{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:47:36Z","timestamp":1776293256221,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T00:00:00Z","timestamp":1599264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T00:00:00Z","timestamp":1599264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09519-9","type":"journal-article","created":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T16:02:27Z","timestamp":1599321747000},"page":"831-854","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["A novel minimal distortion-based edge adaptive image steganography scheme using local complexity"],"prefix":"10.1007","volume":"80","author":[{"given":"Debina","family":"Laishram","sequence":"first","affiliation":[]},{"given":"Themrichon","family":"Tuithung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,5]]},"reference":[{"key":"9519_CR1","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90:727\u2013752","journal-title":"Signal Process"},{"key":"9519_CR2","doi-asserted-by":"crossref","unstructured":"Bai J, Chang C-C, Nguyen S, Zhu C, Liu Y (2017) A high payload steganographic algorithm based on edge detection. Displays, pp 46","DOI":"10.1016\/j.displa.2016.12.004"},{"issue":"4","key":"9519_CR3","first-page":"55","volume":"60","author":"Y Bassil","year":"2012","unstructured":"Bassil Y (2012) Image Steganography based on a Parameterized Canny Edge Detection Algorithm. Int J Comput Appl 60(4):55\u201340","journal-title":"Int J Comput Appl"},{"issue":"2","key":"9519_CR4","first-page":"142","volume":"2","author":"B Li","year":"2011","unstructured":"Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing 2(2):142\u2013172","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"9519_CR5","doi-asserted-by":"publisher","first-page":"7973","DOI":"10.1007\/s11042-016-3449-4","volume":"76","author":"S Chakraborty","year":"2017","unstructured":"Chakraborty S, Jalal A, Bhatnagar C (2017) LSB Based non blind predictive edge adaptive image steganography. Multimedia Tools and Applications 76:7973\u20137987","journal-title":"Multimedia Tools and Applications"},{"key":"9519_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C-K Chan","year":"2004","unstructured":"Chan C-K, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37 :469\u2013474","journal-title":"Pattern Recogn"},{"key":"9519_CR7","first-page":"1019","volume":"3","author":"R Chandramouli","year":"2001","unstructured":"Chandramouli R, Memon N (2001) Analysis of LSB based image steganography techniques. IEEE 3:1019\u20131022","journal-title":"IEEE"},{"key":"9519_CR8","first-page":"1","volume":"31","author":"T Fawcett","year":"2004","unstructured":"Fawcett T (2004) ROC Graphs: notes and practical considerations for researchers. Mach Learn 31:1\u201338","journal-title":"Mach Learn"},{"key":"9519_CR9","doi-asserted-by":"crossref","unstructured":"Ferzli R, Girija L, Ali W (2010) Efficient implementation of kurtosis based no reference image sharpness metric. Proceedings of SPIE-The International Society for Optical Engineering, pp 7532","DOI":"10.1117\/12.843733"},{"key":"9519_CR10","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M (2002) Practical steganalysis of digital Images-State of the art. Proceedings of SPIE-The International Society for Optical Engineering: pp 1\u201313","DOI":"10.1117\/12.465263"},{"key":"9519_CR11","doi-asserted-by":"crossref","unstructured":"Al-Dmour H, Al-Ani A (2015) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl, 46(C)","DOI":"10.1016\/j.eswa.2015.10.024"},{"key":"9519_CR12","unstructured":"Hempstalk K (2006) Hiding Behind Corners: Using Edges in Images for Better Steganography"},{"key":"9519_CR13","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1049\/iet-ipr.2013.0584","volume":"8","author":"H-S Leng","year":"2014","unstructured":"Leng H-S, Tseng H-W (2014) High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process 8:647\u2013654","journal-title":"IET Image Process"},{"key":"9519_CR14","doi-asserted-by":"crossref","unstructured":"Islam S, Modi M, Gupta P (2014) Edge-based image steganography. EURASIP Journal on Information Security, pp 8","DOI":"10.1186\/1687-417X-2014-8"},{"key":"9519_CR15","doi-asserted-by":"crossref","unstructured":"Kodovsky J, Fridrich J (2011) Steganalysis in high dimensions: Fusing classifiers built on random subspaces. Proceedings of SPIE-The International Society for Optical Engineering, pp 7880","DOI":"10.1117\/12.872279"},{"key":"9519_CR16","first-page":"103","volume":"13","author":"K-H Jung","year":"2018","unstructured":"Jung K-H (2018) Comparative Histogram Analysis of LSB-based Image Steganography. WSEAS Transactions on Systems and Control 13:103\u2013112","journal-title":"WSEAS Transactions on Systems and Control"},{"key":"9519_CR17","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"A Ker","year":"2005","unstructured":"Ker A (2005) Steganalysis of LSB matching in grayscale images. Signal Processing Letters IEEE 12:441\u2013444","journal-title":"Signal Processing Letters IEEE"},{"issue":"2","key":"9519_CR18","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2):432\u2013444","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"9519_CR19","doi-asserted-by":"publisher","first-page":"013020(1)","DOI":"10.1117\/1.JEI.22.1.013020","volume":"22","author":"H Koo","year":"2013","unstructured":"Koo H, Cho N (2013) Skew estimation of natural images based on a salient line detector. J Electron Imaging 22(1):013020(1)\u2013013020(6)","journal-title":"J Electron Imaging"},{"key":"9519_CR20","first-page":"162","volume":"15","author":"K Sanjeev","year":"2019","unstructured":"Sanjeev K, Amarpal S, Manoh K (2019) Information hiding with adaptive steganography based on Novel Fuzzy edge identification. Elsevier Defense Technology 15:162\u2013169","journal-title":"Elsevier Defense Technology"},{"key":"9519_CR21","doi-asserted-by":"crossref","unstructured":"Laishram D, Tuithung T (2018) A survey on digital image steganography: current trends and challenges. SSRN Electronic Journal, 10.2139\/ssrn.3171494","DOI":"10.2139\/ssrn.3171494"},{"key":"9519_CR22","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1049\/ip-vis:20000341","volume":"147","author":"YK Lee","year":"2000","unstructured":"Lee YK, Chen L-H (2000) High capacity image steganography model. Vision Image and Signal Processing IEE Proceedings 147:288\u2013294","journal-title":"Vision Image and Signal Processing IEE Proceedings"},{"issue":"3","key":"9519_CR23","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology 30(3):685\u2013696","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"9519_CR24","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security 5:201\u2013214","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9519_CR25","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB Matching revisited. Signal Processing Letters IEEE 13:285\u2013287","journal-title":"Signal Processing Letters IEEE"},{"issue":"2","key":"9519_CR26","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5 (2):142\u2013172","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9519_CR27","doi-asserted-by":"crossref","unstructured":"Subhedar M, Mankar V (2014) Current status and key issues in image steganography: a survey. Computer Science Review, pp 95\u2013113","DOI":"10.1016\/j.cosrev.2014.09.001"},{"key":"9519_CR28","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1016\/j.eswa.2009.09.050","volume":"37","author":"W-J Cheng","year":"2010","unstructured":"Cheng W-J, Chang C-C, Le T (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292\u20133301","journal-title":"Expert Syst Appl"},{"issue":"2","key":"9519_CR29","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","volume":"3","author":"C-H Yang","year":"2008","unstructured":"Yang C-H, Weng C-Y, Wang S-J, Sun H-M (2008) Adaptive data hiding in edge areas of images with spatial LSB domain systems. Information Forensics and Security IEEE Transactions 3(2):488\u2013497","journal-title":"Information Forensics and Security IEEE Transactions"},{"key":"9519_CR30","unstructured":"Liu Y, Cheng MM, Bian J, Zhang LJ, Peng T, Cao Y (2018) Semantic edge detection with diverse deep supervision. ArXiv Computer Science, arXiv:1804.02864"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09519-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09519-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09519-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T23:35:33Z","timestamp":1630798533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09519-9"}},"subtitle":["(BEASS)"],"short-title":[],"issued":{"date-parts":[[2020,9,5]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9519"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09519-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,5]]},"assertion":[{"value":"11 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}