{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:41:04Z","timestamp":1771962064200,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T00:00:00Z","timestamp":1614988800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T00:00:00Z","timestamp":1614988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10780-9","type":"journal-article","created":{"date-parts":[[2021,3,6]],"date-time":"2021-03-06T23:02:12Z","timestamp":1615071732000},"page":"20527-20545","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A high imperceptible data hiding technique using quorum function"],"prefix":"10.1007","volume":"80","author":[{"given":"P. V.","family":"Sabeen Govind","sequence":"first","affiliation":[]},{"given":"Bindiya M.","family":"Varghese","sequence":"additional","affiliation":[]},{"given":"M. V.","family":"Judy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,6]]},"reference":[{"key":"10780_CR1","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.sigpro.2017.02.001","volume":"137","author":"A Arham","year":"2017","unstructured":"Arham A, Nugroho HA, Adji TB (2017) Multiple layer data hiding scheme based on difference expansion of quad. Signal Process 137:52\u201362. https:\/\/doi.org\/10.1016\/j.sigpro.2017.02.001","journal-title":"Signal Process"},{"issue":"5","key":"10780_CR2","doi-asserted-by":"publisher","first-page":"e0231602","DOI":"10.1371\/journal.pone.0231602","volume":"15","author":"F Aziz","year":"2020","unstructured":"Aziz F, Ahmad T, Malik AH, Uddin MI, Ahmad S, Sharaf M (2020) Reversible data hiding techniques with high message embedding capacity in images. PLoS One 15(5):e0231602. https:\/\/doi.org\/10.1371\/journal.pone.0231602","journal-title":"PLoS One"},{"key":"10780_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.displa.2016.12.004","volume":"46","author":"J Bai","year":"2017","unstructured":"Bai J, Chang C, Nguyen T, Zhu C, Liu Y (2017) A high payload steganographic algorithm based on edge detection. Displays 46:42\u201351. https:\/\/doi.org\/10.1016\/j.displa.2016.12.004","journal-title":"Displays"},{"issue":"3","key":"10780_CR4","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s11042-006-0047-x","volume":"31","author":"K Bailey","year":"2006","unstructured":"Bailey K, Curran K (2006) An evaluation of image based steganography methods using visual inspection and automated detection techniques. Multimed Tools Appl 31(3):327\u2013327. https:\/\/doi.org\/10.1007\/s11042-006-0047-x","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"10780_CR5","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s00530-017-0560-y","volume":"25","author":"Y Chen","year":"2017","unstructured":"Chen Y, Chi K (2017) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimedia Systems 25(5):551\u2013563. https:\/\/doi.org\/10.1007\/s00530-017-0560-y","journal-title":"Multimedia Systems"},{"key":"10780_CR6","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.compeleceng.2015.04.014","volume":"46","author":"J Hu","year":"2015","unstructured":"Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electric Eng 46:447\u2013455. https:\/\/doi.org\/10.1016\/j.compeleceng.2015.04.014","journal-title":"Comput Electric Eng"},{"key":"10780_CR7","doi-asserted-by":"publisher","unstructured":"Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Info Security 2014(8). https:\/\/doi.org\/10.1186\/1687-417X-2014-8","DOI":"10.1186\/1687-417X-2014-8"},{"key":"10780_CR8","unstructured":"Jassim, Firas. (2013). A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method. https:\/\/arxiv.org\/abs\/1307.0642"},{"key":"10780_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/9475142","volume":"2018","author":"K Joshi","year":"2018","unstructured":"Joshi K, Gill S, Yadav R (2018) A new method of image steganography using 7th bit of a pixel as Indicator by introducing the successive temporary pixel in the gray scale image. J Comput Networks Commun 2018:1\u201310. https:\/\/doi.org\/10.1155\/2018\/9475142","journal-title":"J Comput Networks Commun"},{"key":"10780_CR10","doi-asserted-by":"publisher","first-page":"7795","DOI":"10.1007\/s11042-017-5066-2","volume":"77","author":"KH Jung","year":"2018","unstructured":"Jung KH (2018) A survey of interpolation-based reversible data hiding methods. Multimed Tools Appl 77:7795\u20137810. https:\/\/doi.org\/10.1007\/s11042-017-5066-2","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10780_CR11","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","volume":"31","author":"K-H Jung","year":"2009","unstructured":"Jung K-H, Yoo K-Y (2009) Data hiding method using image interpolation. Comput Standards Interfaces 31(2):465\u2013470. https:\/\/doi.org\/10.1016\/j.csi.2008.06.001","journal-title":"Comput Standards Interfaces"},{"issue":"3","key":"10780_CR12","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1007\/s11042-012-1293-8","volume":"71","author":"K Jung","year":"2012","unstructured":"Jung K, Yoo K (2012) Data hiding using edge detector for scalable images. Multimed Tools Appl 71(3):1455\u20131468. https:\/\/doi.org\/10.1007\/s11042-012-1293-8","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10780_CR13","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1007\/s00521-018-3489-y","volume":"30","author":"MR Khosravi","year":"2018","unstructured":"Khosravi MR, Yazdi M (2018) A lossless data hiding scheme for medical images using a hybrid solution based on IBRW error histogram computation and quartered interpolation with greedy weights. Neural Comput & Applic 30(7):2017\u20132028. https:\/\/doi.org\/10.1007\/s00521-018-3489-y","journal-title":"Neural Comput & Applic"},{"issue":"11","key":"10780_CR14","doi-asserted-by":"publisher","first-page":"3236","DOI":"10.1109\/tcsvt.2018.2878932","volume":"29","author":"S Kim","year":"2019","unstructured":"Kim S, Qu X, Sachnev V, Kim HJ (2019) Skewed histogram shifting for reversible data hiding using a pair of extreme predictions. IEEE Trans Circuits Syst Video Technol 29(11):3236\u20133246. https:\/\/doi.org\/10.1109\/tcsvt.2018.2878932","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10780_CR15","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.jisa.2019.04.007","volume":"47","author":"R Kumar","year":"2019","unstructured":"Kumar R, Kim D, Jung K (2019) Enhanced AMBTC based data hiding method using hamming distance and pixel value differencing. J Inform Secur Appl 47:94\u2013103. https:\/\/doi.org\/10.1016\/j.jisa.2019.04.007","journal-title":"J Inform Secur Appl"},{"issue":"6","key":"10780_CR16","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1166\/jctn.2018.7477","volume":"15","author":"S Lakshmanan","year":"2018","unstructured":"Lakshmanan S, Rani MM (2018) Reversible data hiding in medical images using edge detection and difference expansion technique. J Comput Theor Nanosci 15(6):2400\u20132404. https:\/\/doi.org\/10.1166\/jctn.2018.7477","journal-title":"J Comput Theor Nanosci"},{"issue":"8","key":"10780_CR17","doi-asserted-by":"publisher","first-page":"6712","DOI":"10.1016\/j.eswa.2011.12.019","volume":"39","author":"C Lee","year":"2012","unstructured":"Lee C, Huang Y (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712\u20136719. https:\/\/doi.org\/10.1016\/j.eswa.2011.12.019","journal-title":"Expert Syst Appl"},{"issue":"5","key":"10780_CR18","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1016\/j.csi.2013.12.013","volume":"36","author":"Y Lin","year":"2014","unstructured":"Lin Y (2014) A data hiding scheme based upon DCT coefficient modification. Comput Standards Interfaces 36(5):855\u2013862. https:\/\/doi.org\/10.1016\/j.csi.2013.12.013","journal-title":"Comput Standards Interfaces"},{"issue":"1","key":"10780_CR19","first-page":"45","volume":"26","author":"P Maniriho","year":"2018","unstructured":"Maniriho P, Ahmad T (2018) Enhancing the capability of data hiding method based on reduced difference expansion. Eng Lett 26(1):45\u201355","journal-title":"Eng Lett"},{"issue":"3","key":"10780_CR20","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.jksuci.2018.01.011","volume":"31","author":"P Maniriho","year":"2019","unstructured":"Maniriho P, Ahmad T (2019) Information hiding scheme for digital images using difference expansion and modulus function. J King Saud Univ - Comput Inform Sci 31(3):335\u2013347. https:\/\/doi.org\/10.1016\/j.jksuci.2018.01.011","journal-title":"J King Saud Univ - Comput Inform Sci"},{"key":"10780_CR21","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1109\/ICCITechn.2011.6164800","volume-title":"A new approach for LSB based image steganography using secret key","author":"SM Masud Karim","year":"2011","unstructured":"Masud Karim SM, Rahman MS, Hossain MI (2011) A new approach for LSB based image steganography using secret key. 14th international conference on computer and information technology (ICCIT 2011), Dhaka, pp 286\u2013291. https:\/\/doi.org\/10.1109\/ICCITechn.2011.6164800"},{"issue":"21","key":"10780_CR22","doi-asserted-by":"publisher","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","volume":"74","author":"D Ou","year":"2014","unstructured":"Ou D, Sun W (2014) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimed Tools Appl 74(21):9117\u20139139. https:\/\/doi.org\/10.1007\/s11042-014-2059-2","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10780_CR23","doi-asserted-by":"publisher","first-page":"3943","DOI":"10.1007\/s11042-016-4196-2","volume":"76","author":"SA Parah","year":"2016","unstructured":"Parah SA, Ahad F, Sheikh JA, Loan NA, Bhat GM (2016) A new reversible and high capacity data hiding technique for E-healthcare applications. Multimed Tools Appl 76(3):3943\u20133975. https:\/\/doi.org\/10.1007\/s11042-016-4196-2","journal-title":"Multimed Tools Appl"},{"key":"10780_CR24","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat G (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230. https:\/\/doi.org\/10.1016\/j.jbi.2017.01.006","journal-title":"J Biomed Inform"},{"issue":"S5","key":"10780_CR25","doi-asserted-by":"publisher","first-page":"12313","DOI":"10.1007\/s10586-017-1614-9","volume":"22","author":"R Rajkumar","year":"2018","unstructured":"Rajkumar R, Vasuki A (2018) Reversible and robust image watermarking based on histogram shifting. Clust Comput 22(S5):12313\u201312323. https:\/\/doi.org\/10.1007\/s10586-017-1614-9","journal-title":"Clust Comput"},{"issue":"8","key":"10780_CR26","doi-asserted-by":"publisher","first-page":"9717","DOI":"10.1007\/s11042-018-6544-x","volume":"78","author":"A Shaik","year":"2018","unstructured":"Shaik A, V, T. (2018) High capacity reversible data hiding using 2D parabolic interpolation. Multimed Tools Appl 78(8):9717\u20139735. https:\/\/doi.org\/10.1007\/s11042-018-6544-x","journal-title":"Multimed Tools Appl"},{"issue":"04","key":"10780_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.jei.28.4.043025","volume":"28","author":"S Solak","year":"2019","unstructured":"Solak S, Alt\u0131n\u0131\u015f\u0131k U (2019) Image steganography based on LSB substitution and encryption method: adaptive LSB+3. J Electronic Imaging 28(04):1. https:\/\/doi.org\/10.1117\/1.jei.28.4.043025","journal-title":"J Electronic Imaging"},{"issue":"4","key":"10780_CR28","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s13369-018-3372-2","volume":"44","author":"G Swain","year":"2018","unstructured":"Swain G (2018) Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab J Sci Eng 44(4):2995\u20133004. https:\/\/doi.org\/10.1007\/s13369-018-3372-2","journal-title":"Arab J Sci Eng"},{"key":"10780_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/5325040","volume":"2018","author":"M Taleby Ahvanooey","year":"2018","unstructured":"Taleby Ahvanooey M, Li Q, Shim HJ, Huang Y (2018) A comparative analysis of information hiding techniques for copyright protection of text documents. Secur Commun Networks 2018:1\u201322. https:\/\/doi.org\/10.1155\/2018\/5325040","journal-title":"Secur Commun Networks"},{"issue":"8","key":"10780_CR30","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/tcsvt.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890\u2013896. https:\/\/doi.org\/10.1109\/tcsvt.2003.815962","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10780_CR31","unstructured":"USC-SIPI Image Database, University of Southern California. Available online at http:\/\/sipi.usc.edu\/database"},{"issue":"4","key":"10780_CR32","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/tip.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612. https:\/\/doi.org\/10.1109\/tip.2003.819861","journal-title":"IEEE Trans Image Process"},{"key":"10780_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCYB.2015.2514110","volume":"47","author":"J Wang","year":"2016","unstructured":"Wang J, Ni J, Zhang X, Shi YQ (2016) Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting. IEEE Trans Cybernet 47:1\u201312. https:\/\/doi.org\/10.1109\/TCYB.2015.2514110","journal-title":"IEEE Trans Cybernet"},{"key":"10780_CR34","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.sigpro.2018.04.008","volume":"150","author":"W Wang","year":"2018","unstructured":"Wang W, Ye J, Wang T, Wang W (2018) A high capacity reversible data hiding scheme based on right-left shift. Signal Process 150:102\u2013115. https:\/\/doi.org\/10.1016\/j.sigpro.2018.04.008","journal-title":"Signal Process"},{"key":"10780_CR35","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1186\/s13640-017-0206-1","volume":"2017","author":"FT Wedaj","year":"2017","unstructured":"Wedaj FT, Kim S, Kim HJ, Huang F (2017) Improved reversible data hiding in JPEG images based on new coefficient selection strategy. J Image Video Proc 2017:63. https:\/\/doi.org\/10.1186\/s13640-017-0206-1","journal-title":"J Image Video Proc"},{"issue":"2","key":"10780_CR36","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.jvcir.2013.11.001","volume":"25","author":"X Zhang","year":"2014","unstructured":"Zhang X, Qian Z, Feng G, Ren Y (2014) Efficient reversible data hiding in encrypted images. J Vis Commun Image Represent 25(2):322\u2013328. https:\/\/doi.org\/10.1016\/j.jvcir.2013.11.001","journal-title":"J Vis Commun Image Represent"},{"key":"10780_CR37","doi-asserted-by":"publisher","first-page":"9195","DOI":"10.1007\/s11042-016-3521-0","volume":"76","author":"X Zhang","year":"2017","unstructured":"Zhang X, Sun Z, Tang Z, Yu C, Wang X (2017) High capacity data hiding based on interpolated image. Multimed Tools Appl 76:9195\u20139218. https:\/\/doi.org\/10.1007\/s11042-016-3521-0","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10780-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10780-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10780-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T06:24:20Z","timestamp":1621578260000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10780-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,6]]},"references-count":37,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10780"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10780-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,6]]},"assertion":[{"value":"28 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}