{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:52:54Z","timestamp":1769158374996,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11042-021-10784-5","type":"journal-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T10:43:23Z","timestamp":1616150603000},"page":"21751-21769","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Advanced image steganography based on exploiting modification direction and neutrosophic set"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8294-7780","authenticated-orcid":false,"given":"Randa","family":"Atta","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Ghanbari","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Elnahry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,19]]},"reference":[{"issue":"6","key":"10784_CR1","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1049\/iet-ipr.2014.0351","volume":"9","author":"S Ahani","year":"2015","unstructured":"Ahani S, Ghaemmaghami S (2015) Colour image steganography method based on sparse representation. IET Image Process 9(6):496\u2013505","journal-title":"IET Image Process"},{"issue":"18","key":"10784_CR2","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451\u201318472","journal-title":"Multimed Tools Appl"},{"key":"10784_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jvcir.2018.03.009","volume":"53","author":"R Atta","year":"2018","unstructured":"Atta R, Ghanbari M (2018) A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set. J Vis Commun Image Represent 53:42\u201354","journal-title":"J Vis Commun Image Represent"},{"key":"10784_CR4","doi-asserted-by":"crossref","unstructured":"Bas P, Filler T, Pevn\u00fd T (2011) Break our steganographic system: The ins and outs of organizing BOSS, in International Workshop on Information Hiding Springer, pp. 59\u201370","DOI":"10.1007\/978-3-642-24178-9_5"},{"issue":"3","key":"10784_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"key":"10784_CR6","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90:727\u2013752","journal-title":"Signal Process"},{"issue":"3","key":"10784_CR7","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsk\u00fd J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forensics Secur 7(3):868\u2013882","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"23","key":"10784_CR8","doi-asserted-by":"publisher","first-page":"30403","DOI":"10.1007\/s11042-018-6126-y","volume":"77","author":"SK Ghosal","year":"2018","unstructured":"Ghosal SK, Mandal JK, Sarkar R (2018) High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimed Tools Appl 77(23):30403\u201330418","journal-title":"Multimed Tools Appl"},{"key":"10784_CR9","doi-asserted-by":"crossref","unstructured":"Gubbi A, Azeem MF (May 2012) Fuzzy inference system - theory and applications, 1st ed.. InTech, ch. 13, pp. 297\u2013298","DOI":"10.5772\/2341"},{"key":"10784_CR10","first-page":"1","volume":"1","author":"V Holub","year":"2014","unstructured":"Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 1:1\u201313","journal-title":"EURASIP J Inf Secur"},{"key":"10784_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.image.2016.10.005","volume":"50","author":"M Hussain","year":"2017","unstructured":"Hussain M, Wahab AWA, Ho AT, Javed N, Jung KH (2017) A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement. Signal Process Image Commun 50:44\u201357","journal-title":"Signal Process Image Commun"},{"issue":"22","key":"10784_CR12","first-page":"55","volume":"1","author":"EK Kaur","year":"2010","unstructured":"Kaur EK, Mutenja EV, Gill ES (2010) Fuzzy logic based image edge detection algorithm in Matlab. Int J Comput Appl 1(22):55\u201358","journal-title":"Int J Comput Appl"},{"issue":"2","key":"10784_CR13","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.camwa.2010.01.006","volume":"60","author":"HJ Kim","year":"2010","unstructured":"Kim HJ, Kim C, Choi Y, Wang S, Zhang X (2010) Improved modification direction methods. Comput Math Appl 60(2):319\u2013352","journal-title":"Comput Math Appl"},{"issue":"2","key":"10784_CR14","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsk\u00fd","year":"2012","unstructured":"Kodovsk\u00fd J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensics Secur 7(2):432\u2013444","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"2","key":"10784_CR15","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.dt.2018.08.003","volume":"15","author":"S Kumar","year":"2019","unstructured":"Kumar S, Singh A, Kumar M (2019) Information hiding with adaptive steganography based on novel fuzzy edge identification. Defence Technol 15(2):162\u2013169","journal-title":"Defence Technol"},{"key":"10784_CR16","doi-asserted-by":"crossref","unstructured":"Kuo WC, Wuu LC, Kuo SH (Aug. 2012) The high embedding steganographic method based on general multi-EMD, in International Conference on Information Security and Intelligent Control (ISIC\u201912), pp.288\u2013291","DOI":"10.1109\/ISIC.2012.6449762"},{"issue":"4","key":"10784_CR17","first-page":"38","volume":"2","author":"N Kushwaha","year":"2012","unstructured":"Kushwaha N (2012) Edge detection using fuzzy logic in Matlab. International Journal of Advanced Research in Computer Science and Software Engineering 2(4):38\u201340","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"10784_CR18","doi-asserted-by":"crossref","unstructured":"Lee CF, Wang YR, Chang CC (2007) A steganographic method with high embedding capacity by improving exploiting modification direction, in Proc International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 497\u2013500","DOI":"10.1109\/IIH-MSP.2007.62"},{"issue":"12","key":"10784_CR19","doi-asserted-by":"publisher","first-page":"1670","DOI":"10.1016\/j.imavis.2008.05.005","volume":"26","author":"CF Lee","year":"2008","unstructured":"Lee CF, Chang CC, Wang KH (2008) An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vis Comput 26(12):1670\u20131676","journal-title":"Image Vis Comput"},{"issue":"5","key":"10784_CR20","first-page":"607","volume":"17","author":"CF Lee","year":"2015","unstructured":"Lee CF, Chang CC, Pai PY, Liu CM (2015) Adjustment hiding method based on exploiting modification direction. J Netw Secur 17(5):607\u2013618","journal-title":"J Netw Secur"},{"issue":"3","key":"10784_CR21","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10784_CR22","doi-asserted-by":"crossref","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2020.3004708"},{"issue":"5","key":"10784_CR23","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285\u2013287","journal-title":"IEEE Signal Process Lett"},{"issue":"5","key":"10784_CR24","first-page":"243","volume":"9","author":"X Niu","year":"2015","unstructured":"Niu X, Ma M, Tang R, Yin Z (2015) Image steganography via fully exploiting modification direction. Int J Secur Appl 9(5):243\u2013254","journal-title":"Int J Secur Appl"},{"issue":"7","key":"10784_CR25","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"issue":"2","key":"10784_CR26","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2010.2045842","volume":"5","author":"T Pevn\u00fd","year":"2010","unstructured":"Pevn\u00fd T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inform Forensics Secur 5(2):215\u2013224","journal-title":"IEEE Trans Inform Forensics Secur"},{"issue":"8","key":"10784_CR27","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1049\/el.2017.3336","volume":"54","author":"S Saha","year":"2018","unstructured":"Saha S, Ghosal SK, Chakraborty A, Dhargupta S, Sarkar R, Mandal JK (2018) Improved exploiting modification direction-based steganography using dynamic weightage array. Electron Lett 54(8):498\u2013500","journal-title":"Electron Lett"},{"issue":"1","key":"10784_CR28","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-019-06393-z","volume":"108","author":"A Sahu","year":"2019","unstructured":"Sahu A, Swain G (2019) An optimal information hiding approach based on pixel value diferencing and modulus function. Wirel Pers Commun 108(1):159\u2013174","journal-title":"Wirel Pers Commun"},{"key":"10784_CR29","doi-asserted-by":"crossref","unstructured":"Sahu AK, Swain G (2019) A novel n-rightmost bit replacement image steganography technique. 3D Research 10(1)","DOI":"10.1007\/s13319-018-0211-x"},{"issue":"1","key":"10784_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.2478\/cait-2018-0006","volume":"18","author":"AK Sahu","year":"2018","unstructured":"Sahu AK, Swain G, Babu ES (2018) Digital image steganography using bit flipping. Cybernetics Inform Technol 18(1):69\u201380","journal-title":"Cybernetics Inform Technol"},{"key":"10784_CR31","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","volume":"48","author":"SY Shen","year":"2015","unstructured":"Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131\u2013141","journal-title":"Comput Secur"},{"key":"10784_CR32","first-page":"1","volume":"14","author":"S Shen","year":"2017","unstructured":"Shen S, Huang L, Yu S (2017) A novel adaptive data hiding based on improved EMD and interpolation. Multimedia Tools Appl 14:1\u201317","journal-title":"Multimedia Tools Appl"},{"issue":"11","key":"10784_CR33","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1049\/iet-ipr.2013.0584","volume":"8","author":"HW Tseng","year":"2014","unstructured":"Tseng HW, Leng HS (2014) A high-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process 8(11):647\u2013654","journal-title":"IET Image Process"},{"issue":"1","key":"10784_CR34","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.jss.2007.01.049","volume":"81","author":"CM Wang","year":"2008","unstructured":"Wang CM, Wu NI, Tsai CS, Hwang MS (2008) A high quality steganographic method with pixel-value differencing and modulus function. J Syst Softw 81(1):150\u2013158","journal-title":"J Syst Softw"},{"key":"10784_CR35","doi-asserted-by":"crossref","unstructured":"Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. Lecture Notes in Computer Science, Springer:1768","DOI":"10.1007\/10719724_5"},{"issue":"5","key":"10784_CR36","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1049\/ip-vis:20059022","volume":"152","author":"HC Wu","year":"2005","unstructured":"Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Vision, Image and Signal Processing 152(5):611\u2013615","journal-title":"IEE Vision, Image and Signal Processing"},{"issue":"113","key":"10784_CR37","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(113):781\u2013783","journal-title":"IEEE Commun Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10784-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10784-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10784-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T05:19:04Z","timestamp":1621919944000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10784-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,19]]},"references-count":37,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10784"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10784-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,19]]},"assertion":[{"value":"4 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}