{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:47:37Z","timestamp":1776293257504,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11042-021-11177-4","type":"journal-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T21:02:37Z","timestamp":1629406957000},"page":"33475-33503","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":80,"title":["Image steganography using deep learning based edge detection"],"prefix":"10.1007","volume":"80","author":[{"given":"Biswarup","family":"Ray","sequence":"first","affiliation":[]},{"given":"Souradeep","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Sabbir","family":"Hossain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8697-0803","authenticated-orcid":false,"given":"Sudipta Kr","family":"Ghosal","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,19]]},"reference":[{"key":"11177_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD dissertation, Dept. of applied computing, Buckingham Univ., Buckingham, UK. http:\/\/bear.buckingham.ac.uk\/149\/"},{"key":"11177_CR2","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on Bitplane indexes. IEEE International Symposium on Multimedia 2013:287\u2013291","DOI":"10.1109\/ISM.2013.55"},{"key":"11177_CR3","doi-asserted-by":"crossref","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2013) Efficient high capacity steganography technique, Proceedings of SPIE - The International Society for Optical Engineering.","DOI":"10.1117\/12.2018994"},{"key":"11177_CR4","doi-asserted-by":"crossref","unstructured":"Akhtar N, Ahamad V, and Javed H (2017) A compressed LSB steganography method. IEEE. Ghaziabad, India.","DOI":"10.1109\/CIACT.2017.7977371"},{"key":"11177_CR5","doi-asserted-by":"crossref","unstructured":"Bhattacharyya D, Kim T (2011) Image data hiding technique using discrete Fourier transformation. Ubiquitous computing and multimedia applications: second international conference, UCMA 2011. Daejeon, Korea","DOI":"10.1007\/978-3-642-20998-7_39"},{"key":"11177_CR6","unstructured":"Boehm B (2014) StegExpose - a tool for detecting LSB steganography. Multimedia, Cryptography and Security:1\u201311"},{"key":"11177_CR7","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2018","unstructured":"Boroumand M, Chen M, Fridrich J (2018) Deep residual network for Steganalysis of digital images. IEEE Transactions on Information and security 14:1181\u20131193","journal-title":"IEEE Transactions on Information and security"},{"key":"11177_CR8","unstructured":"Chandwadkar R, Dhole SP. (2013) Comparison of Edge Detection Techniques. 6th Annual Conference of IRAJ"},{"issue":"4","key":"11177_CR9","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1016\/j.eswa.2009.09.050","volume":"37","author":"W-J Chen","year":"2010","unstructured":"Chen W-J, Chang C-C, Chang C-C (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292\u20133301","journal-title":"Expert Syst Appl"},{"issue":"4","key":"11177_CR10","doi-asserted-by":"publisher","first-page":"17589","DOI":"10.1007\/s11042-018-7123-x","volume":"78","author":"S Dhargupta","year":"2019","unstructured":"Dhargupta S, Chakraborty A, Ghosal SK, Saha S, Sarkar R (2019) Fuzzy edge detection based steganography using modified Gaussian distribution. Multimed Tools Appl 78(4):17589\u201317606","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"11177_CR11","doi-asserted-by":"publisher","first-page":"1976","DOI":"10.21275\/v5i6.NOV164686","volume":"5","author":"RR Dube","year":"2016","unstructured":"Dube RR, Lalkot MA (2016) Improved edge based steganography scheme for GrayScale images in spatial domain. International Journal of Science and Research (IJSR) 5(6):1976\u20131978","journal-title":"International Journal of Science and Research (IJSR)"},{"key":"11177_CR12","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/ICIP.2002.1039052","volume":"3","author":"S Dumitrescu","year":"2002","unstructured":"Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random LSB embedding in continuous-tone images. Proceedings of International Conference on Image Processing, IEEE 3:641\u2013644","journal-title":"Proceedings of International Conference on Image Processing, IEEE"},{"key":"11177_CR13","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S Dumitrescu","year":"2002","unstructured":"Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB steganography via sample pair analysis. IEEE Trans Signal Process 51:1995\u20132007","journal-title":"IEEE Trans Signal Process"},{"issue":"10","key":"11177_CR14","first-page":"11","volume":"4","author":"MA El-Sayed","year":"2013","unstructured":"El-Sayed MA, Estaitia YA, Khafagy MA (2013) Edge detection using convolutional neural network. Int J Adv Comput Sci Appl 4(10):11\u201317","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"3\u20134","key":"11177_CR15","doi-asserted-by":"publisher","first-page":"30403","DOI":"10.1007\/s11042-018-6126-y","volume":"77","author":"S Ghosal","year":"2018","unstructured":"Ghosal S, Mandal JK, Sarkar R (2018) High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimed Tools Appl 77(3\u20134):30403\u201330418","journal-title":"Multimed Tools Appl"},{"key":"11177_CR16","doi-asserted-by":"crossref","unstructured":"Ghosal S, Mukhopadhyay S, Hossain S, Sarkar R (2020) Application of Lah transform for security and privacy of data through information hiding in telecommunication. Transactions on Emerging Telecommunications Technologies","DOI":"10.1002\/ett.3984"},{"key":"11177_CR17","volume-title":"Multimedia Systems","author":"SK Ghosal","year":"2020","unstructured":"Ghosal SK, Chatterjee A, Sarkar R (2020) Image steganography based on kirsch edge detection. In: Multimedia Systems. Springer"},{"key":"11177_CR18","doi-asserted-by":"publisher","first-page":"106964","DOI":"10.1016\/j.compeleceng.2020.106964","volume":"89","author":"S Ghosal","year":"2021","unstructured":"Ghosal S, Mukhopadhyay S, Hossain S, Sarkar R (2021) Exploiting Laguerre transform in image steganography. Computers & Electrical Engineering 89:106964","journal-title":"Computers & Electrical Engineering"},{"key":"11177_CR19","first-page":"22","volume":"8","author":"M Golijan","year":"2001","unstructured":"Golijan M, Rui D, Fridrich J (2001) Detecting LSB steganography in color, and gray-scale images. Multimedia, IEEE 8:22\u201328","journal-title":"Multimedia, IEEE"},{"key":"11177_CR20","doi-asserted-by":"publisher","first-page":"25889","DOI":"10.1007\/s11042-019-07767-y","volume":"78","author":"S Gujjunoori","year":"2019","unstructured":"Gujjunoori S, Oruganti M (2019) Difference expansion based reversible data embedding and edge detection. Multimed Tools Appl 78:25889\u201325917","journal-title":"Multimed Tools Appl"},{"key":"11177_CR21","unstructured":"Han JKW, Hsueh-Ming (2020) Traditional method inspired deep neural network for edge detection. IEEE international conference on image processing (ICIP). Abu Dhabi, United Arab Emirates, United Arab Emirates."},{"issue":"18","key":"11177_CR22","doi-asserted-by":"publisher","first-page":"5036","DOI":"10.1002\/sec.1676","volume":"9","author":"O Hosam","year":"2016","unstructured":"Hosam O, Halima NB (2016) Adaptive block-based pixel value differencing steganography. Security and communication networks, Wiley 9(18):5036\u20135050","journal-title":"Security and communication networks, Wiley"},{"key":"11177_CR23","unstructured":"https:\/\/www.kaggle.com\/vijaygiitk\/multiclass-weather-dataset - Accessed on 20-Jan-2020"},{"key":"11177_CR24","doi-asserted-by":"publisher","unstructured":"Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J. on Info. Security , 8 (1). https:\/\/doi.org\/10.1186\/1687-417X-2014-8","DOI":"10.1186\/1687-417X-2014-8"},{"key":"11177_CR25","unstructured":"Ismail K., El Bachir A and Taouil Y (2018) Image steganography based on edge detection algorithm. International conference on electronics, control, optimization and computer science (ICECOCS). Kenitra, Morocco."},{"issue":"6","key":"11177_CR26","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1007\/s11042-014-2081-4","volume":"74","author":"K Jung","year":"2015","unstructured":"Jung K, Yoo K (2015) High-capacity index based data hiding method. Multimed Tools Appl 74(6):2179\u20132193.","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"11177_CR27","first-page":"5565","volume":"12","author":"DS Kumar","year":"2017","unstructured":"Kumar DS, Kiran R (2017) Data hiding using Fibonacci EDGE based steganography for cloud data. Int J Appl Eng Res 12(16):5565\u20135569","journal-title":"Int J Appl Eng Res"},{"key":"11177_CR28","unstructured":"Lee CF, Chang C and Tsou P (2010) Data Hiding Scheme with High Embedding Capacity and Good Visual Quality Based on Edge Detection.\u00a02010 Fourth International Conference on Genetic and Evolutionary Computing."},{"key":"11177_CR29","doi-asserted-by":"crossref","unstructured":"Ma X, Li B, Zhang Y, Yan M (2012) The Canny Edge Detection and Its Improvement. International Conference on Artificial Intelligence and Computational Intelligence. 50\u201358","DOI":"10.1007\/978-3-642-33478-8_7"},{"key":"11177_CR30","first-page":"416","volume":"2","author":"D Martin","year":"2001","unstructured":"Martin D, Fowlkes C, Tal D, Malik J (2001) A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics. Proc. 8th Int'l Conf.\u00a0Computer Vision 2:416\u2013423","journal-title":"Computer Vision"},{"key":"11177_CR31","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.procs.2016.07.230","volume":"93","author":"N Mathura","year":"2016","unstructured":"Mathura N, Mathur S, Mathur D (2016) A novel approach to improve Sobel edge detector. Procedia Computer Science 93:431\u2013438","journal-title":"Procedia Computer Science"},{"issue":"2","key":"11177_CR32","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-018-5720-3","volume":"77","author":"N Mukherjee","year":"2018","unstructured":"Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77(2):18451\u201318481","journal-title":"Multimed Tools Appl"},{"key":"11177_CR33","doi-asserted-by":"publisher","first-page":"14495","DOI":"10.1007\/s11042-020-10424-4","volume":"80","author":"S Mukhopadhyay","year":"2021","unstructured":"Mukhopadhyay S, Hossain S, Ghosal S, Sarkar R (2021) Secured image steganography based on Catalan transform. Multimed Tools Appl 80:14495\u201314520","journal-title":"Multimed Tools Appl"},{"key":"11177_CR34","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1007\/s11042-019-08103-0","volume":"79","author":"C Pak","year":"2019","unstructured":"Pak C, Kim J, Kwangil A, Kim C, Kim K (2019) A novel color image LSB steganography using improved 1D chaotic map. Multimed Tools Appl 79:1409\u20131425","journal-title":"Multimed Tools Appl"},{"key":"11177_CR35","unstructured":"Poma XS, Riba E, Sappa A (2020) Dense Extreme Inception Network: Towards a Robust CNN Model for Edge Detection. Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)"},{"issue":"2","key":"11177_CR36","doi-asserted-by":"publisher","first-page":"1314","DOI":"10.2478\/cait-2018-0029","volume":"18","author":"DRIM Setiadi","year":"2018","unstructured":"Setiadi DRIM, Jumanto J (2018) An enhanced LSB-image steganography using the hybrid canny-Sobel edge detection. Cybernetics and information technologies 18(2):1314\u20134081","journal-title":"Cybernetics and information technologies"},{"key":"11177_CR37","doi-asserted-by":"publisher","first-page":"3975","DOI":"10.1007\/s11042-019-7584-6","volume":"79","author":"R Shanthakumari","year":"2020","unstructured":"Shanthakumari R, Malliga S (2020) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79:3975\u20133991","journal-title":"Multimed Tools Appl"},{"key":"11177_CR38","doi-asserted-by":"publisher","unstructured":"Shin N (2000) One-Time Hash Steganography. In: Pfitzmann A. (eds) Information Hiding. IH 1999. Lecture notes in computer science, vol 1768. Springer, Berlin, Heidelberg https:\/\/doi.org\/10.1007\/10719724_2","DOI":"10.1007\/10719724_2"},{"issue":"5","key":"11177_CR39","first-page":"269","volume":"9","author":"GT Shrivakshan","year":"2012","unstructured":"Shrivakshan GT, Chandrasekar C (2012) A comparison of various edge detection techniques used in image processing. IJCSI International Journal of Computer Science Issues 9(5):269\u2013276","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"11177_CR40","unstructured":"Stanley CA (2005) Pairs of values and the Chi -Squared Attack. CiteSteer 1\u201345"},{"issue":"11","key":"11177_CR41","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1049\/iet-ipr.2013.0584","volume":"8","author":"H-W Tseng","year":"2014","unstructured":"Tseng H-W, Leng H-S (2014) High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion. IET Image Process 8(11):647\u2013654","journal-title":"IET Image Process"},{"key":"11177_CR42","unstructured":"Tu SX and Zhuowen (2015)\u00a0Holistically-nested edge detection. IEEE international conference on computer vision (ICCV). Santiago, Chile"},{"issue":"5","key":"11177_CR43","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/TPAMI.2007.1027","volume":"29","author":"X Wang","year":"2007","unstructured":"Wang X (2007) Laplacian operator-based edge detectors. IEEE Trans Pattern Anal Mach Intell 29(5):886\u2013900","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"11177_CR44","first-page":"1","volume":"35","author":"Z Wang","year":"2017","unstructured":"Wang Z, Yin Z, Zhang X (2017) Distortion function for JPEG steganography based on image texture and correlation in DCT domain. IETE Tech Rev 35(4):1\u20138","journal-title":"IETE Tech Rev"},{"key":"11177_CR45","unstructured":"Weber AG (1997) USC-SIPI Image Database: Version 5, Original release: October 1997, Signal and image processing institute, University of Southern California, Department of Electrical Engineering."},{"key":"11177_CR46","doi-asserted-by":"crossref","unstructured":"Xue C, Zhang J, Xing J, Lei Y and Sun Y (2019) Research on edge detection operator of a convolutional neural network. IEEE 8th joint international information technology and artificial intelligence conference (ITAIC). Chongqing, China.","DOI":"10.1109\/ITAIC.2019.8785855"},{"key":"11177_CR47","doi-asserted-by":"crossref","unstructured":"Yang L, Wu X , Zhao D , Li H, Zhai J (2011) An improved Prewitt algorithm for edge detection based on noised image.\u00a02011 4th international congress on image and signal processing. Shanghai, China","DOI":"10.1109\/CISP.2011.6100495"},{"key":"11177_CR48","doi-asserted-by":"crossref","unstructured":"Younus ZS, Hussain MK (2019) Image steganography using exploiting modification direction for compressed encrypted data. Journal of King Saud University \u2013Computer and Information Sciences","DOI":"10.1016\/j.jksuci.2019.04.008"},{"issue":"8","key":"11177_CR49","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1016\/j.camwa.2008.11.013","volume":"57","author":"Z Zhang","year":"2009","unstructured":"Zhang Z, Ma S, Liu H, Gong Y (2009) An edge detection approach based on directional wavelet transform. Computers & Mathematics with Applications, Elsevier 57(8):1265\u20131271","journal-title":"Computers & Mathematics with Applications, Elsevier"},{"key":"11177_CR50","unstructured":"Zisserman KS and Andrew (2014) Very deep convolutional networks for large-scale image recognition. Computer Vision and Pattern Recognition."},{"key":"11177_CR51","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.jvcir.2019.02.034","volume":"60","author":"Y Zou","year":"2019","unstructured":"Zou Y, Zhang G, Liu L (2019) Research on image steganography analysis based on deep learning. J Vis Commun Image R 60:266\u2013275","journal-title":"J Vis Commun Image R"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11177-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11177-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11177-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T02:10:31Z","timestamp":1634695831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11177-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,19]]},"references-count":51,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["11177"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11177-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,19]]},"assertion":[{"value":"10 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}