{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:36:15Z","timestamp":1773524175196,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T00:00:00Z","timestamp":1559606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T00:00:00Z","timestamp":1559606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11042-019-7664-7","type":"journal-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T23:03:45Z","timestamp":1559689425000},"page":"25999-26022","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["FFT-ETM based distortion less and high payload image steganography"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4895-7544","authenticated-orcid":false,"given":"Ahmed","family":"Khan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aaliya","family":"Sarfaraz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,6,4]]},"reference":[{"key":"7664_CR1","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1109\/ACCESS.2017.2693438","volume":"5","author":"W Abdul","year":"2017","unstructured":"Abdul W, Ali Z, Ghouzali S, Alfawaz B, Muhammad G, Hossain MS (2017) Biometric security through visual encryption for fog edge computing. IEEE Access 5:5531\u20135538","journal-title":"IEEE Access"},{"issue":"6","key":"7664_CR2","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1049\/iet-ifs.2014.0245","volume":"9","author":"A Al-Haj","year":"2015","unstructured":"Al-Haj A, Abandah G, Hussein N (2015) Crypto-based algorithms for secured medical image transmission. IET Inf Secur 9(6):365\u2013373","journal-title":"IET Inf Secur"},{"issue":"04","key":"7664_CR3","doi-asserted-by":"publisher","first-page":"5060","DOI":"10.1109\/TIP.2015.2476961","volume":"24","author":"M Andalibi","year":"2015","unstructured":"Andalibi M, Chandler MD (2015) Digital Image Watermarking via Adaptive Logo Texturization. IEEE Trans Image Process 24(04):5060\u20135073","journal-title":"IEEE Trans Image Process"},{"issue":"09","key":"7664_CR4","doi-asserted-by":"publisher","first-page":"8002","DOI":"10.1109\/ACCESS.2016.2627241","volume":"4","author":"D Bhowmik","year":"2016","unstructured":"Bhowmik D, Oakes M, Abhayaratne C (2016) Visual Attention-Based Image Watermarking. IEEE Access 4(09):8002\u20138018","journal-title":"IEEE Access"},{"issue":"5","key":"7664_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2017.2727541","volume":"1","author":"A Bose","year":"2017","unstructured":"Bose A, Maity SP (2017) Spread spectrum watermark detection on degraded compressed sensing. IEEE Sensors Letters 1(5):1\u20134","journal-title":"IEEE Sensors Letters"},{"issue":"6","key":"7664_CR6","doi-asserted-by":"publisher","first-page":"7973","DOI":"10.1007\/s11042-016-3449-4","volume":"76","author":"S Chakraborty","year":"2017","unstructured":"Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76(6):7973\u20137987","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"7664_CR7","doi-asserted-by":"publisher","first-page":"3921","DOI":"10.1109\/TIP.2017.2706502","volume":"26","author":"CS Chang","year":"2017","unstructured":"Chang CS, Shen JJ (2017) Features classification Forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans Image Process 26(8):3921\u20133935","journal-title":"IEEE Trans Image Process"},{"issue":"24","key":"7664_CR8","doi-asserted-by":"publisher","first-page":"26463","DOI":"10.1007\/s11042-016-4177-5","volume":"76","author":"MA El-Bendary","year":"2017","unstructured":"El-Bendary MA (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimed Tools Appl 76(24):26463\u201326501","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"7664_CR9","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/LSP.2018.2844562","volume":"25","author":"G Gao","year":"2018","unstructured":"Gao G, Cui Z, Zhou C (2018) Blind reversible authentication based on PEE and CS reconstruction. IEEE Signal Processing Letters 25(7):1099\u20131103","journal-title":"IEEE Signal Processing Letters"},{"key":"7664_CR10","doi-asserted-by":"crossref","unstructured":"Guo Y, Cao X, Zhang W, Wang R (2018) Fake Colorized Image Detection. arXiv preprint arXiv:1801.02768","DOI":"10.1109\/TIFS.2018.2806926"},{"issue":"3","key":"7664_CR11","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1049\/cje.2015.07.014","volume":"24","author":"Y Huang","year":"2015","unstructured":"Huang Y, Kuo J, Hsieh W (2015) Capacity Controllable Location Map Free Reversible Watermarking. Chin J Electron 24(3):519\u2013523","journal-title":"Chin J Electron"},{"issue":"4","key":"7664_CR12","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1049\/iet-bmt.2017.0145","volume":"7","author":"O Juarez-Sandoval","year":"2018","unstructured":"Juarez-Sandoval O, Fragoso-Navarro E, Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano M, Perez-Meana H (2018) Improved imperceptible visible watermarking algorithm for auxiliary information delivery. IET Biometrics 7(4):305\u2013313","journal-title":"IET Biometrics"},{"issue":"4","key":"7664_CR13","first-page":"525","volume":"3","author":"A Khan","year":"2014","unstructured":"Khan A (2014) Joint Ownership Verification for Digital Text. Advances in Computer Science and its Applications 3(4):525\u2013531","journal-title":"Advances in Computer Science and its Applications"},{"issue":"6","key":"7664_CR14","first-page":"6091","volume":"27","author":"A Khan","year":"2015","unstructured":"Khan A (2015) Comparative Analysis of Watermarking Techniques. Forensic Sci Int 27(6):6091\u20136096","journal-title":"Forensic Sci Int"},{"issue":"4","key":"7664_CR15","first-page":"426","volume":"4","author":"A Khan","year":"2015","unstructured":"Khan A (2015) Robust Textual Steganography. Journal of Science 4(4):426\u2013434","journal-title":"Journal of Science"},{"issue":"2","key":"7664_CR16","first-page":"361","volume":"29","author":"A Khan","year":"2017","unstructured":"Khan A, Sarfaraz A (2017) Vetting the Security of Mobile Applications. Forensic Sci Int 29(2):361\u2013365","journal-title":"Forensic Sci Int"},{"key":"7664_CR17","unstructured":"Khan A, Sarfaraz A (2018) Novel High-Capacity Robust and Imperceptible Image Steganography Scheme using Multi Flipped Permutations and Frequency Entropy Matching Method. Soft Comput:1\u201312"},{"issue":"3","key":"7664_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.14257\/ijsia.2018.12.3.03","volume":"12","author":"A Khan","year":"2018","unstructured":"Khan A, Sarfaraz A (2018) Practical Guidelines for Securing Wireless Local Area Networks (WLANs). International Journal of Security and Its Applications 12(3):19\u201328","journal-title":"International Journal of Security and Its Applications"},{"issue":"5","key":"7664_CR19","first-page":"4451","volume":"28","author":"A Khan","year":"2016","unstructured":"Khan A, Sohaib M, Amjad FM (2016) High-Capacity Multi-layer Framework for Highly Robust Textual Steganography. Forensic Sci Int 28(5):4451\u20134457","journal-title":"Forensic Sci Int"},{"issue":"9","key":"7664_CR20","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1109\/TIFS.2018.2819122","volume":"13","author":"ZX Lin","year":"2018","unstructured":"Lin ZX, Peng F, Long M (2018) A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. IEEE Transactions on Information Forensics and Security 13(9):2372\u20132382","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"5","key":"7664_CR21","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"XL Liu","year":"2018","unstructured":"Liu XL, Lin CC, Yuan SM (2018) Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047\u20131055","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"10","key":"7664_CR22","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1049\/iet-ipr.2016.0862","volume":"11","author":"S Liu","year":"2017","unstructured":"Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding. IET Image Process 11(10):815\u2013821","journal-title":"IET Image Process"},{"key":"7664_CR23","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"issue":"6","key":"7664_CR24","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/CC.2017.7961371","volume":"14","author":"Z Ma","year":"2017","unstructured":"Ma Z (2017) Digital rights management: Model, technology and application. China Communications 14(6):156\u2013167","journal-title":"China Communications"},{"key":"7664_CR25","doi-asserted-by":"publisher","first-page":"29715","DOI":"10.1109\/ACCESS.2018.2841020","volume":"6","author":"S Mart\u00ednez","year":"2018","unstructured":"Mart\u00ednez S, G\u00e9rard S, Cabot J (2018) On Watermarking for Collaborative Model-Driven Engineering. IEEE Access 6:29715\u201329728","journal-title":"IEEE Access"},{"issue":"3","key":"7664_CR26","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1049\/iet-ipr.2017.0666","volume":"12","author":"I Mehra","year":"2017","unstructured":"Mehra I, Fatima A, Nishchal NK (2017) Gyrator wavelet transform. IET Image Process 12(3):432\u2013437","journal-title":"IET Image Process"},{"issue":"11","key":"7664_CR27","doi-asserted-by":"publisher","first-page":"13133","DOI":"10.1007\/s11042-017-4935-z","volume":"77","author":"A Miri","year":"2018","unstructured":"Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133\u201313144","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"7664_CR28","first-page":"19876","volume":"6","author":"LA Nazir","year":"2015","unstructured":"Nazir LA, Nasir HN, Shabir PA, Jong LW, Javaid SA, Bhat MG (2015) Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 6(16):19876\u201319897","journal-title":"IEEE Access"},{"issue":"6","key":"7664_CR29","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TIFS.2018.2790953","volume":"13","author":"X Nie","year":"2018","unstructured":"Nie X, Li X, Chai Y, Cui C, Xi X, Yin Y (2018) Robust image fingerprinting based on feature point relationship mining. IEEE Transactions on Information Forensics and Security 13(6):1509\u20131523","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"7664_CR30","unstructured":"Noor R, Khan A, Sarfaraz A (2018) High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device. Wirel Pers Commun:1\u201317"},{"key":"7664_CR31","doi-asserted-by":"crossref","unstructured":"Noor R, Khan A, Sarfaraz A, Mehmood Z, Cheema AM (2019) Highly Robust Hybrid Image Watermarking approach using Tchebichef Transform with Secured PCA and CAT Encryption. Soft Comput:1\u20139","DOI":"10.1007\/s00500-019-03838-2"},{"issue":"23","key":"7664_CR32","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1049\/el.2015.2522","volume":"51","author":"OR Preda","year":"2015","unstructured":"Preda OR, Vizireanu ND (2015) Watermarking-based image authentication robust to JPEG compression. Electron Lett 51(23):1873\u20131875","journal-title":"Electron Lett"},{"issue":"2","key":"7664_CR33","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCC.2018.022171667","volume":"5","author":"Z Qin","year":"2018","unstructured":"Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Computing 5(2):48\u201357","journal-title":"IEEE Cloud Computing"},{"issue":"2","key":"7664_CR34","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1109\/TLA.2016.7437257","volume":"14","author":"RL Roldan","year":"2016","unstructured":"Roldan RL, Hernandez CM, Chao J, Miyatake NM, Hector MP (2016) Watermarking-based Color Image Authentication with Detection and Recovery Capability. IEEE Lat Am Trans 14(2):1050\u20131057","journal-title":"IEEE Lat Am Trans"},{"issue":"11","key":"7664_CR35","doi-asserted-by":"publisher","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493\u201313510","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"7664_CR36","first-page":"5388","volume":"8","author":"CZ Sangita","year":"2015","unstructured":"Sangita CZ, Venkatachalam P, Krishna BM (2015) Secure Dissemination and Protection of Multispectral Images Using Crypto-Watermarking. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 8(23):5388\u20135394","journal-title":"IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing"},{"issue":"4","key":"7664_CR37","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s11277-018-5989-6","volume":"103","author":"A Sarfaraz","year":"2018","unstructured":"Sarfaraz A, Khan A (2018) Feature Selection based Correlation Attack on HTTPS Secure Searching. Wirel Pers Commun 103(4):2995\u20133008","journal-title":"Wirel Pers Commun"},{"issue":"11","key":"7664_CR38","first-page":"1917","volume":"23","author":"S Sarreshtedari","year":"2015","unstructured":"Sarreshtedari S, Akhaee MA, Abbasfar A (2015) A watermarking method for digital speech self-recovery. IEEE\/ACM Transactions on Audio, Speech and Language Processing 23(11):1917\u20131925","journal-title":"IEEE\/ACM Transactions on Audio, Speech and Language Processing"},{"issue":"5","key":"7664_CR39","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1049\/iet-ipr.2017.0898","volume":"12","author":"HR Shahdoosti","year":"2017","unstructured":"Shahdoosti HR, Salehi M (2017) Transform-based watermarking algorithm maintaining perceptual transparency. IET Image Process 12(5):751\u2013759","journal-title":"IET Image Process"},{"issue":"25","key":"7664_CR40","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1049\/el.2015.0247","volume":"51","author":"A Siddiqa","year":"2015","unstructured":"Siddiqa A, Khan A (2015) High capacity reversible image watermarking using error expansion and context-dependent embedding. Electron Lett 51(25):985\u2013987","journal-title":"Electron Lett"},{"issue":"6","key":"7664_CR41","doi-asserted-by":"publisher","first-page":"5966","DOI":"10.1109\/TIA.2017.2726499","volume":"53","author":"H Unno","year":"2017","unstructured":"Unno H, Uehira K (2017) Display technique for embedding information in real object images using temporally and spatially luminance-modulated light. IEEE Trans Ind Appl 53(6):5966\u20135971","journal-title":"IEEE Trans Ind Appl"},{"issue":"1","key":"7664_CR42","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TIA.2016.2604217","volume":"53","author":"H Unno","year":"2017","unstructured":"Unno H, Yamkum R, Bunporn C, Uehira K (2017) A new displaying technology for information hiding using temporally brightness modulated pattern. IEEE Trans Ind Appl 53(1):596\u2013601","journal-title":"IEEE Trans Ind Appl"},{"issue":"10","key":"7664_CR43","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1049\/iet-ipr.2016.0927","volume":"11","author":"Y Wang","year":"2017","unstructured":"Wang Y, Liu J, Yang Y, Ma D, Liu R (2017) 3D model watermarking algorithm robust to geometric attacks. IET Image Process 11(10):822\u2013832","journal-title":"IET Image Process"},{"issue":"4","key":"7664_CR44","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TIP.2018.2795745","volume":"27","author":"YG Wang","year":"2018","unstructured":"Wang YG, Zhu G, Shi YQ (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063\u20132077","journal-title":"IEEE Trans Image Process"},{"key":"7664_CR45","unstructured":"Wei Q, Yin Z, Wang Z, Zhang X (2017) Distortion function based on residual blocks for JPEG steganography. Multimed Tools Appl:1\u201314"},{"key":"7664_CR46","doi-asserted-by":"crossref","unstructured":"Wei Y, Zhang W, Li W, Yu N, Sun X (2017) Which gray level should be given the smallest cost for adaptive steganography? Multimed Tools Appl:1\u201314","DOI":"10.1007\/s11042-017-4565-5"},{"issue":"8","key":"7664_CR47","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1109\/TCSVT.2016.2556585","volume":"27","author":"HZ Wu","year":"2017","unstructured":"Wu HZ, Shi YQ, Zhou LN (2017) Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Transactions on Circuits and Systems for Video Technology 27(8):1620\u20131631","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"6","key":"7664_CR48","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1109\/JSEE.2015.00143","volume":"26","author":"J Zhao","year":"2015","unstructured":"Zhao J, Zhang N, Jia J, Wang H (2015) Digital watermarking algorithm based on scale-invariant feature regions in non-subsampled contourlet transform domain. J Syst Eng Electron 26(6):1309\u20131314","journal-title":"J Syst Eng Electron"},{"issue":"5","key":"7664_CR49","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","volume":"25","author":"T Zong","year":"2015","unstructured":"Zong T, Xiang Y, Natgunanathan I, Guo S, Zhou W, Beliakov G (2015) Robust Histogram Shape-Based Method for Image Watermarking. IEEE Transactions on Circuits and Systems for Video Technology 25(5):717\u2013729","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7664-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-7664-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-7664-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T23:13:36Z","timestamp":1591139616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-7664-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,4]]},"references-count":49,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["7664"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-7664-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,4]]},"assertion":[{"value":"3 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}