{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:36:29Z","timestamp":1774942589325,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"29-30","license":[{"start":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T00:00:00Z","timestamp":1588118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T00:00:00Z","timestamp":1588118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11042-020-08951-1","type":"journal-article","created":{"date-parts":[[2020,4,29]],"date-time":"2020-04-29T05:08:47Z","timestamp":1588136927000},"page":"20973-20993","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Extended exploiting modification direction based steganography using hashed-weightage Array"],"prefix":"10.1007","volume":"79","author":[{"given":"Shaswata","family":"Saha","sequence":"first","affiliation":[]},{"given":"Anuran","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Agneet","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Souvik","family":"Dhargupta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8697-0803","authenticated-orcid":false,"given":"Sudipta Kr","family":"Ghosal","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,29]]},"reference":[{"key":"8951_CR1","unstructured":"N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, \u201cImage steganography techniques: an overview,\u201d Int. J. Comput. Sci. Secur., 2012."},{"key":"8951_CR2","doi-asserted-by":"publisher","unstructured":"W. Bender, D. Gruhl, N. Morimoto, and A. Lu, \u201cTechniques for data hiding,\u201d IBM Syst. J., 1996, doi: https:\/\/doi.org\/10.1147\/sj.353.0313, Techniques for data hiding.","DOI":"10.1147\/sj.353.0313"},{"key":"8951_CR3","doi-asserted-by":"publisher","unstructured":"R. Z. Wang, C. F. Lin, and J. C. Lin, \u201cImage hiding by optimal LSB substitution and genetic algorithm,\u201d Pattern Recognit., 2001, doi: https:\/\/doi.org\/10.1016\/S0031-3203(00)00015-7, Image hiding by optimal LSB substitution and genetic algorithm.","DOI":"10.1016\/S0031-3203(00)00015-7"},{"key":"8951_CR4","doi-asserted-by":"publisher","unstructured":"C. C. Chang, P. Tsai, and M. H. Lin, \u201cAn adaptive steganography for index-based images using codeword grouping,\u201d Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), 2004, doi: https:\/\/doi.org\/10.1007\/978-3-540-30543-9_91.","DOI":"10.1007\/978-3-540-30543-9_91"},{"issue":"11","key":"8951_CR5","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient Steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783. https:\/\/doi.org\/10.1109\/LCOMM.2006.060863","journal-title":"IEEE Commun Lett"},{"key":"8951_CR6","doi-asserted-by":"publisher","unstructured":"S. K. Ghosal and J. K. Mandal, \u201cOn the use of the Stirling transform in image steganography,\u201d J. Inf. Secur. Appl., 2019, doi: https:\/\/doi.org\/10.1016\/j.jisa.2018.04.003, On the use of the Stirling Transform in image steganography.","DOI":"10.1016\/j.jisa.2018.04.003"},{"key":"8951_CR7","doi-asserted-by":"publisher","unstructured":"S. Saha, S. K. Ghosal, A. Chakraborty, S. Dhargupta, R. Sarkar, and J. K. Mandal, \u201cImproved exploiting modification direction-based steganography using dynamic weightage array,\u201d Electron. Lett., 2018, doi: https:\/\/doi.org\/10.1049\/el.2017.3336, Improved exploiting modification direction-based steganography using dynamic weightage array.","DOI":"10.1049\/el.2017.3336"},{"key":"8951_CR8","doi-asserted-by":"publisher","unstructured":"M. Hussain, A. W. Abdul Wahab, A. T. S. Ho, N. Javed, and K. H. Jung, \u201cA data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement,\u201d Signal Process. Image Commun., 2017, doi: https:\/\/doi.org\/10.1016\/j.image.2016.10.005, A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement.","DOI":"10.1016\/j.image.2016.10.005"},{"key":"8951_CR9","doi-asserted-by":"publisher","unstructured":"Y. Liu, C. C. Chang, P. C. Huang, and C. Y. Hsu, \u201cEfficient Information Hiding Based on Theory of Numbers,\u201d Symmetry (Basel)., vol. 10, no. 1, p. 19, Jan. 2018, doi: https:\/\/doi.org\/10.3390\/sym10010019.","DOI":"10.3390\/sym10010019"},{"key":"8951_CR10","doi-asserted-by":"publisher","unstructured":"C. K. Chan and L. M. Cheng, \u201cHiding data in images by simple LSB substitution,\u201d Pattern Recognit., 2004, doi: https:\/\/doi.org\/10.1016\/j.patcog.2003.08.007, Hiding data in images by simple LSB substitution.","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"8951_CR11","doi-asserted-by":"publisher","unstructured":"J. Bai, C. C. Chang, T. S. Nguyen, C. Zhu, and Y. Liu, \u201cA high payload steganographic algorithm based on edge detection,\u201d Displays, 2017, doi: https:\/\/doi.org\/10.1016\/j.displa.2016.12.004, A high payload steganographic algorithm based on edge detection.","DOI":"10.1016\/j.displa.2016.12.004"},{"key":"8951_CR12","doi-asserted-by":"publisher","unstructured":"D. Chaudhary, S. Gupta, and S. Deswal, \u201cOrigin of Hybrid Security Mechanisms and Ways of Improvement,\u201d Int. J. Big Data Secur. Intell., 2015, doi: https:\/\/doi.org\/10.21742\/ijbdsi.2015.2.2.01.","DOI":"10.21742\/ijbdsi.2015.2.2.01"},{"key":"8951_CR13","doi-asserted-by":"publisher","unstructured":"T. Rabie, \u201cDigital image steganography: an FFT approach,\u201d in Communications in Computer and Information Science, 2012, doi: https:\/\/doi.org\/10.1007\/978-3-642-30567-2_18.","DOI":"10.1007\/978-3-642-30567-2_18"},{"key":"8951_CR14","doi-asserted-by":"publisher","unstructured":"A. A. Al-Ataby and F. M. Al-Naima Fiete, \u201cHigh capacity image steganography based on curvelet transform,\u201d in Proceedings - 4th International Conference on Developments in eSystems Engineering, DeSE 2011, 2011, doi: https:\/\/doi.org\/10.1109\/DeSE.2011.13.","DOI":"10.1109\/DeSE.2011.13"},{"key":"8951_CR15","doi-asserted-by":"crossref","unstructured":"E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, \u201cHigh capacity image steganography using wavelet transform and genetic algorithm,\u201d in IMECS 2011 - international MultiConference of engineers and computer scientists 2011, 2011.","DOI":"10.1007\/978-1-4614-1695-1_30"},{"key":"8951_CR16","doi-asserted-by":"publisher","unstructured":"Z. Pan, X. Ma, and X. Deng, \u201cNew reversible full-embeddable information hiding method for vector quantisation indices based on locally adaptive complete coding list,\u201d IET Image Process., 2015, doi: https:\/\/doi.org\/10.1049\/iet-ipr.2014.0310, New reversible full-embeddable information hiding method for vector quantisation indices based on locally adaptive complete coding list.","DOI":"10.1049\/iet-ipr.2014.0310"},{"key":"8951_CR17","unstructured":"M. A. Alia and A. A. Yahya, \u201cPublic-key steganography based on matching method,\u201d Eur. J. Sci. Res., 2010."},{"key":"8951_CR18","doi-asserted-by":"publisher","unstructured":"M. R. Islam, A. Siddiqa, M. P. Uddin, A. K. Mandal, and M. D. Hossain, \u201cAn efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography,\u201d in 2014 International conference on informatics, Electronics and Vision, ICIEV 2014, 2014, doi: https:\/\/doi.org\/10.1109\/ICIEV.2014.6850714.","DOI":"10.1109\/ICIEV.2014.6850714"},{"key":"8951_CR19","doi-asserted-by":"publisher","unstructured":"A. Chatterjee, S. K. Ghosal, and R. Sarkar, \u201cLSB based steganography with OCR: an intelligent amalgamation,\u201d Multimed. Tools Appl., 2020, doi: https:\/\/doi.org\/10.1007\/s11042-019-08472-6, LSB based steganography with OCR: an intelligent amalgamation.","DOI":"10.1007\/s11042-019-08472-6"},{"key":"8951_CR20","doi-asserted-by":"publisher","unstructured":"N. Tayal, R. Bansal, S. Dhal, and S. Gupta, \u201cA novel hybrid security mechanism for data communication networks,\u201d Multimed. Tools Appl., 2017, doi: https:\/\/doi.org\/10.1007\/s11042-016-4111-x, A novel hybrid security mechanism for data communication networks.","DOI":"10.1007\/s11042-016-4111-x"},{"key":"8951_CR21","doi-asserted-by":"publisher","unstructured":"R. Bansal, S. Gupta, and G. Sharma, \u201cAn innovative image encryption scheme based on chaotic map and Vigen\u00e8re scheme,\u201d Multimed. Tools Appl., 2017, doi: https:\/\/doi.org\/10.1007\/s11042-016-3926-9, An innovative image encryption scheme based on chaotic map and Vigen\u00e8re scheme.","DOI":"10.1007\/s11042-016-3926-9"},{"key":"8951_CR22","doi-asserted-by":"publisher","unstructured":"C. C. Chang, Y. C. Chou, and D. Kieu, \u201cAn information hiding scheme using Sudoku,\u201d in 3rd International Conference on Innovative Computing Information and Control, ICICIC\u201908, 2008, doi: https:\/\/doi.org\/10.1109\/ICICIC.2008.149.","DOI":"10.1109\/ICICIC.2008.149"},{"key":"8951_CR23","doi-asserted-by":"publisher","unstructured":"Q. Mao, K. Bharanitharan, and C. C. Chang, \u201cMulti-round dynamic swap optimisation for table-based steganography,\u201d IET Image Process., 2015, doi: https:\/\/doi.org\/10.1049\/iet-ipr.2015.0065, Multi-round dynamic swap optimisation for table-based steganography.","DOI":"10.1049\/iet-ipr.2015.0065"},{"key":"8951_CR24","doi-asserted-by":"publisher","unstructured":"Z. X. Yin, C. C. Chang, Q. Xu, and B. Luo, \u201cSecond-order steganographic method based on adaptive reference matrix,\u201d IET Image Process., 2015, doi: https:\/\/doi.org\/10.1049\/iet-ipr.2014.0159, Second-order steganographic method based on adaptive reference matrix.","DOI":"10.1049\/iet-ipr.2014.0159"},{"key":"8951_CR25","doi-asserted-by":"publisher","unstructured":"C. C. Chang, W. L. Tai, and K. N. Chen, \u201cImprovements of EMD embedding for large payloads,\u201d in Proceedings - 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007., 2007, doi: https:\/\/doi.org\/10.1109\/IIHMSP.2007.4457590.","DOI":"10.1109\/IIHMSP.2007.4457590"},{"key":"8951_CR26","unstructured":"K. H. Jung, \u201cImproved Exploiting Modification Direction Method by Modulus Operation,\u201d vol. 2, no. 1, pp. 79\u201388, 2009."},{"key":"8951_CR27","doi-asserted-by":"publisher","unstructured":"N. T. Huynh, K. Bharanitharan, and H. S. Hsueh, \u201cEfficient Combinatorial Optimization Algorithm for Exploiting Modification Direction in Data Embedding,\u201d Indian J. Sci. Technol., 2016, doi: https:\/\/doi.org\/10.17485\/ijst\/2016\/v9i28\/92733.","DOI":"10.17485\/ijst\/2016\/v9i28\/92733"},{"key":"8951_CR28","doi-asserted-by":"publisher","unstructured":"A. A. Abdulla, H. Sellahewa, and S. A. Jassim, \u201cStego quality enhancement by message size reduction and fibonacci bit-plane mapping,\u201d in Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), 2014, doi: https:\/\/doi.org\/10.1007\/978-3-319-14054-4_10.","DOI":"10.1007\/978-3-319-14054-4_10"},{"issue":"6","key":"8951_CR29","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1177\/0165551518816303","volume":"45","author":"A Rehman","year":"2019","unstructured":"Rehman A, Saba T, Mahmood T, Mehmood Z, Shah M, Anjum A (Dec. 2019) Data hiding technique in steganography for information security using number theory. J Inf Sci 45(6):767\u2013778. https:\/\/doi.org\/10.1177\/0165551518816303","journal-title":"J Inf Sci"},{"key":"8951_CR30","doi-asserted-by":"publisher","unstructured":"D. R. I. M. Setiadi, \u201cPayload enhancement on least significant bit image steganography using edge area dilation,\u201d Int. J. Electron. Telecommun., 2019, doi: https:\/\/doi.org\/10.24425\/ijet.2019.126312.","DOI":"10.24425\/ijet.2019.126312"},{"key":"8951_CR31","doi-asserted-by":"publisher","unstructured":"Z. F. Yaseen and A. A. Kareem, \u201cImage steganography based on hybrid edge detector to Hide encrypted image using Vernam algorithm,\u201d in SCCS 2019\u20132019 2nd Scientific Conference of Computer Sciences, 2019, doi: https:\/\/doi.org\/10.1109\/SCCS.2019.8852625.","DOI":"10.1109\/SCCS.2019.8852625"},{"key":"8951_CR32","doi-asserted-by":"publisher","unstructured":"H. S. Leng and H. W. Tseng, \u201cGeneralize the EMD scheme on an n-dimensional hypercube with maximum payload,\u201d Multimed. Tools Appl., 2019, doi: https:\/\/doi.org\/10.1007\/s11042-019-7228-x, Generalize the EMD scheme on an n-dimensional hypercube with maximum payload.","DOI":"10.1007\/s11042-019-7228-x"},{"key":"8951_CR33","doi-asserted-by":"publisher","unstructured":"A. A. Abd EL-Latif, B. Abd-El-Atty, and S. E. Venegas-Andraca, \u201cA novel image steganography technique based on quantum substitution boxes,\u201d Opt. Laser Technol., 2019, doi: https:\/\/doi.org\/10.1016\/j.optlastec.2019.03.005, A novel image steganography technique based on quantum substitution boxes.","DOI":"10.1016\/j.optlastec.2019.03.005"},{"key":"8951_CR34","doi-asserted-by":"publisher","unstructured":"S. Dhargupta, A. Chakraborty, S. K. Ghosal, S. Saha, and R. Sarkar, \u201cFuzzy edge detection based steganography using modified Gaussian distribution,\u201d Multimed. Tools Appl., Jan. 2019, doi: https:\/\/doi.org\/10.1007\/s11042-018-7123-x, Fuzzy edge detection based steganography using modified Gaussian distribution.","DOI":"10.1007\/s11042-018-7123-x"},{"key":"8951_CR35","doi-asserted-by":"publisher","unstructured":"X. Liao, Y. Yu, B. Li, Z. Li, and Z. Qin, \u201cA new payload partition strategy in color image steganography,\u201d IEEE Trans. Circuits Syst. Video Technol., 2019, doi: https:\/\/doi.org\/10.1109\/tcsvt.2019.2896270, A New Payload Partition Strategy in Color Image Steganography.","DOI":"10.1109\/tcsvt.2019.2896270"},{"key":"8951_CR36","doi-asserted-by":"publisher","unstructured":"B. Carpentieri, A. Castiglione, A. De Santis, F. Palmieri, and R. Pizzolante, \u201cCompression-based steganography,\u201d in Concurrency computation , 2019, doi: https:\/\/doi.org\/10.1002\/cpe.5322, 32.","DOI":"10.1002\/cpe.5322"},{"key":"8951_CR37","unstructured":"A. A. Abdulla, \u201cExploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography,\u201d 2015."},{"key":"8951_CR38","doi-asserted-by":"publisher","unstructured":"J. Fridrich, M. Goljan, and R. Du, \u201cDetecting LSB steganography in color and gray-scale images,\u201d IEEE Multimed., 2001, doi: https:\/\/doi.org\/10.1109\/93.959097, Detecting LSB steganography in color, and gray-scale images.","DOI":"10.1109\/93.959097"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08951-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08951-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08951-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T23:34:05Z","timestamp":1619652845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08951-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,29]]},"references-count":38,"journal-issue":{"issue":"29-30","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["8951"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08951-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,29]]},"assertion":[{"value":"16 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}