{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:24:15Z","timestamp":1771917855990,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"19-20","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11042-019-08415-1","type":"journal-article","created":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T17:02:32Z","timestamp":1580576552000},"page":"13693-13724","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity"],"prefix":"10.1007","volume":"79","author":[{"given":"Mahboubeh","family":"Nazari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7791-691X","authenticated-orcid":false,"given":"Iman","family":"Dorostkar Ahmadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,1]]},"reference":[{"key":"8415_CR1","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.eswa.2015.10.024","volume":"46","author":"H Al-Dmour","year":"2016","unstructured":"Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293\u2013306","journal-title":"Expert Syst Appl"},{"issue":"3","key":"8415_CR2","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/4236.935180","volume":"5","author":"D Artz","year":"2001","unstructured":"Artz D (2001) Digital steganography: hiding data within data. IEEE Internet Comput 5(3):75\u201380","journal-title":"IEEE Internet Comput"},{"issue":"3","key":"8415_CR3","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1007\/s11071-015-2580-5","volume":"84","author":"F Baig","year":"2016","unstructured":"Baig F, Khan MF, Beg S, Shah T, Saleem K (2016) Onion steganography: a novel layering approach. Nonlinear Dynamics 84(3):1431\u20131446","journal-title":"Nonlinear Dynamics"},{"key":"8415_CR4","volume-title":"The essential guide to image processing","year":"2009","unstructured":"Bovik AC (ed) (2009) The essential guide to image processing. Academic Press, Cambridge"},{"issue":"3","key":"8415_CR5","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"issue":"1","key":"8415_CR6","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1):123\u2013138","journal-title":"Inf Sci"},{"key":"8415_CR7","doi-asserted-by":"crossref","unstructured":"Chen, YZ, Han Z, Li SP, Lu CH, Yao XH (2010) An adaptive steganography algorithm based on block sensitivity vectors using HVS features. In Image and Signal Processing (CISP), 2010 3rd International Congress on (Vol. 3, pp. 1151\u20131155). IEEE","DOI":"10.1109\/CISP.2010.5646724"},{"key":"8415_CR8","first-page":"1","volume":"7","author":"P Chowdhuri","year":"2018","unstructured":"Chowdhuri P, Jana B, Giri D (2018) Secured steganographic scheme for highly compressed color image using weighted matrix through DCT. Int J Comput Appl 7:1\u201312","journal-title":"Int J Comput Appl"},{"key":"8415_CR9","first-page":"27","volume-title":"Communications in Computer and Information Science","author":"Partha Chowdhuri","year":"2018","unstructured":"Chowdhuri P, Jana B, Giri D (2018) A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain. In International Conference on Mathematics and Computing, pp. 27\u201335. Springer, Singapore."},{"key":"8415_CR10","doi-asserted-by":"crossref","unstructured":"Dande SC, Agrawal SS, Hirekhan SR (2016, April) Implementation of colour image steganography using LSB and edge detection technique: A LabVIEW approach. In Communication and Signal Processing (ICCSP), 2016 International Conference on (pp. 1466\u20131470). IEEE.","DOI":"10.1109\/ICCSP.2016.7754401"},{"key":"8415_CR11","doi-asserted-by":"crossref","unstructured":"Darshni P, Ghanekar U (2015) A Hybrid Data Hiding Scheme to Enhance the Capacity of One-Third Probability Embedding Method. In Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on (pp. 269\u2013272). IEEE","DOI":"10.1109\/CICT.2015.82"},{"issue":"1","key":"8415_CR12","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10462-016-9459-9","volume":"46","author":"\u015e Do\u011fan","year":"2016","unstructured":"Do\u011fan \u015e (2016) A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev 46(1):129\u2013143","journal-title":"Artif Intell Rev"},{"key":"8415_CR13","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.compeleceng.2016.09.001","volume":"70","author":"SA El-Rahman","year":"2018","unstructured":"El-Rahman SA (2018) A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electr Eng 70:380\u2013399","journal-title":"Comput Electr Eng"},{"issue":"3","key":"8415_CR14","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1016\/j.compeleceng.2012.06.014","volume":"39","author":"L Fan","year":"2013","unstructured":"Fan L, Gao T, Cao Y (2013) Improving the embedding efficiency of weight matrix-based steganography for grayscale images. Comput Electr Eng 39(3):873\u2013881","journal-title":"Comput Electr Eng"},{"key":"8415_CR15","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2009","unstructured":"Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge"},{"issue":"10","key":"8415_CR16","doi-asserted-by":"crossref","first-page":"1374","DOI":"10.1016\/j.aeue.2016.07.011","volume":"70","author":"HT Hu","year":"2016","unstructured":"Hu HT, Chang JR, Hsu LY (2016) Robust blind image watermarking by modulating the mean of partly sign-altered DCT coefficients guided by human visual perception. AEU-International Journal of Electronics and Communications 70(10):1374\u20131381","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"4","key":"8415_CR17","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/TIFS.2012.2198213","volume":"7","author":"F Huang","year":"2012","unstructured":"Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE Transactions on Information Forensics and Security 7(4):1181\u20131191","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8415_CR18","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AW, Idris YI, Ho AT, Jung KH (2018) Image steganography in spatial domain: A survey. Signal Process Image Commun 65:46\u201366","journal-title":"Signal Process Image Commun"},{"issue":"9","key":"8415_CR19","doi-asserted-by":"crossref","first-page":"3679","DOI":"10.1007\/s00500-015-1729-y","volume":"20","author":"B Jagadeesh","year":"2016","unstructured":"Jagadeesh B, Kumar PR, Reddy PC (2016) Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft Comput 20(9):3679\u20133686","journal-title":"Soft Comput"},{"key":"8415_CR20","first-page":"296","volume-title":"Information Hiding","author":"Andrew D. Ker","year":"2005","unstructured":"Ker AD (2005) A general framework for structural steganalysis of LSB replacement. In International Workshop on Information Hiding. Springer Berlin Heidelberg, pp 296\u2013311"},{"key":"8415_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-based cryptography: Theory, algorithms and applications","author":"L Kocarev","year":"2011","unstructured":"Kocarev L, Lian S (2011) Chaos-based cryptography: Theory, algorithms and applications. Springer Science & Business Media, Berlin"},{"issue":"2","key":"8415_CR22","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.dt.2018.08.003","volume":"15","author":"S Kumar","year":"2019","unstructured":"Kumar S, Singh A, Kumar M (2019) Information hiding with adaptive steganography based on novel fuzzy edge identification. Defence Technology 15(2):162\u2013169","journal-title":"Defence Technology"},{"key":"8415_CR23","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2016.04.016","volume":"63","author":"S Kumari","year":"2016","unstructured":"Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63:56\u201375","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"8415_CR24","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"GC Langelaar","year":"2000","unstructured":"Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Process Mag 17(5):20\u201346","journal-title":"IEEE Signal Process Mag"},{"issue":"5","key":"8415_CR25","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1109\/TMM.2010.2051243","volume":"12","author":"GS Lin","year":"2010","unstructured":"Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Transactions on Multimedia 12(5):345\u2013357","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3","key":"8415_CR26","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"Lin CC, Shiu PF (2010) High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal Processing 1(3):220\u2013240","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"1","key":"8415_CR27","first-page":"151","volume":"37","author":"DC Lou","year":"2008","unstructured":"Lou DC, Hu MC, Liu JL (2008) Healthcare image watermarking scheme based on human visual model and back-propagation network. Journal of CCIT 37(1):151\u2013162","journal-title":"Journal of CCIT"},{"issue":"11","key":"8415_CR28","doi-asserted-by":"crossref","first-page":"13133","DOI":"10.1007\/s11042-017-4935-z","volume":"77","author":"Aref Miri","year":"2017","unstructured":"Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl:13133\u201313144","journal-title":"Multimedia Tools and Applications"},{"key":"8415_CR29","unstructured":"Morkel T, Eloff JH, Olivier MS (2005) An overview of image steganography. In ISSA (pp. 1\u201311)"},{"issue":"6","key":"8415_CR30","doi-asserted-by":"crossref","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76(6):8597\u20138626","journal-title":"Multimed Tools Appl"},{"key":"8415_CR31","unstructured":"Nazari M, Sharif A, Mollaeefar M (2016) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl:1\u201317"},{"key":"8415_CR32","unstructured":"Nikooghadam M, Jahantigh R, Arshad H (2016) A lightweight authentication and key agreement protocol preserving user anonymity. Multimed Tools Appl:1\u201323"},{"issue":"3","key":"8415_CR33","first-page":"218","volume":"4","author":"S Oueslati","year":"2010","unstructured":"Oueslati S, Cherif A, Solaiman B (2010) A fuzzy watermarking approach based on the human visual system. International Journal of Image Processing 4(3):218\u2013231","journal-title":"International Journal of Image Processing"},{"issue":"3","key":"8415_CR34","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"99","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE security & privacy 99(3):32\u201344","journal-title":"IEEE security & privacy"},{"key":"8415_CR35","unstructured":"Raid AM, Khedr WM, El-Dosuky MA, Ahmed W (2014) JPEG image compression using discrete cosine transform-A Survey. arXiv preprint arXiv:1405.6147"},{"issue":"11","key":"8415_CR36","doi-asserted-by":"crossref","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493\u201313510","journal-title":"Multimed Tools Appl"},{"key":"8415_CR37","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.asoc.2015.01.032","volume":"30","author":"S Sajasi","year":"2015","unstructured":"Sajasi S, Moghadam AME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375\u2013389","journal-title":"Appl Soft Comput"},{"key":"8415_CR38","unstructured":"Sajedi H, Jamzad M (2008) Cover selection steganography method based on similarity of image blocks. In Computer and Information Technology Workshops, 2008. CIT Workshops 2008. IEEE 8th International Conference on (pp. 379\u2013384). IEEE"},{"key":"8415_CR39","unstructured":"Sakr N, Zhao J, Groza V (2005) A dynamic fuzzy logic approach to adaptive HVS-based watermarking. In Haptic Audio Visual Environments and their Applications, 2005. IEEE International Workshop on (pp. 6-pp). IEEE"},{"key":"8415_CR40","doi-asserted-by":"crossref","DOI":"10.1201\/9781420049794","volume-title":"Image and video compression for multimedia engineering: Fundamentals, algorithms, and standards","author":"YQ Shi","year":"1999","unstructured":"Shi YQ, Sun H (1999) Image and video compression for multimedia engineering: Fundamentals, algorithms, and standards. CRC press, Boca Raton"},{"key":"8415_CR41","first-page":"61","volume":"3","author":"J Silman","year":"2001","unstructured":"Silman J (2001) Steganography and steganalysis: an overview. Sans Institute 3:61\u201376","journal-title":"Sans Institute"},{"issue":"1","key":"8415_CR42","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1023\/A:1021889010444","volume":"18","author":"A Srivastava","year":"2003","unstructured":"Srivastava A, Lee AB, Simoncelli EP, Zhu SC (2003) On advances in statistical modeling of natural images. Journal of mathematical imaging and vision 18(1):17\u201333","journal-title":"Journal of mathematical imaging and vision"},{"key":"8415_CR43","unstructured":"Suchitra B, Priya M, Raju J (2013) Image Steganography Based On DCT Algorithm for Data Hiding. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2(11)"},{"issue":"2","key":"8415_CR44","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","volume":"7","author":"W Sun","year":"2013","unstructured":"Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7(2):297\u2013306","journal-title":"SIViP"},{"issue":"2","key":"8415_CR45","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1007\/s40815-017-0420-0","volume":"20","author":"C Vanmathi","year":"2018","unstructured":"Vanmathi C, Prabu S (2018) Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility. International Journal of Fuzzy Systems 20(2):460\u2013473","journal-title":"International Journal of Fuzzy Systems"},{"key":"8415_CR46","unstructured":"Walia E, Jain P, Navdeep N (2010) An analysis of LSB & DCT based steganography. Global Journal of Computer Science and Technology 10(1)"},{"key":"8415_CR47","doi-asserted-by":"crossref","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error measurement to structural similarity. IEEE Trans Image Process 13(1)","DOI":"10.1109\/TIP.2003.819861"},{"issue":"1","key":"8415_CR48","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s11554-015-0555-x","volume":"14","author":"CN Yang","year":"2018","unstructured":"Yang CN, Kim C, Lo YH (2018) Adaptive real-time reversible data hiding for JPEG images. J Real-Time Image Proc 14(1):147\u2013157","journal-title":"J Real-Time Image Proc"},{"key":"8415_CR49","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.jss.2014.08.066","volume":"98","author":"M Zhang","year":"2014","unstructured":"Zhang M, Tong X (2014) A new chaotic map based image encryption schemes for several image formats. J Syst Softw 98:140\u2013154","journal-title":"J Syst Softw"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08415-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08415-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08415-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,31]],"date-time":"2021-01-31T00:18:17Z","timestamp":1612052297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08415-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":49,"journal-issue":{"issue":"19-20","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["8415"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08415-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,1]]},"assertion":[{"value":"22 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}