{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:55Z","timestamp":1775745355075,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-021-10528-5","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T15:03:36Z","timestamp":1611846216000},"page":"14665-14691","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map"],"prefix":"10.1007","volume":"80","author":[{"given":"Rajwinder","family":"Kaur","sequence":"first","affiliation":[]},{"given":"Butta","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"issue":"1","key":"10528_CR1","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.ijleo.2013.06.082","volume":"125","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn C, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik - Int J Light Electron Opt 125(1):428\u2013434","journal-title":"Optik - Int J Light Electron Opt"},{"issue":"3.4","key":"10528_CR2","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3.4):313\u2013336","journal-title":"IBM Syst J"},{"issue":"4","key":"10528_CR3","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.1007\/s11235-011-9542-0","volume":"52","author":"K Bhowal","year":"2013","unstructured":"Bhowal K, Bhattacharyya D, Pal AJ, Kim TH (2013) A GA based audio steganography with enhanced security. Telecommun Syst 52(4):2197\u2013220","journal-title":"Telecommun Syst"},{"issue":"3","key":"10528_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C Chan","year":"2004","unstructured":"Chan C, Cheng L (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"issue":"4","key":"10528_CR5","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.1007\/s11042-017-4886-4","volume":"78","author":"DS Chauhan","year":"2019","unstructured":"Chauhan DS, Singh AK, Kumar B, Saini JP (2019) Quantization based multiple medical information watermarking for secure e-health. Multimed Tools Appl 78(4):3911\u20133923","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10528_CR6","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Sig Process 90 (3):727\u2013752","journal-title":"Sig Process"},{"issue":"3","key":"10528_CR7","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.image.2014.01.003","volume":"29","author":"J Chen","year":"2014","unstructured":"Chen J (2014) A PVD-based data hiding method with histogram preserving using pixel pair matching. Signal Process Image Commun 29(3):375\u2013384","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"10528_CR8","first-page":"1","volume":"1","author":"CM Chen","year":"2017","unstructured":"Chen CM, Wang KH, Wu TY, Wang EK (2017) On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci Pattern Recog 1(2):1\u201310","journal-title":"Data Sci Pattern Recog"},{"issue":"4","key":"10528_CR9","first-page":"19368","volume":"8","author":"Z Divya","year":"2016","unstructured":"Divya Z, Bharathi M, Dhikhi T (2016) A survey on image steganography techniques. Int J Pharm Technol 8(4):19368\u201319377","journal-title":"Int J Pharm Technol"},{"key":"10528_CR10","doi-asserted-by":"publisher","first-page":"107811","DOI":"10.1016\/j.sigpro.2020.107811","volume":"179","author":"O Evsutin","year":"2020","unstructured":"Evsutin O, Melman A, Meshcheryakov R (2020) Algorithm of error-free information embedding into the DCT domain of digital images based on the QIM method using adaptive masking of distortions. Sig Process 179:107811","journal-title":"Sig Process"},{"issue":"6","key":"10528_CR11","doi-asserted-by":"publisher","first-page":"1898","DOI":"10.1016\/j.cnsns.2013.10.014","volume":"19","author":"M Ghebleh","year":"2014","unstructured":"Ghebleh M, Kanso A (2014) A robust chaotic algorithm for digital image steganography. Commun Nonlinear Sci Numer Simul 19(6):1898\u20131907","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10528_CR12","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.ins.2016.01.017","volume":"339","author":"Z Hua","year":"2016","unstructured":"Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inform Sci 339:234\u2013253","journal-title":"Inform Sci"},{"key":"10528_CR13","unstructured":"Hussain M, Wahab AWA, Idris YIB, Javed N, Salleh R High capacity data embedding method with LSB and PVD shift. Proceedings of International Cryptology and Information Security Conference, Malaysiapp. pp 139\u2013149"},{"key":"10528_CR14","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.image.2016.10.005","volume":"50","author":"M Hussain","year":"2017","unstructured":"Hussain M, Abdul Wahab AW, Ho ATS, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44\u201357","journal-title":"Signal Process Image Commun"},{"issue":"6","key":"10528_CR15","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1007\/s11042-014-2081-4","volume":"74","author":"K Jung","year":"2015","unstructured":"Jung K, Yoo K (2015) High-capacity index based data hiding method. Multimed Tools Appl 74(6):2179\u20132193","journal-title":"Multimed Tools Appl"},{"issue":"29-30","key":"10528_CR16","doi-asserted-by":"publisher","first-page":"21155","DOI":"10.1007\/s11042-020-08925-3","volume":"79","author":"S Kang","year":"2020","unstructured":"Kang S, Park H, Park J (2020) Combining LSB embedding with modified Octa-PVD embedding. Multimed Tools Appl 79(29-30):21155\u201321175","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"10528_CR17","doi-asserted-by":"publisher","first-page":"3287","DOI":"10.1016\/j.cnsns.2011.12.012","volume":"17","author":"A Kansoa","year":"2012","unstructured":"Kansoa A, Own S (2012) H: steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287\u20133302","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10528_CR18","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.future.2020.02.029","volume":"107","author":"M Kaur","year":"2020","unstructured":"Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map. Futur Gener Comput Syst 107:333\u2013350","journal-title":"Futur Gener Comput Syst"},{"issue":"17","key":"10528_CR19","doi-asserted-by":"publisher","first-page":"8045","DOI":"10.1007\/s00500-018-3441-1","volume":"23","author":"A Khan","year":"2019","unstructured":"Khan A, Sarfaraz A (2019) Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method. Soft Comput 23(17):8045\u20138056","journal-title":"Soft Comput"},{"issue":"1","key":"10528_CR20","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101\u2013114","journal-title":"J Real-Time Image Proc"},{"issue":"15","key":"10528_CR21","doi-asserted-by":"publisher","first-page":"5336","DOI":"10.3390\/app10155336","volume":"10","author":"C Kim","year":"2020","unstructured":"Kim C, Shin D, Yang CN, Leng L (2020) Hybrid data hiding based on AMBTC using enhanced Hamming code. Appl Sci 10(15):5336","journal-title":"Appl Sci"},{"issue":"4","key":"10528_CR22","doi-asserted-by":"publisher","first-page":"644","DOI":"10.3390\/electronics9040644","volume":"9","author":"C Kim","year":"2020","unstructured":"Kim C, Yang CN, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9(4):644","journal-title":"Electronics"},{"key":"10528_CR23","first-page":"94","volume":"47","author":"R Kumar","year":"2019","unstructured":"Kumar R, Kim DS, Jung KH (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inf Secur Appl 47:94\u2013103","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"10528_CR24","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2016","unstructured":"Leng L, Li M, Kim C, Bi X (2016) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333\u2013354","journal-title":"Multimed Tools Appl"},{"issue":"17","key":"10528_CR25","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543\u20132554","journal-title":"Int J Phys Sci"},{"issue":"5","key":"10528_CR26","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1016\/j.csi.2013.12.013","volume":"36","author":"YK Lin","year":"2014","unstructured":"Lin YK (2014) A data hiding scheme based upon DCT coefficient modification. Comput Stand Interfaces 36(5):855\u2013862","journal-title":"Comput Stand Interfaces"},{"issue":"4","key":"10528_CR27","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s11045-017-0530-8","volume":"29","author":"A Malik","year":"2018","unstructured":"Malik A, Sikka G, Verma HK (2018) An AMBTC compression based data hiding scheme using pixel value adjusting strategy. Multidim Syst Sign Process 29(4):1801\u20131818","journal-title":"Multidim Syst Sign Process"},{"issue":"2","key":"10528_CR28","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/BF00193563","volume":"5","author":"UM Maurer","year":"1992","unstructured":"Maurer UM (1992) A universal statistical test for random bit generators. J Cryptol 5(2):89\u2013105","journal-title":"J Cryptol"},{"key":"10528_CR29","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J (2010) NIST Special Publication 800-22 rev1a, A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST, US Department of Commerce, USA"},{"key":"10528_CR30","doi-asserted-by":"crossref","unstructured":"Nazari M, Ahmadi ID (2020) A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimed Tools Appl, 79 pp 1\u201332","DOI":"10.1007\/s11042-019-08415-1"},{"key":"10528_CR31","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Sig Process 138:129\u2013137","journal-title":"Sig Process"},{"issue":"11","key":"10528_CR32","doi-asserted-by":"publisher","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493\u201313510","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10528_CR33","doi-asserted-by":"publisher","first-page":"3974","DOI":"10.1109\/TIP.2013.2265882","volume":"22","author":"A Saxena","year":"2013","unstructured":"Saxena A, Fernandes F (2013) DCT\/DST-based transform coding for intra prediction in image\/video coding. IEEE Trans Image Process 22 (10):3974\u2013398","journal-title":"IEEE Trans Image Process"},{"key":"10528_CR34","doi-asserted-by":"crossref","unstructured":"Sharma VK, Mathur P, Srivastava DK (2019) Highly secure DWT steganography scheme for encrypted data hiding. In: Information and Communication Technology for Intelligent Systems, pp 665\u2013673","DOI":"10.1007\/978-981-13-1742-2_66"},{"key":"10528_CR35","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","volume":"48","author":"S Shen","year":"2015","unstructured":"Shen S, Huang L (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131\u2013141","journal-title":"Comput Secur"},{"key":"10528_CR36","unstructured":"Smart N (2012) ECRYPT II yearly report on algorithms and Keysizes (2011\u20132012), Technical report, european network of excellence in cryptology II"},{"issue":"2","key":"10528_CR37","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"Sun S (2016) A novel edge based image steganography with 2k correction and Huffman encoding. Inf Process Lett 116(2):93\u201399","journal-title":"Inf Process Lett"},{"issue":"2","key":"10528_CR38","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","volume":"7","author":"W Sun","year":"2013","unstructured":"Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. SIViP 7 (2):297\u2013306","journal-title":"SIViP"},{"key":"10528_CR39","unstructured":"Tseng HW, Leng HS (2013) A steganographic method based on pixel-value differencing and the perfect square number. J Appl Math Volume 2013, pp. 1\u20138"},{"key":"10528_CR40","unstructured":"Turner LF (1989) Digital data security system, Patent IPN, WO, 89(08915) p.21"},{"key":"10528_CR41","doi-asserted-by":"crossref","unstructured":"Valandar MY, Barani MJ, Ayubi P, Aghazadeh M (2019) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed Tools Appl, 78(8), pp. 9971\u20139989","DOI":"10.1007\/s11042-018-6584-2"},{"issue":"3","key":"10528_CR42","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"BA Wang","year":"2002","unstructured":"Wang BA (2002) A universal image quality index. IEEE Sig Process Lett 9(3):81\u201384","journal-title":"IEEE Sig Process Lett"},{"key":"10528_CR43","unstructured":"Wang Z, Dong J, Zhen J, Zhu F (2019) Template protection based on chaotic map and DNA encoding for multimodal biometrics at feature level fusion. J Inf Hiding Multimed Sig Process, vol 10 (1) pp. 1\u201310."},{"key":"10528_CR44","unstructured":"Wu HC, Chao RM, Lee CC, Chu YP (2009) A novel image data hiding scheme with diamond encoding. Eurasip J Inf Secur, 1 pp 1\u20139"},{"issue":"9-10","key":"10528_CR45","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D Wu","year":"2003","unstructured":"Wu D, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recoginition Lett 24(9-10):1613\u20131626","journal-title":"Pattern Recoginition Lett"},{"issue":"24","key":"10528_CR46","doi-asserted-by":"publisher","first-page":"11163","DOI":"10.1007\/s11042-014-2223-8","volume":"74","author":"Y Yao","year":"2015","unstructured":"Yao Y, Zhang W, Yu N, Zhao X (2015) Defining embedding distortion for motion vector-based video steganography. Multimed Tools Appl 74 (24):11163\u201311186","journal-title":"Multimed Tools Appl"},{"key":"10528_CR47","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1016\/j.jvcir.2018.12.038","volume":"58","author":"J Zhang","year":"2019","unstructured":"Zhang J, Lu W, Yin X, Liu W, Yeung Y (2019) Binary image steganography based on joint distortion measurement. J Vis Commun Image Represent 58:600\u2013605","journal-title":"J Vis Commun Image Represent"},{"issue":"11","key":"10528_CR48","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781\u2013783","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10528-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10528-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10528-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:59:22Z","timestamp":1619503162000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10528-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":48,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10528"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10528-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"16 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}