{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:40:57Z","timestamp":1770270057191,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T00:00:00Z","timestamp":1532390400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6444-0","type":"journal-article","created":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T03:07:25Z","timestamp":1532401645000},"page":"7965-7980","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":85,"title":["A novel coverless information hiding method based on the average pixel value of the sub-images"],"prefix":"10.1007","volume":"78","author":[{"given":"Liming","family":"Zou","sequence":"first","affiliation":[]},{"given":"Jiande","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Min","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Brij Bhooshan","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,24]]},"reference":[{"issue":"2","key":"6444_CR1","first-page":"197","volume":"54","author":"Y Cao","year":"2018","unstructured":"Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. CMC: Comput Mater Continua 54(2):197\u2013207","journal-title":"CMC: Comput Mater Continua"},{"issue":"1","key":"6444_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jvcir.2008.08.005","volume":"20","author":"CC Chang","year":"2009","unstructured":"Chang CC, Kieu TD, Chou YC (2009) Reversible information hiding for VQ indices based on locally adaptive coding[J]. J Vis Commun Image Represent 20(1):57\u201364","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"6444_CR3","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K et al (2010) Review: digital image steganography: survey and analysis of current methods[J]. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"issue":"1","key":"6444_CR4","first-page":"432","volume":"185","author":"WY Chen","year":"2007","unstructured":"Chen WY (2007) Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation[J]. Appl Math Comput 185(1):432\u2013448","journal-title":"Appl Math Comput"},{"key":"6444_CR5","unstructured":"Cox IJ, Miller ML (2002) The First 50 Years of Electronic Watermarking. J Appl Sign Proc (2): 126\u2013132"},{"issue":"12","key":"6444_CR6","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","volume":"10","author":"L Guo","year":"2015","unstructured":"Guo L, Ni J, Su W et al (2015) Using statistical image model for JPEG steganography: uniform embedding revisited[J]. IEEE Trans Info Forensic Sec 10(12):2669\u20132680","journal-title":"IEEE Trans Info Forensic Sec"},{"key":"6444_CR7","unstructured":"Hirohisa H (2002) A data embedding method using BPCS principle with new complexity measures[J]"},{"issue":"2","key":"6444_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen[J]. Computer 31(2):26\u201334","journal-title":"Computer"},{"key":"6444_CR9","first-page":"289","volume-title":"Lecture Notes in Computer Science","author":"Eiji Kawaguchi","year":"2005","unstructured":"Kawaguchi E (2005) BPCS-Steganography \u2013 Principle and Applications[C]\/\/ International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer Berlin Heidelberg 289\u2013299"},{"key":"6444_CR10","unstructured":"Ker AD (2004) Improved detection of LSB steganography in grayscale images[C]\/\/ International Conference on Information Hiding. Springer-Verlag 97\u2013115"},{"issue":"6","key":"6444_CR11","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"AD Ker","year":"2005","unstructured":"Ker AD (2005) Steganalysis of LSB matching in grayscale images[J]. IEEE Sign Proc Lett 12(6):441\u2013444","journal-title":"IEEE Sign Proc Lett"},{"issue":"15","key":"6444_CR12","doi-asserted-by":"publisher","first-page":"3099","DOI":"10.1016\/j.ins.2007.02.008","volume":"177","author":"X Li","year":"2007","unstructured":"Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177(15):3099\u20133109","journal-title":"Inf Sci"},{"issue":"1","key":"6444_CR13","first-page":"588","volume":"1","author":"Z Li","year":"2009","unstructured":"Li Z, Chen X, Pan X et al (2009) Lossless data hiding scheme based on adjacent pixel difference[J]. IEEE 1(1):588\u2013592","journal-title":"IEEE"},{"issue":"5","key":"6444_CR14","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TMM.2008.922795","volume":"10","author":"W Lin","year":"2008","unstructured":"Lin W, Horng S, Kao T (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746\u2013757","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"6444_CR15","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Trans Info Forensic Sec 5(2):201\u2013214","journal-title":"IEEE Trans Info Forensic Sec"},{"key":"6444_CR16","unstructured":"Ma Y, Luo X, Li X, et al. (2018) Selection of Rich Model Steganalysis Features Based on Decision Rough Set \u4f2a-Positive Region Reduction[J]. IEEE Trans Circuits Syst Video Technol (99):1\u20131"},{"key":"6444_CR17","unstructured":"Mckeon RT (2007) Strange fourier steganography in movies[C]\/\/ IEEE International Conference on Electro\/information Technology. IEEE 178\u2013182"},{"issue":"1","key":"6444_CR18","first-page":"1","volume":"55","author":"R Meng","year":"2018","unstructured":"Meng R, Steven G, Wang J, Sun X (2018) A fusion Steganographic algorithm based on faster R-CNN. CMC: Comput Mater Continua 55(1):1\u201316","journal-title":"CMC: Comput Mater Continua"},{"issue":"5","key":"6444_CR19","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited[J]. IEEE Sign Proc Lett 13(5):285\u2013287","journal-title":"IEEE Sign Proc Lett"},{"key":"6444_CR20","first-page":"650503","volume":"3","author":"T Pevny","year":"2013","unstructured":"Pevny T, Fridrich J (2013) Merging Markov and DCT features for multi-class JPEG steganalysis. Proc SPIE - Int Soc Opt Eng 3:650503\u2013650503","journal-title":"Proc SPIE - Int Soc Opt Eng"},{"key":"6444_CR21","doi-asserted-by":"publisher","first-page":"2952","DOI":"10.1109\/ACCESS.2017.2786271","volume":"6","author":"X Ren","year":"2018","unstructured":"Ren X, Zheng Y, Zhao Y et al (2018) Drusen segmentation from retinal images via supervised feature learning. IEEE Acces 6:2952\u20132961","journal-title":"IEEE Acces"},{"key":"6444_CR22","unstructured":"Wan W, Liu J, Sun J, et al. (2013) Logarithmic spread-transform dither modulation watermarking based on perceptual model[C]\/\/Image Processing (ICIP), 2013 20th IEEE International Conference on. IEEE 4522\u20134526"},{"issue":"10","key":"6444_CR23","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1049\/el.2014.4329","volume":"51","author":"W Wan","year":"2015","unstructured":"Wan W, Liu J, Sun J et al (2015) Logarithmic STDM watermarking using visual saliency-based JND model[J]. Electron Lett 51(10):758\u2013760","journal-title":"Electron Lett"},{"issue":"22","key":"6444_CR24","doi-asserted-by":"publisher","first-page":"23721","DOI":"10.1007\/s11042-016-4153-0","volume":"76","author":"J Wang","year":"2017","unstructured":"Wang J, Li T, Shi YQ et al (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics[J]. Multimed Tools Appl 76(22):23721\u201323737","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"6444_CR25","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1049\/ip-vis:20059022","volume":"152","author":"HC Wu","year":"2005","unstructured":"Wu HC, Wu NI, Tsai CS et al (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods[J]. Vision, Image Sign Proc IEE Proc 152(5):611\u2013615","journal-title":"Vision, Image Sign Proc IEE Proc"},{"issue":"8","key":"6444_CR26","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1002\/sec.864","volume":"7","author":"Z Xia","year":"2014","unstructured":"Xia Z, Wang X, Sun X et al (2014) Steganalysis of least significant bit matching using multi-order differences[J]. Sec Commun Netw 7(8):1283\u20131291","journal-title":"Sec Commun Netw"},{"issue":"4","key":"6444_CR27","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels[J]. Multimed Tools Appl 75(4):1947\u20131962","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"6444_CR28","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","volume":"3","author":"C Yang","year":"2008","unstructured":"Yang C, Weng C, Wang S (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans Info Forensic Sec 3(3):488\u2013497","journal-title":"IEEE Trans Info Forensic Sec"},{"key":"6444_CR29","unstructured":"Yuan C, Xia Z, Sun X (2017) Coverless Image Steganography Based on SIFT and BOF[J]. Internet J Technol 18"},{"key":"6444_CR30","unstructured":"Yuan Z, Guan Z, Feng H (2017) An improved information hiding algorithm based on image[C]\/\/ IEEE, International Conference on Software Engineering Research, Management and Applications. IEEE 169\u2013172"},{"key":"6444_CR31","unstructured":"Zhang J, Shen J, Wang L et al. (2016) Coverless Text Information Hiding Method Based on the Word Rank Map[M]\/\/ Cloud Computing and Security. Springer International Publishing 145\u2013155"},{"key":"6444_CR32","doi-asserted-by":"crossref","unstructured":"Zhang Y, Qin C, Zhang W, et al. (2018) On the Fault-tolerant Performance for a Class of Robust Image Steganography[J]. Signal Processing","DOI":"10.1016\/j.sigpro.2018.01.011"},{"key":"6444_CR33","doi-asserted-by":"crossref","unstructured":"Zheng S, Wang L, Ling B (2017) Coverless Information Hiding Based on Robust Image Hashing. Int Conf Cloud Comput Sec 536\u2013547","DOI":"10.1007\/978-3-319-63315-2_47"},{"key":"6444_CR34","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","volume-title":"Cloud Computing and Security","author":"Zhili Zhou","year":"2015","unstructured":"Zhou Z, Sun H, Harit R, et al. (2015) Coverless Image Steganography Without Embedding[C]\/\/ International Conference on Cloud Computing and Security. Springer, Cham 123\u2013132"},{"issue":"1","key":"6444_CR35","first-page":"151","volume":"55","author":"Q Zhou","year":"2018","unstructured":"Zhou Q, Qiu Y, Li L, Lu J et al (2018) Steganography using reversible texture synthesis based on seeded region growing and LSB. CMC: Comput Mater Continua 55(1):151\u2013163","journal-title":"CMC: Comput Mater Continua"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6444-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6444-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6444-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T23:35:31Z","timestamp":1563924931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6444-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,24]]},"references-count":35,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6444"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6444-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,24]]},"assertion":[{"value":"21 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}