{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T08:45:59Z","timestamp":1768725959015,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11042-019-07772-1","type":"journal-article","created":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T05:10:08Z","timestamp":1559711408000},"page":"4057-4074","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Enhanced imperialist competitive algorithm based efficient reversible data hiding technique"],"prefix":"10.1007","volume":"79","author":[{"given":"K. R.","family":"Prabha","sequence":"first","affiliation":[]},{"given":"M.","family":"Jagadeeswari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"issue":"9","key":"7772_CR1","first-page":"938","volume":"6","author":"P Bansal","year":"2007","unstructured":"Bansal P, Dev A, Jain SB (2007) Automatic speaker identification using vector quantization. Asian Journal of Information Technology 6(9):938\u2013942","journal-title":"Asian Journal of Information Technology"},{"key":"7772_CR2","unstructured":"Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur (1):658047"},{"key":"7772_CR3","unstructured":"Goswami RG, Tamrakar S (2013) Evolution of Data Hiding by Neural Network and Retrieval or Encrypted Image, Text, Audio and Video Files. International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 5"},{"issue":"10","key":"7772_CR4","doi-asserted-by":"publisher","first-page":"5087","DOI":"10.1109\/TIP.2018.2851074","volume":"27","author":"D Hou","year":"2018","unstructured":"Hou D, Zhang W (2018) Reversible data hiding under inconsistent distortion metrics. in IEEE Transactions on Image Processing 27(10):5087\u20135099","journal-title":"in IEEE Transactions on Image Processing"},{"key":"7772_CR5","doi-asserted-by":"crossref","unstructured":"Huanga CT, Wanga WJ, Yangb CH, Wang SJ (2013) \u201cA scheme of reversible information hiding based on SMVQ\u201d, The Imaging Science Journal Vol 61, IMAG 141","DOI":"10.1179\/1743131X11Y.0000000031"},{"issue":"1","key":"7772_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TMM.2017.2723244","volume":"20","author":"R Jiang","year":"2017","unstructured":"Jiang R, Zhou H (2017) Reversible data hiding in encrypted 3D mesh models. in IEEE Transactions on Multimedia 20(1):55\u201367","journal-title":"in IEEE Transactions on Multimedia"},{"key":"7772_CR7","unstructured":"Kumar S, Garg N (2012) \"Integrated Data hiding and Lossless Image Compression based on SMVQ and Image Inpainting.\" International Journal of Science and Research (IJSR), Volume 3 Issue 6"},{"key":"7772_CR8","unstructured":"Kumar S, Garg N (2012) \"Integrated Data hiding and Lossless Image Compression based on SMVQ and Image Inpainting.\" International Journal of Science and Research (IJSR), Volume 3 Issue 6"},{"key":"7772_CR9","doi-asserted-by":"crossref","unstructured":"Laskar SA, Hemachandran K (2012) High Capacity data hiding using LSB Steganography and Encryption. International Journal of Database Management Systems (IJDMS) Vol 4","DOI":"10.5121\/ijdms.2012.4605"},{"issue":"4","key":"7772_CR10","doi-asserted-by":"publisher","first-page":"349","DOI":"10.4304\/jmm.6.4.349-358","volume":"6","author":"Y-C Lin","year":"2011","unstructured":"Lin Y-C, Li T-S (2011) Reversible image data hiding using quad-tree segmentation and histogram shifting. J Multimed 6(4):349\u2013358","journal-title":"J Multimed"},{"issue":"4","key":"7772_CR11","doi-asserted-by":"publisher","first-page":"433","DOI":"10.3390\/a5040433","volume":"5","author":"J-L Lin","year":"2012","unstructured":"Lin J-L, Tsai Y-H, Yu C-Y, Li M-S (2012) Interaction enhanced imperialist competitive algorithms. Algorithms 5(4):433\u2013448","journal-title":"Algorithms"},{"key":"7772_CR12","unstructured":"Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2004) Robust lossless image data hiding. IEEE International Conference on in Multimedia and Expo, vol. 3, pp. 2199\u20132202. IEEE"},{"key":"7772_CR13","unstructured":"Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2004) \"Robust lossless image data hiding.\" IEEE International Conference on in Multimedia and Expo, vol. 3, pp. 2199\u20132202. IEEE"},{"key":"7772_CR14","unstructured":"Nimse Madhuri S, Mahajan PM, Ahire DD (2014) \u201cA Reserving Room Approach for Reversible Data Hiding Algorithm before Encryption on Encrypted Digital Images\u201d International Journal of Innovative Research in Advanced Engineering (IJIRAE) Volume 1 Issue 10"},{"issue":"8","key":"7772_CR15","doi-asserted-by":"publisher","first-page":"3777","DOI":"10.1166\/jctn.2017.6673","volume":"14","author":"KR Prabha","year":"2017","unstructured":"Prabha KR, Jagadeeswari M (2017) An integrated reversible data hiding and compression using enhanced imperialist competitive algorithm optimized side-match vector quantization and modified FoE inpainting. Journal of Theoretical and Computational Nanoscience 14(8):3777\u20133786","journal-title":"Journal of Theoretical and Computational Nanoscience"},{"issue":"7","key":"7772_CR16","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","volume":"13","author":"P Puteaux","year":"2018","unstructured":"Puteaux P, Puech W (2018) An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images. in IEEE Transactions on Information Forensics and Security 13(7):1670\u20131681","journal-title":"in IEEE Transactions on Information Forensics and Security"},{"key":"7772_CR17","doi-asserted-by":"crossref","unstructured":"Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3)","DOI":"10.1109\/TIP.2013.2260760"},{"issue":"8","key":"7772_CR18","first-page":"511","volume":"9","author":"M Sathish","year":"2014","unstructured":"Sathish M, Sukumaran S (2014) Uncertain data retrieval using contour cluster vector technique in single dimensional database. Research Journal of Applied Sciences 9(8):511\u2013517","journal-title":"Research Journal of Applied Sciences"},{"issue":"1","key":"7772_CR19","first-page":"127","volume":"15","author":"H-W Tseng","year":"2004","unstructured":"Tseng H-W, Chang C-C (2004) High capacity data hiding in JPEG-compressed images. Informatica, Lith Acad Sci 15(1):127\u2013142","journal-title":"Informatica, Lith Acad Sci"},{"issue":"4","key":"7772_CR20","first-page":"120","volume":"2","author":"V Tyagi","year":"2012","unstructured":"Tyagi V (2012) Data hiding in image using least significant bit with cryptography. International Journal of Advanced Research in Computer Science and Software Engineering 2(4):120\u2013123","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"7772_CR21","unstructured":"Van VS (2009) Image Compression Using Burrows-Wheeler Transform\u201d, Master of Science in Technology Espoo"},{"key":"7772_CR22","unstructured":"Varsaki E, Fotopoulos V, Skodras AN (2006) A reversible data hiding technique embedding in the image histogram. Hellenic Open University Journal of Informatics 1, no. 2"},{"key":"7772_CR23","doi-asserted-by":"crossref","unstructured":"Wang Z, Chang C, Chen K, Li M (2010) \u201cAn encoding method for both image compression and data lossless information hiding\u201d, Elsevier Inc","DOI":"10.1016\/j.jss.2010.06.007"},{"key":"7772_CR24","doi-asserted-by":"crossref","unstructured":"Wang W-J, Huang C-T, Wang AS-J, Member IEEE (2011) VQ applications in Steganographic data hiding upon multimedia images. IEEE Syst J 5(4)","DOI":"10.1109\/JSYST.2011.2165603"},{"key":"7772_CR25","doi-asserted-by":"crossref","unstructured":"Wazirali R, Chaczko Z (2015) Data hiding based on intelligent optimized edges for secure multimedia communication. Journal Of Networks 10(8)","DOI":"10.4304\/jnw.10.8.477-485"},{"issue":"6","key":"7772_CR26","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TIP.2003.810588","volume":"12","author":"M Wu","year":"2003","unstructured":"Wu M, Liu B (2003) Data hiding in image and video: part I\u2014fundamental issues and solutions. IEEE Trans Image Process 12(6):685\u2013695","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"7772_CR27","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1109\/TIP.2003.810589","volume":"12","author":"M Wu","year":"2003","unstructured":"Wu M, Yu H, Liu B (2003) Data hiding in image and video: part II\u2014designs and applications. IEEE Trans Image Process 12(6):696\u2013705","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"7772_CR28","first-page":"509","volume":"18","author":"H Yang","year":"2009","unstructured":"Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering 18(4):509","journal-title":"Radioengineering"},{"key":"7772_CR29","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118\u2013127","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07772-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-07772-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-07772-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T23:17:04Z","timestamp":1591226224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-07772-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,5]]},"references-count":29,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["7772"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-07772-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,5]]},"assertion":[{"value":"6 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}