{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T14:51:43Z","timestamp":1769525503757,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T00:00:00Z","timestamp":1610582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T00:00:00Z","timestamp":1610582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10395-6","type":"journal-article","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T11:03:17Z","timestamp":1610622197000},"page":"13253-13270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Exponential fractional cat swarm optimization for video steganography"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3834-6811","authenticated-orcid":false,"given":"Meenu","family":"Suresh","sequence":"first","affiliation":[]},{"given":"I. Shatheesh","family":"Sam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,14]]},"reference":[{"key":"10395_CR1","first-page":"9","volume-title":"Advanced optimization by nature-inspired algorithms","author":"M Bahrami","year":"2018","unstructured":"Bahrami M, Bozorg-Haddad O, Chu X (2018) Cat swarm optimization (CSO) algorithm. In: Bozorg-Haddad O (ed) Advanced optimization by nature-inspired algorithms. Springer Singapore, Singapore, pp 9\u201318"},{"key":"10395_CR2","doi-asserted-by":"publisher","first-page":"27491","DOI":"10.1007\/s11042-018-5933-5","volume":"77","author":"A Banharnsakun","year":"2018","unstructured":"Banharnsakun A (2018) Artificial bee colony approach for enhancing LSB based image steganography. Multimed Tools Appl 77:27491\u201327504. https:\/\/doi.org\/10.1007\/s11042-018-5933-5","journal-title":"Multimed Tools Appl"},{"key":"10395_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/396529","volume":"2014","author":"PR Bhaladhare","year":"2014","unstructured":"Bhaladhare PR, Jinwala DC (2014) A clustering approach for the l -diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm. Adv Comput Eng 2014:1\u201312. https:\/\/doi.org\/10.1155\/2014\/396529","journal-title":"Adv Comput Eng"},{"key":"10395_CR4","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TCSVT.2005.856932","volume":"15","author":"PW Chan","year":"2005","unstructured":"Chan PW, Lyu MR, Chin RT (2005) A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation. IEEE Trans Circuits Syst Video Technol 15:1638\u20131649. https:\/\/doi.org\/10.1109\/TCSVT.2005.856932","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10395_CR5","unstructured":"Chandel B, Jain DS (2016) Video steganography: a survey. 7"},{"key":"10395_CR6","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1007\/s00521-015-2135-1","volume":"28","author":"Y Feng","year":"2017","unstructured":"Feng Y, Wang G-G, Deb S et al (2017) Solving 0\u20131 knapsack problem by a novel binary monarch butterfly optimization. Neural Comput & Applic 28:1619\u20131634. https:\/\/doi.org\/10.1007\/s00521-015-2135-1","journal-title":"Neural Comput & Applic"},{"key":"10395_CR7","unstructured":"Goldberg DE, HOLLAND JH (1998) Genetic algorithms and machine learning. Kluwer Academic Publishers"},{"key":"10395_CR8","doi-asserted-by":"publisher","first-page":"3893","DOI":"10.1007\/s11042-019-7471-1","volume":"79","author":"K Gurunathan","year":"2020","unstructured":"Gurunathan K, Rajagopalan SP (2020) A stegano - visual cryptography technique for multimedia security. Multimed Tools Appl 79:3893\u20133911. https:\/\/doi.org\/10.1007\/s11042-019-7471-1","journal-title":"Multimed Tools Appl"},{"key":"10395_CR9","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Idris YIB et al (2018) Image steganography in spatial domain: A survey. Signal Processing: Image Communication 65:46\u201366. https:\/\/doi.org\/10.1016\/j.image.2018.03.012","journal-title":"Signal Processing: Image Communication"},{"key":"10395_CR10","doi-asserted-by":"publisher","unstructured":"Jalali A, Farsi H (2019) A new steganography algorithm based on video sparse representation. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-08233-5","DOI":"10.1007\/s11042-019-08233-5"},{"key":"10395_CR11","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s10898-007-9149-x","volume":"39","author":"D Karaboga","year":"2007","unstructured":"Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm. J Glob Optim 39:459\u2013471. https:\/\/doi.org\/10.1007\/s10898-007-9149-x","journal-title":"J Glob Optim"},{"key":"10395_CR12","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: paper presented at the proceeding of the IEEE international conference on neural networks, Perth, Australia, 27 November\u20131 December"},{"key":"10395_CR13","doi-asserted-by":"publisher","unstructured":"Khadam U, Iqbal MM, Alruily M et al (2020) Text data security and privacy in the internet of things: threats, challenges, and future directions. Wirel. Commun. Mob. Comput. 2020:1\u201315. https:\/\/doi.org\/10.1155\/2020\/7105625","DOI":"10.1155\/2020\/7105625"},{"key":"10395_CR14","doi-asserted-by":"publisher","first-page":"8535","DOI":"10.1007\/s11042-018-6942-0","volume":"78","author":"Y Li","year":"2019","unstructured":"Li Y, Wang H-X (2019) Robust H.264\/AVC video watermarking without intra distortion drift. Multimed Tools Appl 78:8535\u20138557. https:\/\/doi.org\/10.1007\/s11042-018-6942-0","journal-title":"Multimed Tools Appl"},{"key":"10395_CR15","doi-asserted-by":"publisher","unstructured":"Liu S, Xu D (2020) A robust steganography method for HEVC based on secret sharing. Cogn. Syst. Res. 59:207\u2013220. https:\/\/doi.org\/10.1016\/j.cogsys.2019.09.008","DOI":"10.1016\/j.cogsys.2019.09.008"},{"key":"10395_CR16","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.4304\/jsw.7.5.1059-1065","volume":"7","author":"Y Liu","year":"2012","unstructured":"Liu Y, Li Z, Ma X (2012) Reversible data hiding scheme based On H.264\/AVC without distortion drift. JSW 7:1059\u20131065. https:\/\/doi.org\/10.4304\/jsw.7.5.1059-1065","journal-title":"JSW"},{"key":"10395_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/2016976","volume":"2018","author":"S Liu","year":"2018","unstructured":"Liu S, Bai W, Liu G et al (2018) Parallel fractal compression method for big video data. Complexity 2018:1\u201316. https:\/\/doi.org\/10.1155\/2018\/2016976","journal-title":"Complexity"},{"key":"10395_CR18","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ijleo.2017.07.043","volume":"145","author":"A Miri","year":"2017","unstructured":"Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158\u2013168. https:\/\/doi.org\/10.1016\/j.ijleo.2017.07.043","journal-title":"Optik"},{"key":"10395_CR19","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TEVC.2009.2021465","volume":"13","author":"MA Montes de Oca","year":"2009","unstructured":"Montes de Oca MA, Stutzle T, Birattari M, Dorigo M (2009) Frankenstein\u2019s PSO: a composite particle swarm optimization algorithm. IEEE Trans Evol Computat 13:1120\u20131132. https:\/\/doi.org\/10.1109\/TEVC.2009.2021465","journal-title":"IEEE Trans Evol Computat"},{"key":"10395_CR20","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/ICIIP.2013.6707677","volume-title":"2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013)","author":"SK Moon","year":"2013","unstructured":"Moon SK, Raut RD (2013) Analysis of secured video steganography using computer forensics technique for enhance data security. In: 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013). IEEE, Shimla, India, pp 660\u2013665"},{"key":"10395_CR21","doi-asserted-by":"publisher","first-page":"2147","DOI":"10.1109\/ICIP.2004.1421520","volume-title":"2004 International Conference on Image Processing, 2004. ICIP \u201804","author":"H Noda","year":"2004","unstructured":"Noda H, Furuta T, Niimi M, Kawaguchi E (2004) Application of BPCS steganography to wavelet compressed video. In: 2004 International Conference on Image Processing, 2004. ICIP \u201804. IEEE, Singapore, pp 2147\u20132150"},{"key":"10395_CR22","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TIFS.2006.890306","volume":"2","author":"M Noorkami","year":"2007","unstructured":"Noorkami M, Mersereau RM (2007) A framework for robust watermarking of H.264-encoded video with controllable detection performance. IEEE Trans Inform Forensic Secur 2:14\u201323. https:\/\/doi.org\/10.1109\/TIFS.2006.890306","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"10395_CR23","doi-asserted-by":"publisher","unstructured":"Pradhan PM, Panda G (2012) Solving multiobjective problems using cat swarm optimization. Expert Syst. Appl. 39:2956\u20132964. https:\/\/doi.org\/10.1016\/j.eswa.2011.08.157","DOI":"10.1016\/j.eswa.2011.08.157"},{"key":"10395_CR24","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1109\/TIFS.2011.2177087","volume":"7","author":"T Shanableh","year":"2012","unstructured":"Shanableh T (2012) Data hiding in MPEG video files using multivariate regression and flexible macroblock ordering. IEEE Trans Inform Forensic Secur 7:455\u2013464. https:\/\/doi.org\/10.1109\/TIFS.2011.2177087","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"10395_CR25","doi-asserted-by":"publisher","first-page":"143464","DOI":"10.1109\/ACCESS.2020.3013033","volume":"8","author":"GH Song","year":"2020","unstructured":"Song GH, Liu H (2020) An improved high capacity and efficient data hiding scheme for 3d videos without distortion drift. IEEE Access 8:143464\u2013143478. https:\/\/doi.org\/10.1109\/ACCESS.2020.3013033","journal-title":"IEEE Access"},{"key":"10395_CR26","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/SACI.2007.375518","volume-title":"2007 4th International Symposium on Applied Computational Intelligence and Informatics","author":"D Stanescu","year":"2007","unstructured":"Stanescu D, Stratulat M, Ciubotaru B et al (2007) Embedding data in video stream using steganography. In: 2007 4th International Symposium on Applied Computational Intelligence and Informatics. IEEE, Timisoara, Romania, pp 241\u2013244"},{"key":"10395_CR27","doi-asserted-by":"publisher","unstructured":"Suresh M, Sam IS (2020) Optimal wavelet transform using Oppositional Grey Wolf Optimization for video steganography. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09330-6","DOI":"10.1007\/s11042-020-09330-6"},{"key":"10395_CR28","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/ICCONS.2018.8662920","volume-title":"2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS)","author":"M Suresh","year":"2018","unstructured":"Suresh M, Shatheesh Sam I (2018) High secure video steganography based on shuffling of data on Least significant DCT coefficients. In: 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, Madurai, India, pp 877\u2013882"},{"key":"10395_CR29","doi-asserted-by":"publisher","unstructured":"Suresh M, Shatheesh Sam I (2020) Optimized interesting region identification for video steganography using Fractional Grey Wolf Optimization along with multi-objective cost function. Journal of King Saud University - Computer and Information Sciences S1319157820304456. https:\/\/doi.org\/10.1016\/j.jksuci.2020.08.007","DOI":"10.1016\/j.jksuci.2020.08.007"},{"key":"10395_CR30","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/TCSVT.2013.2276710","volume":"24","author":"Y Tew","year":"2014","unstructured":"Tew Y, Wong K (2014) An Overview of Information Hiding in H.264\/AVC Compressed Video. IEEE Trans Circuits Syst Video Technol 24:305\u2013319. https:\/\/doi.org\/10.1109\/TCSVT.2013.2276710","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10395_CR31","doi-asserted-by":"publisher","unstructured":"Tsai Y-S, Tsai P (2011) Adaptive data hiding for vector quantization images based on overlapping codeword clustering. Inf. Sci. 181:3188\u20133198. https:\/\/doi.org\/10.1016\/j.ins.2011.03.017","DOI":"10.1016\/j.ins.2011.03.017"},{"key":"10395_CR32","unstructured":"Video Watermarking using DWT - File Exchange - MATLAB Central. https:\/\/in.mathworks.com\/matlabcentral\/fileexchange\/52225. Accessed 24 Mar 2020"},{"key":"10395_CR33","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1515\/jisys-2017-0264","volume":"28","author":"AMU Wagdarikar","year":"2019","unstructured":"Wagdarikar AMU, Senapati RK (2019) Design and development of a multiobjective cost function for robust video watermarking using wavelet transform. J Intell Syst 28:873\u2013891. https:\/\/doi.org\/10.1515\/jisys-2017-0264","journal-title":"J Intell Syst"},{"key":"10395_CR34","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1597817.1597826","volume-title":"Proceedings of the 11th ACM workshop on Multimedia and security - MM&Sec \u201809. ACM Press","author":"W Wang","year":"2009","unstructured":"Wang W, Farid H (2009) Exposing digital forgeries in video by detecting double quantization. In: Proceedings of the 11th ACM workshop on Multimedia and security - MM&Sec \u201809. ACM Press. USA, Princeton, New Jersey, p 39"},{"key":"10395_CR35","doi-asserted-by":"publisher","first-page":"119393","DOI":"10.1109\/ACCESS.2019.2936614","volume":"7","author":"J Wang","year":"2019","unstructured":"Wang J, Jia X, Kang X, Shi Y-Q (2019) A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode. IEEE Access 7:119393\u2013119402. https:\/\/doi.org\/10.1109\/ACCESS.2019.2936614","journal-title":"IEEE Access"},{"key":"10395_CR36","unstructured":"Xiph.org :: Derf\u2019s Test Media Collection. https:\/\/media.xiph.org\/video\/derf\/. Accessed 24 Mar 2020"},{"key":"10395_CR37","doi-asserted-by":"publisher","unstructured":"Xue Y, Zhou J, Zeng H et al (2019) An adaptive steganographic scheme for H.264\/AVC video with distortion optimization. Signal Process. Image Commun. 76:22\u201330. https:\/\/doi.org\/10.1016\/j.image.2019.04.012","DOI":"10.1016\/j.image.2019.04.012"},{"key":"10395_CR38","doi-asserted-by":"crossref","unstructured":"Yang H, Kot AC (2004) Text document authentication by integrating inter character and word spaces watermarking. 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763). IEEE, Taipei, Taiwan:955\u2013958","DOI":"10.1109\/ICME.2004.1394360"},{"key":"10395_CR39","doi-asserted-by":"publisher","unstructured":"Younus ZS, Younus GT (2019) Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data. J. Intell. Syst. 29:1216\u20131225. https:\/\/doi.org\/10.1515\/jisys-2018-0225","DOI":"10.1515\/jisys-2018-0225"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10395-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10395-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10395-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T08:37:20Z","timestamp":1619339840000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10395-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,14]]},"references-count":39,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10395"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10395-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,14]]},"assertion":[{"value":"3 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}