{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T08:45:42Z","timestamp":1766133942772,"version":"build-2065373602"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11042-019-08283-9","type":"journal-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T19:02:49Z","timestamp":1577127769000},"page":"7471-7490","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Enhanced payload and trade-off for image steganography via a novel pixel digits alteration"],"prefix":"10.1007","volume":"79","author":[{"given":"Vinita","family":"Verma","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sunil K.","family":"Muttoo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V. B.","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"key":"8283_CR1","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson RJ, Petitcolas FAP (1998) On The Limits of Steganography. IEEE J Sel Areas Commun 16:474\u2013481. https:\/\/doi.org\/10.1109\/49.668971","journal-title":"IEEE J Sel Areas Commun"},{"key":"8283_CR2","doi-asserted-by":"crossref","unstructured":"Anjum A, Islam S (2016) LSB Steganalysis Using Modified Weighted Stego-Image Method. In: 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, pp 630\u2013635","DOI":"10.1109\/SPIN.2016.7566773"},{"key":"8283_CR3","doi-asserted-by":"crossref","unstructured":"Balakrishna C, NaveenChandra V, Pal R (2013) Image Steganography Using Generalized Base Single Digit Sum ( GB-SDS ). In: 2013 Annual IEEE India Conference (INDICON). pp 1\u20134","DOI":"10.1109\/INDCON.2013.6726098"},{"key":"8283_CR4","doi-asserted-by":"crossref","unstructured":"Bohme R (2010) Advanced Statistical Steganalysis","DOI":"10.1007\/978-3-642-14313-7"},{"key":"8283_CR5","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1049\/iet-ipr.2011.0059","volume":"6","author":"K Faez","year":"2012","unstructured":"Faez K, Khodaei M (2012) New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Process 6:677\u2013686. https:\/\/doi.org\/10.1049\/iet-ipr.2011.0059","journal-title":"IET Image Process"},{"key":"8283_CR6","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. In: Proc. SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI","DOI":"10.1117\/12.521350"},{"key":"8283_CR7","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Bin Idris YI et al (2018) Image steganography in spatial domain: A survey. Signal Process Image Commun 65:46\u201366. https:\/\/doi.org\/10.1016\/j.image.2018.03.012","journal-title":"Signal Process Image Commun"},{"key":"8283_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.image.2016.10.005","volume":"50","author":"M Hussain","year":"2017","unstructured":"Hussain M, Wahid A, Ho ATS, Javed N (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44\u201357. https:\/\/doi.org\/10.1016\/j.image.2016.10.005","journal-title":"Signal Process Image Commun"},{"key":"8283_CR9","doi-asserted-by":"publisher","unstructured":"Hussain M, Wahid A, Javed N, Jung K (2016) Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images. Symmetry (Basel) 8. https:\/\/doi.org\/10.3390\/sym8060041","DOI":"10.3390\/sym8060041"},{"key":"8283_CR10","doi-asserted-by":"crossref","unstructured":"Jung KH, Ha KJ, Yoo KY (2008) Image Data Hiding Method Based on Multi-pixel Differencing and LSB Substitution Methods. In: 2008 International Conference on Convergence and Hybrid Information Technology. IEEE, pp 355\u2013358","DOI":"10.1109\/ICHIT.2008.279"},{"key":"8283_CR11","doi-asserted-by":"crossref","unstructured":"Ker AD, Bohme R (2008) Revisiting Weighted Stego-Image Steganalysis. In: Proc. SPIE 6819, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X","DOI":"10.1117\/12.766820"},{"key":"8283_CR12","doi-asserted-by":"crossref","unstructured":"Laffont A, Maniriho P, Ramsi A, et al (2017) Enhanced Pixel Value Modification based on Modulus Function for RGB Image Steganography. In: 2017 11th International Conference on Information & Communication Technology and System (ICTS). IEEE, pp 61\u201366","DOI":"10.1109\/ICTS.2017.8265647"},{"key":"8283_CR13","doi-asserted-by":"publisher","first-page":"1482","DOI":"10.1109\/TIP.2018.2878290","volume":"28","author":"S Li","year":"2019","unstructured":"Li S, Zhang X (2019) Toward Construction Based Data Hiding: From Secrets to Fingerprint Images. IEEE Trans Image Process 28:1482\u20131497. https:\/\/doi.org\/10.1109\/TIP.2018.2878290","journal-title":"IEEE Trans Image Process"},{"key":"8283_CR14","doi-asserted-by":"crossref","unstructured":"Nagaraj V, Vijayalakshmi V, Zayaraz G (2013) Color Image Steganography based on Pixel Value Modification Method Using Modulus Function. In: IERI Procedia-2013 International Conference on Electronic Engineering and Computer Science. pp 17\u201324","DOI":"10.1016\/j.ieri.2013.11.004"},{"key":"8283_CR15","doi-asserted-by":"publisher","unstructured":"Pradhan A, Raja Sekhar K, Swain G (2016) Digital Image Steganography based on Seven Way Pixel Value Differencing. Indian J Sci Technol 9. https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i37\/88557","DOI":"10.17485\/ijst\/2016\/v9i37\/88557"},{"key":"8283_CR16","doi-asserted-by":"publisher","unstructured":"Prasad S, Pal AK (2017) An RGB colour image steganography scheme using overlapping block-based pixel-value differencing. R Soc Open Sci 4. https:\/\/doi.org\/10.1098\/rsos.161066","DOI":"10.1098\/rsos.161066"},{"key":"8283_CR17","unstructured":"Sch P, Korff S, Rainer B, Notation A (2012) Weighted Stego-Image Steganalysis for Naive Content-Adaptive Embedding. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, pp 193\u2013198"},{"key":"8283_CR18","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s11042-014-2016-0","volume":"74","author":"S Shen","year":"2015","unstructured":"Shen S, Huang L, Tian Q (2015) A novel data hiding for color images based on pixel value difference and modulus function. Multimed Tools Appl 74:707\u2013728. https:\/\/doi.org\/10.1007\/s11042-014-2016-0","journal-title":"Multimed Tools Appl"},{"key":"8283_CR19","unstructured":"Sudeep P V., Navas KA (2009) A Novel Data hiding Method in Spatial Domain. In: 10th National Conference on Technological Trends (NCTT 2009)"},{"key":"8283_CR20","doi-asserted-by":"crossref","first-page":"1444","DOI":"10.17485\/ijst\/2014\/v7i9.27","volume":"7","author":"G Swain","year":"2014","unstructured":"Swain G (2014) Digital Image Steganography using Nine-Pixel Differencing and Modified LSB Substitution. Indian J Sci Technol 7:1444\u20131450","journal-title":"Indian J Sci Technol"},{"key":"8283_CR21","doi-asserted-by":"publisher","first-page":"7549","DOI":"10.1007\/s13369-018-3163-9","volume":"43","author":"G Swain","year":"2018","unstructured":"Swain G (2018) Adaptive and Non-adaptive PVD Steganography Using Overlapped Pixel Blocks. Arab J Sci Eng 43:7549\u20137562. https:\/\/doi.org\/10.1007\/s13369-018-3163-9","journal-title":"Arab J Sci Eng"},{"key":"8283_CR22","doi-asserted-by":"publisher","unstructured":"Swain G (2018) High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis. Secur Commun Networks. https:\/\/doi.org\/10.1155\/2018\/1505896","DOI":"10.1155\/2018\/1505896"},{"key":"8283_CR23","doi-asserted-by":"publisher","unstructured":"Swain G (2018) Digital image steganography using eight directional PVD against RS analysis and PDH analysis. Adv Multimed. https:\/\/doi.org\/10.1155\/2018\/4847098","DOI":"10.1155\/2018\/4847098"},{"key":"8283_CR24","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.ijleo.2018.11.015","volume":"180","author":"G Swain","year":"2019","unstructured":"Swain G (2019) Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function. Opt - Int J Light Electron Opt 180:807\u2013823. https:\/\/doi.org\/10.1016\/j.ijleo.2018.11.015","journal-title":"Opt - Int J Light Electron Opt"},{"key":"8283_CR25","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s13369-018-3372-2","volume":"44","author":"G Swain","year":"2019","unstructured":"Swain G (2019) Very High Capacity Image Steganography Technique Using Quotient Value Differencing and LSB Substitution. Arab J Sci Eng 44:2995\u20133004. https:\/\/doi.org\/10.1007\/s13369-018-3372-2","journal-title":"Arab J Sci Eng"},{"key":"8283_CR26","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/TCSVT.2018.2881118","volume":"29","author":"J Tao","year":"2019","unstructured":"Tao J, Li S, Zhang X, Wang Z (2019) Towards Robust Image Steganography. IEEE Trans Circuits Syst Video Technol 29:594\u2013600. https:\/\/doi.org\/10.1109\/TCSVT.2018.2881118","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"8283_CR27","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3923\/jai.2014.54.68","volume":"7","author":"V Thanikaiselvan","year":"2014","unstructured":"Thanikaiselvan V, Selvaraj S, Rengarajan A (2014) PVD Based Steganography on Scrambled RGB Cover Images with Pixel Indicator. J Artif Intell 7:54\u201368. https:\/\/doi.org\/10.3923\/jai.2014.54.68","journal-title":"J Artif Intell"},{"key":"8283_CR28","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1016\/S0031-3203(03)00221-8","volume":"36","author":"C Thien","year":"2003","unstructured":"Thien C, Lin J (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn 36:2875\u20132881. https:\/\/doi.org\/10.1016\/S0031-3203(03)00221-8","journal-title":"Pattern Recogn"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08283-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08283-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08283-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T00:34:28Z","timestamp":1608597268000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08283-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,23]]},"references-count":28,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["8283"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08283-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,12,23]]},"assertion":[{"value":"4 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}