{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T23:59:54Z","timestamp":1775779194429,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T00:00:00Z","timestamp":1611532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T00:00:00Z","timestamp":1611532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10424-4","type":"journal-article","created":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T20:03:58Z","timestamp":1611605038000},"page":"14495-14520","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Secured image steganography based on Catalan transform"],"prefix":"10.1007","volume":"80","author":[{"given":"Souradeep","family":"Mukhopadhyay","sequence":"first","affiliation":[]},{"given":"Sabbir","family":"Hossain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8697-0803","authenticated-orcid":false,"given":"Sudipta Kr","family":"Ghosal","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,25]]},"reference":[{"key":"10424_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral thesis, University of Buckingham, URI:http:\/\/bear.buckingham.ac.uk\/id\/eprint\/149"},{"key":"10424_CR2","doi-asserted-by":"publisher","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition, Proc. SPIE 9120, Mobile Multimedia\/Image Processing, Security, and Applications, https:\/\/doi.org\/10.1117\/12.2050518","DOI":"10.1117\/12.2050518"},{"key":"10424_CR3","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"8","author":"AA Abdulla","year":"2019","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 8:17799\u201317823","journal-title":"Multimed Tools Appl"},{"key":"10424_CR4","doi-asserted-by":"publisher","unstructured":"Akhtar N, Ahamad V, Javed H (2017), A compressed LSB steganography method, Proceedings of 3rd International Conference on Computational Intelligence & Communication Technology (CICT), 1\u20137, doi: https:\/\/doi.org\/10.1109\/CIACT.2017.7977371, Ghaziabad","DOI":"10.1109\/CIACT.2017.7977371"},{"key":"10424_CR5","doi-asserted-by":"crossref","unstructured":"Alafandy KA, El-Rabaie E-SM, Faragallah OS, Elmahalawy A (2016) High security data hiding using image cropping and LSB least significant bit steganography, in IEEE, Tangier, Morocco","DOI":"10.1109\/CIST.2016.7805079"},{"key":"10424_CR6","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.eswa.2015.10.024","volume":"46","author":"H Al-Dmour","year":"2016","unstructured":"Al-Dmour H, Al-Ani A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46:293\u2013306","journal-title":"Expert Syst. Appl."},{"key":"10424_CR7","doi-asserted-by":"publisher","unstructured":"Al-Jarrah M (2018) RGB-BMP Steganalysis Dataset, Mendeley Data, version 1, https:\/\/doi.org\/10.17632\/sp4g8h7v8k.1, (accessed on 14th January, 2020)","DOI":"10.17632\/sp4g8h7v8k.1"},{"key":"10424_CR8","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al HB, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76:18451\u201318472","journal-title":"Multimed Tools Appl"},{"key":"10424_CR9","doi-asserted-by":"publisher","unstructured":"B\u00e1noci V, Bug\u00e1r G, Levick\u00fd D (2011) A novel method of image steganography in DWT domain, Proceedings of 21st International Conference Radioelektronika 2011, Brno :1\u20134, doi: https:\/\/doi.org\/10.1109\/RADIOELEK.2011.5936455","DOI":"10.1109\/RADIOELEK.2011.5936455"},{"key":"10424_CR10","first-page":"1","volume":"8","author":"P Barry","year":"2005","unstructured":"Barry P (2005) A Catalan Transform and Related Transformations on Integer Sequences. J Integer Sequences 8:1\u201324","journal-title":"J Integer Sequences"},{"key":"10424_CR11","doi-asserted-by":"crossref","unstructured":"Biswas R, Mukherjee S, Bandyopadhyay SK (2013) DCT Domain Encryption in LSB Steganography, in Proceedings of 5th International Conference and Computational Intelligence and Communication Networks, Mathura, India","DOI":"10.1109\/CICN.2013.89"},{"key":"10424_CR12","unstructured":"Boehm B (2014) StegExpose - A Tool for Detecting LSB Steganography, Multimed ,Cryptography Secur,1\u201311"},{"key":"10424_CR13","doi-asserted-by":"crossref","unstructured":"Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. Proceedings of International Conference on Image Processing, IEEE 3:641\u2013644","DOI":"10.1109\/ICIP.2002.1039052"},{"key":"10424_CR14","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S Dumitrescu","year":"2003","unstructured":"Dumitrescu S, Wu X, Wang Z (2003) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51:1995\u20132007","journal-title":"IEEE Trans Signal Process"},{"key":"10424_CR15","unstructured":"Emam MM, Aly AA, Omara FA (2016) An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection. Int J Adv Comput Sci Appl(IJACSA) 7:361\u2013366"},{"key":"10424_CR16","doi-asserted-by":"publisher","unstructured":"Gadekallu TR, Khare N, Bhattacharya S et al. (2020) Deep neural networks to predict diabetic retinopathy. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-020-01963-7","DOI":"10.1007\/s12652-020-01963-7"},{"key":"10424_CR17","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1134\/S0001434615030256","volume":"97","author":"SB Gashkov","year":"2015","unstructured":"Gashkov SB (2015) Arithmetic complexity of certain linear transformations. Mathematical Notes 97:531\u2013555","journal-title":"Mathematical Notes"},{"key":"10424_CR18","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.protcy.2013.12.341","volume":"10","author":"SK Ghosal","year":"2013","unstructured":"Ghosal SK, Mandal JK (2013) Stirling Transform based Color Image Authentication. Procedia Technol 10:95\u2013104","journal-title":"Procedia Technol"},{"key":"10424_CR19","doi-asserted-by":"publisher","unstructured":"Ghosal SK, Mukhopadhyay S, Hossain S, Sarkar R (2020) Application of Lah transform for security and privacy of data through information hiding in telecommunication. Trans Emerging Tel Tech, Wiley :1\u201320. https:\/\/doi.org\/10.1002\/ett.3984","DOI":"10.1002\/ett.3984"},{"key":"10424_CR20","first-page":"22","volume":"8","author":"M Golijan","year":"2001","unstructured":"Golijan M, Rui D (2001) Detecting LSB steganography in color, and gray-scale images. MultimedIEEE 8:22\u201328","journal-title":"MultimedIEEE"},{"key":"10424_CR21","doi-asserted-by":"crossref","unstructured":"Hajizadeh H, Ayatollahi A , Mirzakuchaki S (2013) A new high capacity and EMD-based image steganography scheme in spatial domain, in 2013 21st Iranian Conference on Electrical Engineering (ICEE), Mashhad, Iran","DOI":"10.1109\/IranianCEE.2013.6599814"},{"key":"10424_CR22","first-page":"331","volume":"78","author":"LH Hua Zhang","year":"2019","unstructured":"Hua Zhang LH (2019) A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Process: Image Commun 78:331\u2013344","journal-title":"Signal Process: Image Commun"},{"key":"10424_CR23","doi-asserted-by":"publisher","unstructured":"Jothy N, Anusuyya S (2016) A Secure Color Image Steganography Using Integer Wavelet Transform. 10th International Conference on Intelligent Systems and Control (ISCO)., Coimbatore, India. https:\/\/doi.org\/10.1109\/ISCO.2016.7726948","DOI":"10.1109\/ISCO.2016.7726948"},{"key":"10424_CR24","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1093\/comjnl\/bxz014","volume":"62","author":"M Kalita","year":"2019","unstructured":"Kalita M, Tuithung T, Majumder S (2019) A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution. Comput J 62:1639\u20131655. https:\/\/doi.org\/10.1093\/comjnl\/bxz014","journal-title":"Comput J"},{"key":"10424_CR25","unstructured":"Kamya S (2020) Watermark DCT , MATLAB Central File Exchange. Retrieved July 25, 2020. (https:\/\/www.mathworks.com\/matlabcentral\/fileexchange\/46866-watermark-dct)"},{"key":"10424_CR26","unstructured":"Kang Y, Liu F, Yang C, Xiang L, Luo X, Wang P (2019) Color image steganalysis based on channel gradient correlation, Int J Distributed Sens Netw., 15"},{"key":"10424_CR27","doi-asserted-by":"crossref","unstructured":"Kim C, Shin D , Shin D , Zhang X (2011) Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications, in FTRA International Conference on Secure and Trust Computing, Data Management, and Application","DOI":"10.1007\/978-3-642-22339-6_16"},{"key":"10424_CR28","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-35473-1_14","volume":"21","author":"W-C Kuo","year":"2013","unstructured":"Kuo W-C (2013) A Data Hiding Scheme Based on Square Formula Fully Exploiting Modification Directions. Smart Innov Syst Technol 21:131\u2013139. https:\/\/doi.org\/10.1007\/978-3-642-35473-1_14","journal-title":"Smart Innov Syst Technol"},{"key":"10424_CR29","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"C-C Lai","year":"2010","unstructured":"Lai C-C, Tsai C-C (2010) Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition. IEEE Trans Inst Measurement 59:3060\u20133063","journal-title":"IEEE Trans Inst Measurement"},{"key":"10424_CR30","first-page":"272","volume":"19","author":"JK Mandal","year":"2014","unstructured":"Mandal JK, Ghosal SK (2014) Binomial Transform Based Fragile Watermarking for image Authentication. J Inf Secur Appl 19:272\u2013281","journal-title":"J Inf Secur Appl"},{"key":"10424_CR31","first-page":"68","volume":"57","author":"JK Mandal","year":"2014","unstructured":"Mandal JK, Ghosal S (2014) Color image authentication based on two-dimensional separable discrete hartley transform. Adv Modelling Analysis B 57:68\u201387","journal-title":"Adv Modelling Analysis B"},{"key":"10424_CR32","doi-asserted-by":"publisher","unstructured":"Mandal JK, Ghosal SK (2018) On the use of stirling transform in image Steganography. J inf Secur appl 46. https:\/\/doi.org\/10.1016\/j.jisa.2018.04.003","DOI":"10.1016\/j.jisa.2018.04.003"},{"key":"10424_CR33","first-page":"1","volume":"55","author":"R Meng","year":"2018","unstructured":"Meng R, Rice SG, Wang J, Sun X (2018) A fusion steganographic algorithm based on faster R-CNN. Comput Materials Continua 55:1\u201316","journal-title":"Comput Materials Continua"},{"key":"10424_CR34","doi-asserted-by":"publisher","first-page":"13693","DOI":"10.1007\/s11042-019-08415-1","volume":"79","author":"M Nazari","year":"2020","unstructured":"Nazari M, Ahmadi ID (2020) A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimed Tools Appl 79:13693\u201313724. https:\/\/doi.org\/10.1007\/s11042-019-08415-1","journal-title":"Multimed Tools Appl"},{"key":"10424_CR35","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.aeue.2016.11.009","volume":"71","author":"F Peng","year":"2017","unstructured":"Peng F, Zhou DL, Long M, Sun XM (2017) Discrimination of natural images and computer generated graphics based on multi-fractal and regression analysis. AEU-International Journal of Electronics and Communications 71:72\u201381","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"10424_CR36","doi-asserted-by":"crossref","unstructured":"Poljicak A, Mandic L, Agic D (2011) Discrete Fourier transform-based watermarking method with an optimal implementation radius. J Electron Imaging 20","DOI":"10.1117\/1.3609010"},{"key":"10424_CR37","first-page":"1203","volume":"03","author":"KB Raja","year":"2011","unstructured":"Raja KB, Reddy HSM (2011) Wavelet based Non LSB Steganography. Int J Adv Netw Appl 03:1203\u20131209","journal-title":"Int. J. Adv Netw Appl"},{"key":"10424_CR38","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jvcir.2018.03.009","volume":"53","author":"MG Randa Atta","year":"2018","unstructured":"Randa Atta MG (2018) A High Payload Steganography Mechanism Based on Wavelet Packet Transformation. J Vis Commun Image R 53:42\u201354","journal-title":"J. Vis. Commun. Image R."},{"key":"10424_CR39","doi-asserted-by":"publisher","first-page":"18309","DOI":"10.1007\/s11042-019-7187-2","volume":"78","author":"K Sathish Shet","year":"2019","unstructured":"Sathish Shet K, Aswath AR, Hanumantharaju MC, Gao X-Z (2019) Novel high-speed reconfigurable FPGA architectures for EMD-based image steganography. Multimed Tools Appl volume,Springer 78:18309\u201318338","journal-title":"Multimed Tools Appl"},{"key":"10424_CR40","first-page":"183","volume":"8","author":"SA Seyyedi","year":"2014","unstructured":"Seyyedi SA, Ivanov N (2014) High Payload and secure image steganography method based on block partioning and integer wavelet transform. Int J Secur Appl 8:183\u2013194","journal-title":"Int J Secur Appl"},{"key":"10424_CR41","unstructured":"Shin N (1999) One-Time Hash Steganography. In: Pfitzmann A. (eds) Information Hiding. IH . Lecture Notes in Computer Science,Springer, Berlin, Heidelberg, 1768"},{"key":"10424_CR42","unstructured":"Stanley CA (2005) Pairs of values and the Chi-Squared Attack, Department of Mathematics, Iowa State University, CiteSteer,1\u201345"},{"key":"10424_CR43","unstructured":"Wang C-C, Kuo W-C, Huang Y-C, Wuu L-C (2017) A high capacity data hiding scheme based on re-adjusted GEMD. Multimed Tools Appl, 77:6327\u20136341"},{"key":"10424_CR44","unstructured":"Weber AG (2019) USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and Image Processing Institute, University of Southern California, Department of Electrical Engineering. http:\/\/sipi.usc.edu\/database\/ (accessed on 23rd September, 2019)"},{"key":"10424_CR45","doi-asserted-by":"crossref","unstructured":"Xiang L, Wang X, Yang C, Liu P (2017) A Novel Linguistic Steganography Based on Synonym Run-Length Encoding. IEICE Transactions on Information and Systems.,E100.D:313\u2013322","DOI":"10.1587\/transinf.2016EDP7358"},{"key":"10424_CR46","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","volume":"20","author":"X Zhang","year":"2018","unstructured":"Zhang X, Peng F, Long M (2018) Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. IEEE Trans Multimed 20:3223\u20133238","journal-title":"IEEE Trans Multimed"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10424-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10424-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10424-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T09:22:22Z","timestamp":1619342542000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10424-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,25]]},"references-count":46,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10424"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10424-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,25]]},"assertion":[{"value":"9 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}