{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:21:27Z","timestamp":1773246087411,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"17-18","license":[{"start":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T00:00:00Z","timestamp":1578441600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T00:00:00Z","timestamp":1578441600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11042-019-08472-6","type":"journal-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T11:02:51Z","timestamp":1578481371000},"page":"11747-11765","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["LSB based steganography with OCR: an intelligent amalgamation"],"prefix":"10.1007","volume":"79","author":[{"given":"Agneet","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Sudipta Kumar","family":"Ghosal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8813-4086","authenticated-orcid":false,"given":"Ram","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,8]]},"reference":[{"key":"8472_CR1","doi-asserted-by":"crossref","unstructured":"Areepongsa S, Kaewkammerd N, Syed YF, Rao KR (2000) Exploring on steganography for low bit rate Wavelet based coder in image retrieval system. Proceedings of IEEE TENCON, pp 250\u2013255","DOI":"10.1109\/TENCON.2000.892268"},{"key":"8472_CR2","first-page":"1","volume-title":"Proceedings of the 2nd international conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009","author":"D Avola","year":"2009","unstructured":"Avola D, Buono AD, Gianforme G, Paolozzi S, Wang R (2009) Sketchml a representation language for novel sketch recognition approach. In: Proceedings of the 2nd international conference on Pervasive Technologies Related to Assistive Environments, PETRA 2009. ACM, New York, pp 1\u20138"},{"key":"8472_CR3","volume-title":"Image analysis and processing \u2013 ICIAP 2017, Lecture Notes in Computer Science, vol 10484","author":"D Avola","year":"2017","unstructured":"Avola D, Bernardi M, Cinque L, Foresti GL, Marini MR, Massaroni C (2017) A machine learning approach for the online separation of handwriting from freehand drawing. In: Battiato S, Gallo G, Schettini R, Stanco F (eds) Image analysis and processing \u2013 ICIAP 2017, Lecture Notes in Computer Science, vol 10484. Springer, Cham"},{"key":"8472_CR4","doi-asserted-by":"publisher","unstructured":"Avola D, Bernardi M, Cinque L et al (2019) Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-7196-1","DOI":"10.1007\/s11042-019-7196-1"},{"key":"8472_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.displa.2016.12.004","volume":"46","author":"J Bai","year":"2017","unstructured":"Bai J et al (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42\u201351","journal-title":"Displays"},{"key":"8472_CR6","unstructured":"Boehm B (2014) Stegexpose-A tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656"},{"issue":"1","key":"8472_CR7","first-page":"659","volume":"2","author":"PK Charles","year":"2012","unstructured":"Charles PK et al (2012) A review on the various techniques used for optical character recognition. Int J Eng Res Appl 2(1):659\u2013662","journal-title":"Int J Eng Res Appl"},{"issue":"5","key":"8472_CR8","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/S0031-3203(97)00078-2","volume":"31","author":"BB Chaudhuri","year":"1998","unstructured":"Chaudhuri BB, Pal U (1998) A complete printed Bangla OCR system. Pattern Recogn 31(5):531\u2013549","journal-title":"Pattern Recogn"},{"key":"8472_CR9","unstructured":"de Campos T, Babu BR, Varma M (2009) Character recognition in natural images. http:\/\/personal.ee.surrey.ac.uk\/Personal\/T.Decampos\/papers\/decampos_etal_visapp2009.pdf"},{"key":"8472_CR10","volume-title":"International workshop on information hiding","author":"S Dumitrescu","year":"2002","unstructured":"Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB steganography via sample pair analysis. In: International workshop on information hiding. Springer, Berlin\/Heidelberg"},{"key":"8472_CR11","unstructured":"Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. Proceedings of international conference on image processing, vol 3. IEEE"},{"key":"8472_CR12","doi-asserted-by":"publisher","unstructured":"Elhadad A (2019) Soft Comput. https:\/\/doi.org\/10.1007\/s00500-019-04041-z","DOI":"10.1007\/s00500-019-04041-z"},{"issue":"Suppl 1","key":"8472_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00521-016-2323-7","volume":"28","author":"A Elhadad","year":"2017","unstructured":"Elhadad A, Hamad S, Khalifa A et al (2017) Neural Comput Applic 28(Suppl 1):91. https:\/\/doi.org\/10.1007\/s00521-016-2323-7","journal-title":"Neural Comput Applic"},{"issue":"4","key":"8472_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Rui D (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4):22\u201328","journal-title":"IEEE Multimedia"},{"key":"8472_CR15","first-page":"1267","volume":"6","author":"T Garg","year":"2018","unstructured":"Garg T, Joshi K, Pandey J (2018) Enhancement of efficiency in LSB steganography method using matrix multiplication. Int J Comput Sci Eng 6:1267\u20131278","journal-title":"Int J Comput Sci Eng"},{"key":"8472_CR16","unstructured":"Ghazanfari K, Ghaemmaghami S, Khosravi SR (2011) LSB++: an improvement to LSB+ steganography. TENCON 2011\u20132011 IEEE Region 10 conference. IEEE"},{"key":"8472_CR17","unstructured":"Hallouli K, Likforman-Sulem L, Sigelle M (2002) A comparative study between decision fusion and data fusion in Markovian printed character recognition. Pattern Recognition, 2002. Proceedings of 16th international conference on, vol 3. IEEE"},{"key":"8472_CR18","volume-title":"IFIP international conference on communications and multimedia security","author":"S Hetzl","year":"2005","unstructured":"Hetzl S, Mutzel P (2005) A graph\u2013theoretic approach to steganography. In: IFIP international conference on communications and multimedia security. Springer, Berlin\/Heidelberg"},{"key":"8472_CR19","volume-title":"Adaptive elastic models for hand-printed character recognition","author":"GE Hinton","year":"1992","unstructured":"Hinton GE, Williams CKI, Revow MD (1992) Adaptive elastic models for hand-printed character recognition. Adv Neural Inf Proces Syst"},{"key":"8472_CR20","unstructured":"https:\/\/data.mendeley.com\/datasets\/sp4g8h7v8k\/1. Accessed on 8 Oct 2019"},{"key":"8472_CR21","doi-asserted-by":"publisher","first-page":"41","DOI":"10.3390\/sym8060041","volume":"8","author":"M Hussain","year":"2016","unstructured":"Hussain M, Abdul Wahab AW, Javed N, Jung K-H (2016) Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images. Symmetry 8:41","journal-title":"Symmetry"},{"issue":"2","key":"8472_CR22","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):26\u201334","journal-title":"Computer"},{"issue":"6","key":"8472_CR23","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.21817\/ijet\/2016\/v8i6\/160806266","volume":"8","author":"K Joshi","year":"2017","unstructured":"Joshi K, Yadav R, Chawla G (2017) An enhanced method for data hiding using 2 bit XOR in image steganography. Int J Eng Technol 8(6):3043\u20133055","journal-title":"Int J Eng Technol"},{"key":"8472_CR24","first-page":"2143","volume":"74","author":"KH Jung","year":"2014","unstructured":"Jung KH, Yoo KY (2014) Steganographic method based on interpolation and LSB substitution of digital images. Springer Science+Business Media 74:2143\u20132155","journal-title":"Springer Science+Business Media"},{"key":"8472_CR25","doi-asserted-by":"crossref","unstructured":"Kawaguchi E, Eason RO (1998) Principle and applications of bpcs steganography. In: Multimedia systems and applications, vol 3528, pp. 464\u2013473, SPIE","DOI":"10.1117\/12.337436"},{"key":"8472_CR26","unstructured":"Kruus P, Scace C, Heyman M, Mundy M (2003) A survey of steganography techniques for image files. Adv Secur Res J [On line] 5(1):41\u201352 Available: http:\/\/www.isso.sparta.com\/documents\/asrjv5.pdf#page=47 [Oct., 2011]"},{"key":"8472_CR27","first-page":"1","volume":"52","author":"M Kumar","year":"2018","unstructured":"Kumar M et al (2018) Character and numeral recognition for non-Indic and Indic scripts: a survey. Artif Intell Rev 52:1\u201327","journal-title":"Artif Intell Rev"},{"issue":"5","key":"8472_CR28","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TPAMI.2006.102","volume":"28","author":"LM Lorigo","year":"2006","unstructured":"Lorigo LM, Govindaraju V (2006) Offline Arabic handwriting recognition: a survey. IEEE Trans Pattern Anal Mach Intell 28(5):712\u2013724","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"8472_CR29","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285\u2013287","journal-title":"IEEE Signal Process Lett"},{"issue":"1","key":"8472_CR30","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu N (1979) A threshold selection method from gray-level histograms. IEEE Trans Syst Man Cybern 9(1):62\u201366","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"8472_CR31","first-page":"5587","volume":"41","author":"V Patil","year":"2011","unstructured":"Patil V, Shimpi S (2011) Handwritten English character recognition using neural network. Elixir Comput Sci Eng 41:5587\u20135591","journal-title":"Elixir Comput Sci Eng"},{"issue":"1","key":"8472_CR32","first-page":"87","volume":"2","author":"VL Sahu","year":"2013","unstructured":"Sahu VL, Kubde B (2013) Offline handwritten character recognition techniques using neural network: a review. Int J Sci Res (IJSR) 2(1):87\u201394","journal-title":"Int J Sci Res (IJSR)"},{"key":"8472_CR33","doi-asserted-by":"crossref","unstructured":"Sallee P (2004) Model-based steganography. In: Proceedings of the 2nd international workshop on digital watermarking. LNCS, pp 254\u2013260","DOI":"10.1007\/978-3-540-24624-4_12"},{"key":"8472_CR34","volume-title":"A secure spatial domain image steganography using genetic algorithm and linear congruential generator. International conference on intelligent computing and applications","author":"PD Shah","year":"2018","unstructured":"Shah PD, Bichkar RS (2018) A secure spatial domain image steganography using genetic algorithm and linear congruential generator. International conference on intelligent computing and applications. Springer, Singapore"},{"issue":"4","key":"8472_CR35","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/0031-3203(95)00118-2","volume":"29","author":"\u00d8D Trier","year":"1996","unstructured":"Trier \u00d8D, Jain AK, Taxt T (1996) Feature extraction methods for character recognition- a Survey. Pattern Recogn 29(4):641\u2013662","journal-title":"Pattern Recogn"},{"issue":"9\u201310","key":"8472_CR36","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D-C Wu","year":"2003","unstructured":"Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9\u201310):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"key":"8472_CR37","unstructured":"Wu H-T, Dugelay J-L, Cheung Y-M (2008) A data mapping method for steganography and its application to images. 10th international workshop on information hiding, vol 5284, pp 236\u2013250, USA, May 2008"},{"key":"8472_CR38","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.patrec.2017.08.005","volume":"100","author":"C-S Yang","year":"2017","unstructured":"Yang C-S, Yang Y-H (2017) Improved local binary pattern for real scene optical character recognition. Pattern Recogn Lett 100:14\u201321","journal-title":"Pattern Recogn Lett"},{"key":"8472_CR39","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2013.08.012","volume":"254","author":"H-D Yuan","year":"2014","unstructured":"Yuan H-D (2014) Secret sharing with multi-cover adaptive steganography. Inf Sci 254:197\u2013212","journal-title":"Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08472-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08472-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08472-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T01:22:52Z","timestamp":1609982572000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08472-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,8]]},"references-count":39,"journal-issue":{"issue":"17-18","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["8472"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08472-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,8]]},"assertion":[{"value":"28 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}