{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:36:25Z","timestamp":1774942585712,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11042-019-7238-8","type":"journal-article","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T18:17:02Z","timestamp":1548785822000},"page":"18475-18502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Steganography in discrete wavelet transform based on human visual system and cover model"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-176X","authenticated-orcid":false,"given":"Mohammad","family":"Fakhredanesh","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Rahmati","sequence":"additional","affiliation":[]},{"given":"Reza","family":"Safabakhsh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"7238_CR1","doi-asserted-by":"crossref","unstructured":"Ahmidi N, Neyestanak AL (2008) A human visual model for steganography. Proc IEEE Canadian Conf electrical computer engineering (CCECE), Niagara Falls, ON, USA, pp 1077\u20131080","DOI":"10.1109\/CCECE.2008.4564703"},{"key":"7238_CR2","doi-asserted-by":"crossref","unstructured":"Akhbari B, Ghaemmaghami S (2005) Watermarking of still images in wavelet domain based on entropy masking model. Proc IEEE region 10 Int Conf TENCON, Melbourne, Qld, Australia, pp 1\u20136","DOI":"10.1109\/TENCON.2005.301060"},{"key":"7238_CR3","doi-asserted-by":"crossref","unstructured":"Amar M et al (2016) A JND model using a texture-edge selector based on Faber-Schauder wavelet lifting scheme. Proc 7th Int Conf image and signal process, ICISP 2016, pp 328\u2013336","DOI":"10.1007\/978-3-319-33618-3_33"},{"key":"7238_CR4","doi-asserted-by":"crossref","unstructured":"Awrangjeb M, Kankanhalli MS (2003) Lossless watermarking considering the human visual system. Digit watermarking, Seoul, Korea, vol 2939, pp 581\u2013592","DOI":"10.1007\/978-3-540-24624-4_47"},{"issue":"10","key":"7238_CR5","doi-asserted-by":"publisher","first-page":"4916","DOI":"10.1109\/TIP.2016.2598492","volume":"5","author":"SH Bae","year":"2016","unstructured":"Bae SH, Kim M (2016) DCT-QM: a DCT-based quality degradation metric for image quality optimization problems. IEEE Trans Image Process 5(10):4916\u20134930","journal-title":"IEEE Trans Image Process"},{"key":"7238_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14313-7","volume-title":"Advanced statistical Steganalysis","author":"R B\u00f6hme","year":"2010","unstructured":"B\u00f6hme R (2010) Advanced statistical Steganalysis. Springer, Berlin"},{"key":"7238_CR7","doi-asserted-by":"crossref","unstructured":"Bohme R, Westfeld A (2004) Breaking Cauchy model-based JPEG steganography with first order statistics. Proc of ESORICS, vol 3193, pp 125\u2013140","DOI":"10.1007\/978-3-540-30108-0_8"},{"key":"7238_CR8","doi-asserted-by":"crossref","unstructured":"Cachin C (1998) An information-theoretic model for steganography. Proc second Int workshop Inf hiding (IH'98), Portland, Oregon, USA. Springer","DOI":"10.1007\/3-540-49380-8_21"},{"issue":"3","key":"7238_CR9","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A et al (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"issue":"3","key":"7238_CR10","doi-asserted-by":"crossref","first-page":"213","DOI":"10.3923\/itj.2003.213.230","volume":"2","author":"TH Chen","year":"2003","unstructured":"Chen TH, Horng G, Wang SH (2003) A robust wavelet-based watermarking scheme using quantization and human visual system mode. Pakistan J Inf Technol 2(3):213\u2013230","journal-title":"Pakistan J Inf Technol"},{"key":"7238_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of information theory","author":"T Cover","year":"1991","unstructured":"Cover T, Thomas J (1991) Elements of information theory. Wiley, New York"},{"key":"7238_CR12","volume-title":"Digital watermarking and steganography","author":"IJ Cox","year":"2008","unstructured":"Cox IJ et al (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann, Burlington","edition":"2"},{"issue":"3","key":"7238_CR13","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/S0165-1684(98)00013-9","volume":"66","author":"JF Delaigle","year":"1998","unstructured":"Delaigle JF, Vleeschouwer CD, Macq B (1998) Watermarking algorithm based on a human visual model. Signal Process 66(3):319\u2013335","journal-title":"Signal Process"},{"key":"7238_CR14","unstructured":"Droogenbroeck MV, and Delvaux J (2002) An entropy based technique for information embedding in images. Proc 3rd IEEE Benelux signal process symposium (SPS-2002)"},{"issue":"4","key":"7238_CR15","doi-asserted-by":"publisher","first-page":"043007","DOI":"10.1117\/1.JEI.22.4.043007","volume":"22","author":"M Fakhredanesh","year":"2013","unstructured":"Fakhredanesh M, Rahmati M, Safabakhsh R (2013) Adaptive image steganography using contourlet transform. J Electron Imaging 22(4):043007","journal-title":"J Electron Imaging"},{"issue":"3","key":"7238_CR16","doi-asserted-by":"publisher","first-page":"479","DOI":"10.4218\/etrij.14.0113.0171","volume":"36","author":"M Fakhredanesh","year":"2014","unstructured":"Fakhredanesh M, Safabakhsh R, Rahmati M (2014) A model-based image steganography method using Watson's visual model. ETRI J 36(3):479\u2013489","journal-title":"ETRI J"},{"key":"7238_CR17","doi-asserted-by":"crossref","unstructured":"Fridrich J (2004) Feature-based Steganalysis for JPEG images and its implications for future Design of Steganographic Schemes. Proc IH, Toronto, Canada, vol 3200, pp 67\u201381","DOI":"10.1007\/978-3-540-30114-1_6"},{"key":"7238_CR18","unstructured":"Fridrich J, Du R (1999) Secure Steganographic methods for palette images. Proc IH, New York, USA, pp 47\u201360"},{"key":"7238_CR19","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M (2003) Digital image steganography using stochastic modulation. Sec watermarking multimed contents, vol 5020, pp 191\u2013203","DOI":"10.1117\/12.479739"},{"key":"7238_CR20","doi-asserted-by":"crossref","unstructured":"Hu R, Chen F, Yu H (2010) Incorporating Watson's perceptual model into patchwork watermarking for digital images. Proc Int Conf image Vis (ICIP'10), Hong Kong, Sept 26\u201329, pp 3705\u20133708","DOI":"10.1109\/ICIP.2010.5652638"},{"issue":"10","key":"7238_CR21","doi-asserted-by":"publisher","first-page":"2426","DOI":"10.1002\/dac.2551","volume":"27","author":"H Huang","year":"2014","unstructured":"Huang H, Huang S, Chen J, Wang R, Xiong J (2014) An image information hiding algorithm based on grey system theory. Int J Commun Syst 27(10):2426\u20132442","journal-title":"Int J Commun Syst"},{"key":"7238_CR22","doi-asserted-by":"crossref","unstructured":"Jayalakshmi M, Merchant SN, Desai UB (2006) Significant pixel watermarking using human visual system model in wavelet domain. Proc CVGIP, Madurai, India, pp 206\u2013215","DOI":"10.1007\/11949619_19"},{"key":"7238_CR23","doi-asserted-by":"crossref","unstructured":"Jung YJ, Hahn M, Ro YM (2003) Spatial frequency band division in human visual system based watermarking. Proc IWDW, Seoul, Korea, pp 224\u2013234","DOI":"10.1007\/3-540-36617-2_19"},{"issue":"2","key":"7238_CR24","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/LSP.2010.2095498","volume":"18","author":"SW Jung","year":"2011","unstructured":"Jung SW, Ha LT, Ko SJ (2011) A new histogram-modification-based reversible data hiding algorithm considering the human visual system. Signal Process Lett, IEEE 18(2):95\u201398","journal-title":"Signal Process Lett, IEEE"},{"key":"7238_CR25","unstructured":"Kim SW, and Suthaharan S (2004) An entropy masking model for multimedia content watermarking. Proc 37th Annu Hawaii Int Conf system Sci"},{"key":"7238_CR26","doi-asserted-by":"crossref","unstructured":"Kim YS, Kwon OH, Park RH (1999) Wavelet based watermarking method for digital images using the human visual system. Proc ISCAS, vol 4, pp 80\u201383","DOI":"10.1049\/el:19990327"},{"key":"7238_CR27","doi-asserted-by":"crossref","unstructured":"Kodovsky J, Fridrich J (2009) Calibration revisited. Proc MM&sec, Princeton, NJ, USA, pp 62\u201374","DOI":"10.1145\/1597817.1597830"},{"issue":"2","key":"7238_CR28","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for Steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7238_CR29","unstructured":"Kwon OH, Kim YS, Park RH (1999) Watermarking for still images using the human visual system in the DCT domain. Proc ISCAS, Orlando, FL, USA, vol 4, pp 76\u201379"},{"key":"7238_CR30","first-page":"38","volume":"13","author":"D Levicky","year":"2004","unstructured":"Levicky D, Foris P (2004) Human visual system models in digital image Watermarking. Radioengineering 13:38\u201343","journal-title":"Radioengineering"},{"key":"7238_CR31","doi-asserted-by":"crossref","unstructured":"Li Y et al (2008) An adaptive blind watermarking algorithm based on DCT and modified Watson's visual model. Proc ISECS, Guangzhou, China, pp 904\u2013907","DOI":"10.1109\/ISECS.2008.83"},{"key":"7238_CR32","unstructured":"Lou DC, Liu JL, Hu MC (2003) Adaptive digital watermarking using neural network technique. Proc ICCST, pp 325\u2013332"},{"issue":"8","key":"7238_CR33","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"LM Marvel","year":"1999","unstructured":"Marvel LM, Boncelet CG, Retter CT (1999) Spread Spectrum image steganography. IEEE Trans Image Process 8(8):1075\u20131083","journal-title":"IEEE Trans Image Process"},{"issue":"10","key":"7238_CR34","first-page":"1506","volume":"28","author":"PB Nguyen","year":"2013","unstructured":"Nguyen PB, Beghdadi A, Luong M (2013) Perceptual watermarking using a new just-noticeable-difference model. Signal process: image. Communication 28(10):1506\u20131525","journal-title":"Communication"},{"key":"7238_CR35","doi-asserted-by":"crossref","unstructured":"Niu B (2017) An improvement image subjective quality evaluation model based on just noticeable difference. Proc 12th Int Conf Intell Inf hiding multimed signal Vis, Kaohsiung, Taiwan, vol 2, pp 93\u2013100","DOI":"10.1007\/978-3-319-50212-0_12"},{"issue":"3","key":"7238_CR36","first-page":"218","volume":"4","author":"S Oueslati","year":"2010","unstructured":"Oueslati S, Cherif A, Solaiman B (2010) A fuzzy watermarking approach based on the human visual system. Int J Image Process 4(3):218\u2013231","journal-title":"Int J Image Process"},{"key":"7238_CR37","doi-asserted-by":"crossref","unstructured":"Pan F et al (2011) Steganography based on minimizing embedding impact function and HVS. Proc ICECC, Zhejiang, China, pp 490\u2013493","DOI":"10.1109\/ICECC.2011.6067565"},{"key":"7238_CR38","doi-asserted-by":"crossref","unstructured":"Pevny T, Fridrich J (2007) Merging Markov and DCT features for multi-class JPEG Steganalysis. Proc SPIE, San Jose, CA, USA, vol 6505, p 650503\u2013650503\u201313","DOI":"10.1117\/12.696774"},{"key":"7238_CR39","unstructured":"Podilchuk CI, Zeng W (1997) Perceptual watermarking of still images. Proc IEEE multimed signal process, Princeton, NJ, USA, pp 363\u2013368"},{"issue":"4","key":"7238_CR40","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"CI Podilchuk","year":"1998","unstructured":"Podilchuk CI, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Selected Areas Communications 16(4):525\u2013539","journal-title":"IEEE J Selected Areas Communications"},{"key":"7238_CR41","doi-asserted-by":"crossref","unstructured":"Porter J, Rajan P (2006) Image adaptive watermarking techniques using models of the human visual system. Proc SSST, Cookeville, TN, USA, pp 354\u2013357","DOI":"10.1109\/SSST.2006.1619102"},{"key":"7238_CR42","unstructured":"Provos N (2001) Defending against statistical steganalysis. Proc USENIX Secur Symp, Washington, WA, USA, pp 323\u2013335"},{"key":"7238_CR43","unstructured":"Qazanfari K, Safabakhsh R (2011) A new adaptive method for hiding data in images. Proc 6th Iranian Conf machine vision image process, Tehran, Iran"},{"issue":"1","key":"7238_CR44","doi-asserted-by":"publisher","first-page":"013022","DOI":"10.1117\/1.JEI.21.1.013022","volume":"21","author":"K Qazanfari","year":"2012","unstructured":"Qazanfari K, Safabakhsh R (2012) Adaptive method for hiding data in images. J Electron Imaging 21(1):013022","journal-title":"J Electron Imaging"},{"issue":"4","key":"7238_CR45","doi-asserted-by":"publisher","first-page":"043009","DOI":"10.1117\/1.JEI.22.4.043009","volume":"22","author":"K Qazanfari","year":"2013","unstructured":"Qazanfari K, Safabakhsh R (2013) High-capacity method for hiding data in the discrete cosine transform domain. J Electron Imaging 22(4):043009","journal-title":"J Electron Imaging"},{"key":"7238_CR46","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.ins.2014.02.007","volume":"277","author":"K Qazanfari","year":"2014","unstructured":"Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90\u2013101","journal-title":"Inf Sci"},{"issue":"6","key":"7238_CR47","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.1007\/s11042-013-1733-0","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang CC, Lin CC (2015) An adaptive reversible steganographic scheme based on the just noticeable distortion. Multimed Tools Appl 74(6):1983\u20131995","journal-title":"Multimed Tools Appl"},{"key":"7238_CR48","doi-asserted-by":"crossref","unstructured":"Roy A, Maiti AK, Ghosh K (2015) A perception based color image adaptive watermarking scheme in YCbCr space. 2015 2nd Int Conf Signal Process Integr Netw (SPIN), Noida, pp 537\u2013543","DOI":"10.1109\/SPIN.2015.7095399"},{"key":"7238_CR49","doi-asserted-by":"crossref","unstructured":"Safabakhsh R, Zaboli S, and Tabibiazar A (2004) Digital watermarking on still images using wavelet transform. Proc IEEE Int Conf Inf technology: coding and computing, ITCC","DOI":"10.1109\/ITCC.2004.1286543"},{"key":"7238_CR50","doi-asserted-by":"crossref","unstructured":"Sallee P (2003) Model-based steganography. Digit watermarking, Seoul, Korea, vol 2939, pp 154\u2013167","DOI":"10.1007\/978-3-540-24624-4_12"},{"issue":"01","key":"7238_CR51","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0219467805001719","volume":"5","author":"P Sallee","year":"2005","unstructured":"Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image and graphics 5(01):167\u2013189","journal-title":"Int J Image and graphics"},{"key":"7238_CR52","unstructured":"Shu Z et al (2008) Watermarking algorithm based on Contourlet transform and human visual model. Proc ICESS, Sichuan, China, pp 348\u2013352"},{"key":"7238_CR53","doi-asserted-by":"crossref","unstructured":"Shu Z et al (2009) Watermarking algorithm based on Curvelet transform and human visual model. Proc ISECS, Nanchang, China, vol 1, pp 208\u2013212","DOI":"10.1109\/ISECS.2009.76"},{"key":"7238_CR54","doi-asserted-by":"crossref","unstructured":"Tang W, Wan W, Liu J, Sun J (2015) Improved spread transform dither modulation using luminance-based JND model. Proc 8th Int Conf image and graphics, ICIG 2015 II, pp 430\u2013437","DOI":"10.1007\/978-3-319-21963-9_39"},{"issue":"2","key":"7238_CR55","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11042-013-1423-y","volume":"72","author":"MJ Tsai","year":"2014","unstructured":"Tsai MJ, Liu J, Yin JS, Yuadi I (2014) A visible wavelet watermarking technique based on exploiting the contrast sensitivity function and noise reduction of human vision system. Multimed Tools Appl 72(2):1311\u20131340","journal-title":"Multimed Tools Appl"},{"key":"7238_CR56","unstructured":"Ullerich C, Westfeld A (2007) Weaknesses of MB2. 6th Int workshop digital watermarking (IWDW 2007). Springer, Berlin, pp 127\u2013142"},{"issue":"4","key":"7238_CR57","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"7238_CR58","unstructured":"Washington image database. www.cswashington.edu\/research\/imagedatabase\/groundtruth\/ . Accessed 2012"},{"key":"7238_CR59","unstructured":"Watson AB (1993) DCT quantization matrices visually optimized for individual images. Proc SPIE, San Jose, CA, USA, vol 1913, pp 202\u2013216"},{"issue":"8","key":"7238_CR60","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/83.605413","volume":"6","author":"AB Watson","year":"1997","unstructured":"Watson AB et al (1997) Visibility of wavelet quantization noise. IEEE Trans Image Process 6(8):1164\u20131175","journal-title":"IEEE Trans Image Process"},{"key":"7238_CR61","doi-asserted-by":"crossref","unstructured":"Watson AB, R Borthwick, and M Taylor (1997) Image quality and entropy masking. Proc SPIE 3016, human Vis electronic imaging II, San Jose, CA, USA","DOI":"10.1117\/12.274501"},{"key":"7238_CR62","doi-asserted-by":"crossref","unstructured":"Westfeld A (2001) F5-a Steganographic algorithm. Proc IH, Pittsburgh, PA, USA, pp 289\u2013302","DOI":"10.1007\/3-540-45496-9_21"},{"key":"7238_CR63","doi-asserted-by":"crossref","unstructured":"Xie G, Swamy M, Ahmad MO (2006) Perceptual-shaping comparison of DWT-based pixel-wise masking model with DCT-based Watson model. Proc ICIP, Atlanta, GA, pp 1381\u20131384","DOI":"10.1109\/ICIP.2006.312592"},{"key":"7238_CR64","unstructured":"Zhang Y (2009) Blind watermark algorithm based on HVS, and RBF neural network in DWT domain. W trans on Comput, Stevens Point, WI, USA vol 8, no 1, pp 174\u2013183"},{"issue":"1","key":"7238_CR65","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/LSP.2004.838214","volume":"12","author":"X Zhang","year":"2005","unstructured":"Zhang X, Wang S (2005) Steganography using Multiple-Base notational system and human vision sensitivity. Signal Process Lett, IEEE 12(1):67\u201370","journal-title":"Signal Process Lett, IEEE"},{"key":"7238_CR66","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yang C, Zhang Q (2014) Primal sketch based visual entropy model for digital watermarking. 2014 10th Int Conf natural computation (ICNC), Xiamen, pp 958\u2013963","DOI":"10.1109\/ICNC.2014.6975969"},{"key":"7238_CR67","unstructured":"Zhu G, Sang N (2008) An adaptive quantitative information hiding algorithm based on DCT domain of new visual model. Proc ISISE, Shanghai, China, vol 1, pp 546\u2013550"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7238-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7238-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7238-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T05:08:38Z","timestamp":1606280918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7238-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":67,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["7238"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7238-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"24 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}