{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T05:51:39Z","timestamp":1771307499298,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T00:00:00Z","timestamp":1613779200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T00:00:00Z","timestamp":1613779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10608-6","type":"journal-article","created":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T21:03:06Z","timestamp":1613854986000},"page":"18821-18837","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Towards a high capacity coverless information hiding approach"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8918-6777","authenticated-orcid":false,"given":"Fatimah Shamsulddin","family":"Abdulsattar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,20]]},"reference":[{"key":"10608_CR1","unstructured":"Bishop CM (2006) Pattern recognition and machine learning. Springer"},{"issue":"3","key":"10608_CR2","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868\u2013882","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"10608_CR3","doi-asserted-by":"publisher","first-page":"829","DOI":"10.32604\/cmc.2019.03729","volume":"58","author":"Y Guo","year":"2019","unstructured":"Guo Y, Li C, Liu Q (2019) R2n: a novel deep learning architecture for rain removal from single image. CMC-Computers Materials and Continua 58 (3):829\u2013843","journal-title":"CMC-Computers Materials and Continua"},{"key":"10608_CR4","doi-asserted-by":"publisher","first-page":"38303","DOI":"10.1109\/ACCESS.2018.2852771","volume":"6","author":"D Hu","year":"2018","unstructured":"Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6:38303\u201338314","journal-title":"IEEE Access"},{"issue":"4","key":"10608_CR5","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2012.2198213","volume":"7","author":"F Huang","year":"2012","unstructured":"Huang F, Huang J, S Y-Q (2012) New channel selection rule for jpeg steganography. IEEE Transactions on Information Forensics and Security 7(4):1181\u20131191","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"10608_CR6","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on information forensics and security 5(2):201\u2013214","journal-title":"IEEE Transactions on information forensics and security"},{"issue":"1","key":"10608_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11554-019-00917-3","volume":"17","author":"Y Luo","year":"2020","unstructured":"Luo Y, Qin J, Xiang X, Tan Y, Liu Q, Xiang L (2020) Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc 17(1):125\u2013135","journal-title":"J Real-Time Image Proc"},{"key":"10608_CR8","doi-asserted-by":"crossref","unstructured":"McKeon RT (2007) Strange fourier steganography in movies. In: IEEE international conference on electro\/information technology, pp 178\u2013182","DOI":"10.1109\/EIT.2007.4374540"},{"key":"10608_CR9","first-page":"1","volume":"92","author":"PK Muhuri","year":"2020","unstructured":"Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:1\u201326","journal-title":"Appl Soft Comput"},{"key":"10608_CR10","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"issue":"2","key":"10608_CR11","first-page":"1","volume":"10","author":"AK Sahu","year":"2019","unstructured":"Sahu AK, Swain G (2019) A novel n-rightmost bit replacement image steganography technique. 3D Research 10(2):1\u201318","journal-title":"3D Research"},{"issue":"1","key":"10608_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-019-0262-y","volume":"21","author":"AK Sahu","year":"2020","unstructured":"Sahu AK, Swain G (2020) Reversible image steganography using dual-layer lsb matching. Sensing and Imaging 21(1):1\u201321","journal-title":"Sensing and Imaging"},{"issue":"9-10","key":"10608_CR13","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D-C Wu","year":"2003","unstructured":"Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9-10):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"2","key":"10608_CR14","first-page":"435","volume":"18","author":"C Yuan","year":"2017","unstructured":"Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. Journal of Internet Technology 18(2):435\u2013442","journal-title":"Journal of Internet Technology"},{"issue":"1","key":"10608_CR15","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/LSP.2004.838214","volume":"12","author":"X Zhang","year":"2005","unstructured":"Zhang X, Wang S (2005) Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters 12(1):67\u201370","journal-title":"IEEE Signal Processing Letters"},{"issue":"12","key":"10608_CR16","doi-asserted-by":"publisher","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","volume":"20","author":"X Zhang","year":"2018","unstructured":"Zhang X, Peng F, Long M (2018) Robust coverless image steganography based on dct and lda topic classification. IEEE Transactions on Multimedia 20 (12):3223\u20133238","journal-title":"IEEE Transactions on Multimedia"},{"key":"10608_CR17","doi-asserted-by":"crossref","unstructured":"Zheng S, Wang L, Ling B, Hu D (2017) Coverless information hiding based on robust image hashing. In: International conference on intelligent computing (ICIC). Springer, pp 536\u2013547","DOI":"10.1007\/978-3-319-63315-2_47"},{"key":"10608_CR18","unstructured":"Zhili Z, Cao Y, Wang M (2019) Faster-rcnn based robust coverless information hiding system in cloud environment. IEEE Access"},{"issue":"3","key":"10608_CR19","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1016\/S1004-4132(07)60139-X","volume":"18","author":"K Zhiwei","year":"2007","unstructured":"Zhiwei K, Jing L, Yigang H (2007) Steganography based on wavelet transform and modulus function. J Syst Eng Electron 18(3):628\u2013632","journal-title":"J Syst Eng Electron"},{"key":"10608_CR20","doi-asserted-by":"crossref","unstructured":"Zhou Z, Sun H, Harit R, Chen X, Sun X (2015) Coverless image steganography without embedding. In: International conference on cloud computing and security. Springer, pp 123\u2013132","DOI":"10.1007\/978-3-319-27051-7_11"},{"issue":"5","key":"10608_CR21","first-page":"527","volume":"34","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Cao Y, Sun X (2016) Coverless information hiding based on bag-of-words model of image. J Appl Sci 34(5):527\u2013536","journal-title":"J Appl Sci"},{"issue":"15","key":"10608_CR22","first-page":"1177","volume":"18","author":"Z Zhou","year":"2017","unstructured":"Zhou Z, Wu QJ, Yang CN, Sun X, Pan Z (2017) Coverless image steganography using histograms of oriented gradients-based hashing algorithm. Journal of Internet Technology 18(15):1177\u20131184","journal-title":"Journal of Internet Technology"},{"key":"10608_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.patrec.2017.08.013","volume":"109","author":"Z Zhou","year":"2018","unstructured":"Zhou Z, Wu Q, Sun X (2018) Encoding multiple contextual clues for partial-duplicate image retrieval. Pattern Recogn Lett 109:18\u201326","journal-title":"Pattern Recogn Lett"},{"issue":"13","key":"10608_CR24","doi-asserted-by":"publisher","first-page":"4927","DOI":"10.1007\/s00500-018-3151-8","volume":"23","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Mu Y, Wu Q (2019) Coverless image steganography using partial-duplicate image retrieval. Soft Comput 23(13):4927\u20134938","journal-title":"Soft Comput"},{"issue":"7","key":"10608_CR25","doi-asserted-by":"publisher","first-page":"7965","DOI":"10.1007\/s11042-018-6444-0","volume":"78","author":"L Zou","year":"2019","unstructured":"Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimedia Tools and Applications 78(7):7965\u20137980","journal-title":"Multimedia Tools and Applications"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10608-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10608-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10608-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T09:26:44Z","timestamp":1621502804000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10608-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,20]]},"references-count":25,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10608"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10608-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,20]]},"assertion":[{"value":"1 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that she has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}