{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T08:46:14Z","timestamp":1766133974885,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"33-34","license":[{"start":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T00:00:00Z","timestamp":1593475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T00:00:00Z","timestamp":1593475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11042-020-09129-5","type":"journal-article","created":{"date-parts":[[2020,6,30]],"date-time":"2020-06-30T11:04:42Z","timestamp":1593515082000},"page":"25089-25113","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["L*a*b* color space high capacity steganography utilizing quad-trees"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6304-2468","authenticated-orcid":false,"given":"Nour","family":"Mohamed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0272-2659","authenticated-orcid":false,"given":"Mohammed","family":"Baziyad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4003-1592","authenticated-orcid":false,"given":"Tamer","family":"Rabie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5546-939X","authenticated-orcid":false,"given":"Ibrahim","family":"Kamel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,30]]},"reference":[{"key":"9129_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Ph.D. dissertation, University of Buckingham"},{"key":"9129_CR2","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Stego quality enhancement by message size reduction and fibonacci bit-plane mapping. In: International Conference on Research in Security Standardisation. Springer, pp 151\u2013166","DOI":"10.1007\/978-3-319-14054-4_10"},{"issue":"1","key":"9129_CR3","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"100","author":"N Ahmed","year":"1974","unstructured":"Ahmed N, Natarajan T, Rao KR (1974) Discrete cosine transform. IEEE Trans Comput 100(1):90\u201393","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"9129_CR4","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"RJ Anderson","year":"1998","unstructured":"Anderson RJ, Petitcolas FA (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474\u2013481","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"9129_CR5","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1007\/s11042-013-1640-4","volume":"73","author":"C Balasubramanian","year":"2014","unstructured":"Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed Tools Appl 73(3):2223\u20132245","journal-title":"Multimed Tools Appl"},{"key":"9129_CR6","doi-asserted-by":"crossref","unstructured":"Baziyad M, Rabie T, Kamel I (2018) Extending steganography payload capacity using the l* a* b* color space. In: 2018 International Conference on Innovations in Information Technology (IIT). IEEE, pp 1\u20136","DOI":"10.1109\/INNOVATIONS.2018.8606008"},{"key":"9129_CR7","unstructured":"Bracamonte J, Ansorge M, Pellandini F, Farine P-A (2004) Low complexity image matching in the compressed domain by using the dct-phase. In: Proceedings of the 6th COST 276 Workshop on Information and Knowledge Management for Integrated Media Communication, vol 267, no. 6. COST (European Cooperation in the field of Scientific and Technical Research), pp 88\u201393"},{"key":"9129_CR8","doi-asserted-by":"crossref","unstructured":"Bracamonte J, Ansorge M, Pellandini F, Farine P-A (2005) Efficient compressed domain target image search and retrieval. In: International Conference on Image and Video Retrieval. Springer, pp 154\u2013163","DOI":"10.1007\/11526346_19"},{"issue":"6","key":"9129_CR9","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1049\/ip-vis:20045047","volume":"152","author":"G Brisbane","year":"2005","unstructured":"Brisbane G, Safavi-Naini R, Ogunbona P (2005) High-capacity steganography using a shared colour palette. IEE Proc-Vis Image Signal Process 152(6):787\u2013792","journal-title":"IEE Proc-Vis Image Signal Process"},{"issue":"10","key":"9129_CR10","doi-asserted-by":"publisher","first-page":"2886","DOI":"10.1117\/1.1604783","volume":"42","author":"W-Y Chen","year":"2003","unstructured":"Chen W-Y, Chen C-H, et al. (2003) Public-key image steganography using discrete cosine transform and quadtree partition vector quantization coding. Opt Eng 42(10):2886\u20132892","journal-title":"Opt Eng"},{"key":"9129_CR11","doi-asserted-by":"crossref","unstructured":"Ebrahimpour-Komleh H, Chandran V, Sridharan S (2001) Face recognition using fractal codes. In: Proceedings 2001 International Conference on Image Processing (Cat. No. 01CH37205), vol 3. IEEE, pp 58\u201361","DOI":"10.1109\/ICIP.2001.958050"},{"issue":"14","key":"9129_CR12","doi-asserted-by":"publisher","first-page":"6123","DOI":"10.1016\/j.eswa.2014.04.022","volume":"41","author":"HR Kanan","year":"2014","unstructured":"Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123\u20136130","journal-title":"Expert Syst Appl"},{"issue":"3","key":"9129_CR13","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1049\/ip-vis:20000341","volume":"147","author":"Y-K Lee","year":"2000","unstructured":"Lee Y-K, Chen L-H (2000) High capacity image steganographic model, IEE Proceedings-Vision. Image Signal Process 147(3):288\u2013294","journal-title":"Image Signal Process"},{"issue":"3","key":"9129_CR14","first-page":"220","volume":"1","author":"C-C Lin","year":"2010","unstructured":"Lin C-C, Shiu P-F (2010) High capacity data hiding scheme for dct-based images. J Inf Hiding Multimed Signal Process 1(3):220\u2013240","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"9129_CR15","doi-asserted-by":"crossref","unstructured":"Mozaffari S, Faez K, Ziaratban M (2005) Character representation and recognition using quad tree-based fractal encoding scheme. In: Eighth International Conference on Document Analysis and Recognition (ICDAR\u201905). IEEE, pp 819\u2013823","DOI":"10.1109\/ICDAR.2005.72"},{"issue":"1","key":"9129_CR16","first-page":"114","volume":"2007","author":"J-C Pinoli","year":"2007","unstructured":"Pinoli J-C, Debayle J (2007) Logarithmic adaptive neighborhood image processing (lanip): introduction, connections to human brightness perception, and application issues. EURASIP J Appl Signal Process 2007(1):114\u2013114","journal-title":"EURASIP J Appl Signal Process"},{"issue":"3","key":"9129_CR17","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1109\/TIP.2013.2260760","volume":"23","author":"C Qin","year":"2014","unstructured":"Qin C, Chang C-C, Chiu Y-P (2014) A novel joint data-hiding and compression scheme based on smvq and image inpainting. IEEE Trans Image Process 23(3):969\u2013978","journal-title":"IEEE Trans Image Process"},{"issue":"15","key":"9129_CR18","doi-asserted-by":"publisher","first-page":"5861","DOI":"10.1007\/s11042-014-1894-5","volume":"74","author":"C Qin","year":"2015","unstructured":"Qin C, Chang C-C, Hsu T-J (2015) Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimed Tools Appl 74(15):5861\u20135872","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"9129_CR19","doi-asserted-by":"publisher","first-page":"5939","DOI":"10.1007\/s11042-015-2557-x","volume":"75","author":"T Rabie","year":"2016","unstructured":"Rabie T, Kamel I (2016) On the embedding limits of the discrete cosine transform. Multimed Tools Appl 75(10):5939\u20135957","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"9129_CR20","doi-asserted-by":"publisher","first-page":"6473","DOI":"10.1007\/s11042-016-3301-x","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76(5):6473\u20136493","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"9129_CR21","doi-asserted-by":"publisher","first-page":"8627","DOI":"10.1007\/s11042-016-3501-4","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimed Tools Appl 76 (6):8627\u20138650","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"9129_CR22","doi-asserted-by":"publisher","first-page":"23,673","DOI":"10.1007\/s11042-018-5713-2","volume":"77","author":"T Rabie","year":"2018","unstructured":"Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the laplacian pyramid. Multimed Tools Appl 77(18):23,673\u201323,698","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"9129_CR23","doi-asserted-by":"publisher","first-page":"8295","DOI":"10.1007\/s11042-017-4727-5","volume":"77","author":"T Rabie","year":"2018","unstructured":"Rabie T, Kamel I, Baziyad M (2018) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimed Tools Appl 77(7):8295\u20138326","journal-title":"Multimed Tools Appl"},{"key":"9129_CR24","doi-asserted-by":"crossref","unstructured":"Rabie T, Baziyad M, Bonny T, Fareh R (2020) Toward a unified performance metric for benchmarking steganography systems. Journal of Circuits, Systems and Computers 29(3)","DOI":"10.1142\/S0218126620500425"},{"key":"9129_CR25","doi-asserted-by":"crossref","unstructured":"Schanda J (2007) Colorimetry: understanding the CIE system. Wiley, New York","DOI":"10.1002\/9780470175637"},{"key":"9129_CR26","doi-asserted-by":"crossref","unstructured":"Sedighi V, Fridrich J, Cogranne R (2015) Content-adaptive pentary steganography using the multivariate generalized gaussian cover model. In: Media Watermarking, Security, and Forensics 2015, vol. 9409. International Society for Optics and Photonics, pp 94090H","DOI":"10.1117\/12.2080272"},{"issue":"2","key":"9129_CR27","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Secur 11(2):221\u2013234","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"8","key":"9129_CR28","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/31.1856","volume":"35","author":"W-J Song","year":"1988","unstructured":"Song W-J, Pearlman WA (1988) Edge-preserving noise filtering based on adaptive windowing. IEEE Trans Circ Syst 35(8):1048\u20131055","journal-title":"IEEE Trans Circ Syst"},{"issue":"3","key":"9129_CR29","first-page":"219","volume":"5","author":"G Swain","year":"2014","unstructured":"Swain G, Lenka SK (2014) Classification of image steganography techniques in spatial domain: a study. Int J Comput Sci Eng Technol 5(3):219\u2013232","journal-title":"Int J Comput Sci Eng Technol"},{"issue":"4","key":"9129_CR30","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"9129_CR31","unstructured":"Wang X, Yao T, Li C-T (2005) A palette-based image steganographic method using colour quantisation. In: IEEE International Conference on Image Processing 2005, vol 2. IEEE, pp II\u20131090"},{"key":"9129_CR32","doi-asserted-by":"crossref","unstructured":"Yang B, Schmucker M, Funk W, Busch C, Sun S (2004) Integer dct-based reversible watermarking for images using companding technique. In: Security, steganography, and watermarking of multimedia contents VI, vol. 5306. International Society for Optics and Photonics, pp 405\u2013416","DOI":"10.1117\/12.527216"},{"issue":"8","key":"9129_CR33","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TIP.2011.2109730","volume":"20","author":"L Zhang","year":"2011","unstructured":"Zhang L, Zhang L, Mou X, Zhang D (2011) Fsim: a feature similarity index for image quality assessment. IEEE Trans Image Process 20(8):2378\u20132386","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09129-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09129-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09129-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T23:43:27Z","timestamp":1625010207000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09129-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,30]]},"references-count":33,"journal-issue":{"issue":"33-34","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["9129"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09129-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,6,30]]},"assertion":[{"value":"24 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}