermore, C. (2016) A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach. In Proceedings of the IEEE 29th International Conference on Micro Electro Mechanical Systems (MEMS), Shanghai, China, 75\u201378","DOI":"10.1109\/MEMSYS.2016.7421561"},{"key":"6126_CR22","doi-asserted-by":"crossref","unstructured":"Xie, X.; Livermore, C (2017) Passively self-aligned assembly of compact barrel hinges for high-performance, outof-plane mems actuators. In Proceedings of the 2017 IEEE 30th international conference on micro electro mechanical systems (MEMS), Las Vegas, pp. 813\u2013816","DOI":"10.1109\/MEMSYS.2017.7863532"},{"issue":"12","key":"6126_CR23","doi-asserted-by":"publisher","first-page":"125014","DOI":"10.1088\/0960-1317\/24\/12\/125014","volume":"24","author":"X Xie","year":"2014","unstructured":"Xie X, Zaitsev Y, Velasquez-Garcia L, Teller S, Livermore C (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24(12):125014. https:\/\/doi.org\/10.1088\/0960-1317\/24\/12\/125014","journal-title":"J Micromech Microeng"},{"key":"6126_CR24","unstructured":"Xie, X., Zaitsev, Y., Velasquez-Garcia, L., Teller, S., & Livermore, C. (2014) Compact, scalable, high-resolution, MEMS-enabled tactile displays, In Proc. of solid-state sensors, actuators, and microsystems workshop, pp. 127\u2013130"},{"issue":"11","key":"6126_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LCOMM.2006.253292","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):1\u20133","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6126-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6126-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6126-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T11:49:52Z","timestamp":1612439392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6126-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,24]]},"references-count":25,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["6126"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6126-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,24]]},"assertion":[{"value":"28 August 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}