{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:51:10Z","timestamp":1761598270953,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10008-2","type":"journal-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T14:02:50Z","timestamp":1604498570000},"page":"8611-8637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Toward stronger energy compaction for high capacity dct-based steganography: a region-growing approach"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0272-2659","authenticated-orcid":false,"given":"Mohammed","family":"Baziyad","sequence":"first","affiliation":[]},{"given":"Tamer","family":"Rabie","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Kamel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"10008_CR1","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition. In: Mobile Multimedia\/Image Processing, Security, and Applications 2014, vol 9120, p 912005"},{"key":"10008_CR2","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography, Ph.D. Thesis, University of Buckingham"},{"key":"10008_CR3","doi-asserted-by":"crossref","unstructured":"Baziyad M, Rabie T, Kamel I (2018) Extending steganography payload capacity using the l* a* b* color space. In: 2018 International Conference on Innovations in Information Technology (IIT), IEEE, 1\u20136","DOI":"10.1109\/INNOVATIONS.2018.8606008"},{"issue":"7","key":"10008_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2018.07.MWSF-213","volume":"2018","author":"M Boroumand","year":"2018","unstructured":"Boroumand M, Fridrich J (2018) Deep learning for detecting processing history of images. Electronic Imaging 2018(7):1\u20139","journal-title":"Electronic Imaging"},{"issue":"2","key":"10008_CR5","doi-asserted-by":"publisher","first-page":"1511","DOI":"10.1007\/s11042-018-6195-y","volume":"78","author":"B Datta","year":"2019","unstructured":"Datta B, Roy S, Roy S, Bandyopadhyay SK (2019) Multi-bit robust image steganography based on modular arithmetic. Multimedia Tools and Applications 78(2):1511\u20131546","journal-title":"Multimedia Tools and Applications"},{"issue":"23","key":"10008_CR6","doi-asserted-by":"publisher","first-page":"1332","DOI":"10.1049\/el.2018.6426","volume":"54","author":"R Dhivya","year":"2018","unstructured":"Dhivya R, Padmapriya V, Sundararaman R, Rayappan JBB, Amirtharajan R (2018) Chaos assisted variable bit steganography in transform domain. Electron Lett 54(23):1332\u20131334","journal-title":"Electron Lett"},{"key":"10008_CR7","doi-asserted-by":"crossref","unstructured":"Gadekallu TR, Khare N, Bhattacharya S, Singh S, Maddikunta PKR, Srivastava G (2020) Deep neural networks to predict diabetic retinopathy, J. Ambient Intell. Humaniz. Comput","DOI":"10.1007\/s12652-020-01963-7"},{"issue":"01","key":"10008_CR8","doi-asserted-by":"publisher","first-page":"1860010","DOI":"10.1142\/S0218001418600108","volume":"32","author":"IR Grajeda-Mar\u00edn","year":"2018","unstructured":"Grajeda-Mar\u00edn IR, Montes-Venegas HA, Marcial-Romero JR, Hern\u00e1ndez-Serv\u00edn JA, Mu\u00f1oz-Jim\u00e9nez V, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. Int J Pattern Recognit Artif Intell 32 (01):1860010","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"10008_CR9","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing 335:299\u2013326","journal-title":"Neurocomputing"},{"key":"10008_CR10","doi-asserted-by":"crossref","unstructured":"Kalita M, Tuithung T (2016) A novel steganographic method using 8-neighboring pvd (8npvd) and lsb substitution. In: 2016 International Conference on Systems, Signals and Image Processing (IWSSIP), IEEE, 1\u20135","DOI":"10.1109\/IWSSIP.2016.7502756"},{"key":"10008_CR11","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.jisa.2018.04.005","volume":"40","author":"K Karampidis","year":"2018","unstructured":"Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. Journal of information security and applications 40:217\u2013235","journal-title":"Journal of information security and applications"},{"key":"10008_CR12","doi-asserted-by":"crossref","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features, ieee transactions on dependable and secure computing","DOI":"10.1109\/TDSC.2020.3004708"},{"key":"10008_CR13","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","volume":"67","author":"X Liao","year":"2018","unstructured":"Liao X, Yin J, Guo S, Li X, Sangaiah A K (2018) Medical jpeg image steganography based on preserving inter-block dependencies. Computers & Electrical Engineering 67:320\u2013329","journal-title":"Computers & Electrical Engineering"},{"issue":"3","key":"10008_CR14","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology 30(3):685\u2013696","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"10008_CR15","first-page":"1","volume":"55","author":"R Meng","year":"2018","unstructured":"Meng R, Rice S G, Wang J, Sun X (2018) A fusion steganographic algorithm based on faster r-cnn. Computers, Materials & Continua 55(1):1\u201316","journal-title":"Computers, Materials & Continua"},{"key":"10008_CR16","unstructured":"Mu\u00f1oz A (2015) Stegsecret. a simple steganalysis tool, stegsecret. sourceforge. net"},{"key":"10008_CR17","doi-asserted-by":"crossref","unstructured":"Nyeem H (2017) Reversible data hiding with image bit-plane slicing. In: 2017 20th International Conference of Computer and Information Technology (ICCIT), IEEE, 1\u20136","DOI":"10.1109\/ICCITECHN.2017.8281763"},{"issue":"6","key":"10008_CR18","doi-asserted-by":"publisher","first-page":"063001","DOI":"10.1117\/1.JEI.26.6.063001","volume":"26","author":"T Rabie","year":"2017","unstructured":"Rabie T, Baziyad M (2017) Visual fidelity without sacrificing capacity: an adaptive laplacian pyramid approach to information hiding. Journal of Electronic Imaging 26(6):063001","journal-title":"Journal of Electronic Imaging"},{"key":"10008_CR19","doi-asserted-by":"publisher","first-page":"21948","DOI":"10.1109\/ACCESS.2019.2898838","volume":"7","author":"T Rabie","year":"2019","unstructured":"Rabie T, Baziyad M (2019) The pixogram: Addressing high payload demands for video steganography. IEEE Access 7:21948\u201321962","journal-title":"IEEE Access"},{"issue":"3","key":"10008_CR20","doi-asserted-by":"publisher","first-page":"2050042","DOI":"10.1142\/S0218126620500425","volume":"29","author":"T Rabie","year":"2020","unstructured":"Rabie T, Baziyad M, Bonny T, Fareh R (2020) Toward a unified performance metric for benchmarking steganography systems. Journal of Circuits, Systems and Computers 29(3):2050042","journal-title":"Journal of Circuits, Systems and Computers"},{"issue":"10","key":"10008_CR21","doi-asserted-by":"publisher","first-page":"5939","DOI":"10.1007\/s11042-015-2557-x","volume":"75","author":"T Rabie","year":"2016","unstructured":"Rabie T, Kamel I (2016) On the embedding limits of the discrete cosine transform. Multimedia Tools and Applications 75(10):5939\u20135957","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"10008_CR22","doi-asserted-by":"publisher","first-page":"6473","DOI":"10.1007\/s11042-016-3301-x","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimedia Tools and Applications 76(5):6473\u20136493","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"10008_CR23","doi-asserted-by":"publisher","first-page":"8627","DOI":"10.1007\/s11042-016-3501-4","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimedia Tools and Applications 76(6):8627\u20138650","journal-title":"Multimedia Tools and Applications"},{"issue":"7","key":"10008_CR24","doi-asserted-by":"publisher","first-page":"8295","DOI":"10.1007\/s11042-017-4727-5","volume":"77","author":"T Rabie","year":"2018","unstructured":"Rabie T, Kamel I, Baziyad M (2018) Maximizing embedding capacity and stego quality: curve-fitting in the transform domain. Multimedia Tools and Applications 77(7):8295\u20138326","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"10008_CR25","first-page":"593","volume":"19","author":"S Rajendran","year":"2017","unstructured":"Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using lsb technique. IJ Network Security 19(4):593\u2013598","journal-title":"IJ Network Security"},{"issue":"2","key":"10008_CR26","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s00530-014-0446-1","volume":"22","author":"RC Streijl","year":"2016","unstructured":"Streijl RC, Winkler S, Hands DS (2016) Mean opinion score (mos) revisited: methods and applications, limitations and alternatives. Multimedia Systems 22(2):213\u2013227","journal-title":"Multimedia Systems"},{"key":"10008_CR27","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.procs.2016.05.174","volume":"85","author":"G Swain","year":"2016","unstructured":"Swain G (2016) A steganographic method combining lsb substitution and pvd in a block. Procedia Computer Science 85:39\u201344","journal-title":"Procedia Computer Science"},{"issue":"6","key":"10008_CR28","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"W-L Tai","year":"2009","unstructured":"Tai W-L, Yeh C-M, Chang C-C (2009) Reversible data hiding based on histogram modification of pixel differences. IEEE transactions on circuits and systems for video technology 19(6):906\u2013910","journal-title":"IEEE transactions on circuits and systems for video technology"},{"key":"10008_CR29","first-page":"1","volume":"315","author":"AG Weber","year":"1997","unstructured":"Weber AG (1997) The usc-sipi image database version 5. USC-SIPI Report 315:1","journal-title":"USC-SIPI Report"},{"issue":"3","key":"10008_CR30","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1007\/s11042-012-1313-8","volume":"71","author":"L Xiang","year":"2014","unstructured":"Xiang L, Sun X, Luo G, Xia B (2014) Linguistic steganalysis using the features derived from synonym frequency. Multimedia tools and applications 71 (3):1893\u20131911","journal-title":"Multimedia tools and applications"},{"issue":"2","key":"10008_CR31","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1587\/transinf.2016EDP7358","volume":"100","author":"L Xiang","year":"2017","unstructured":"Xiang L, Wang X, Yang C, Liu P (2017) A novel linguistic steganography based on synonym run-length encoding. IEICE transactions on Information and Systems 100(2):313\u2013322","journal-title":"IEICE transactions on Information and Systems"},{"issue":"12","key":"10008_CR32","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","volume":"20","author":"X Zhang","year":"2018","unstructured":"Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on dct and lda topic classification. IEEE Transactions on Multimedia 20 (12):3223\u20133238","journal-title":"IEEE Transactions on Multimedia"},{"key":"10008_CR33","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Qin C, Zhang W, Liu F, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99\u2013111","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10008-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10008-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10008-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:32:31Z","timestamp":1614634351000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10008-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10008"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10008-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"26 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}