{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:02Z","timestamp":1740122882684,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:00:00Z","timestamp":1632096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11042-021-11405-x","type":"journal-article","created":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T13:07:42Z","timestamp":1632143262000},"page":"953-973","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A new reversible low-distortion steganography method that hides images into RGB images with low loss"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5347-4491","authenticated-orcid":false,"given":"Ali","family":"Durdu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,20]]},"reference":[{"key":"11405_CR1","unstructured":"Abdulla AA (2015) Exploiting Similarities Between Secret and Cover Images for Improved Embedding Efficiency and Security in Digital Steganography. Dissertation, The University of Buckingham"},{"key":"11405_CR2","doi-asserted-by":"publisher","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2013) Secure Steganography Technique Based on Bitplane Indexes, 2013 IEEE Intern Symp Multimedia 287\u2013291. https:\/\/doi.org\/10.1109\/ISM.2013.55","DOI":"10.1109\/ISM.2013.55"},{"key":"11405_CR3","doi-asserted-by":"publisher","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2014) Steganography based on pixel intensity value decomposition, Proc. SPIE 9120, Mobile Multimedia\/Image Process Sec App 2014, 912005 (28 May 2014); https:\/\/doi.org\/10.1117\/12.2050518","DOI":"10.1117\/12.2050518"},{"key":"11405_CR4","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78:17799\u201317823. https:\/\/doi.org\/10.1007\/s11042-019-7166-7","journal-title":"Multimed Tools Appl"},{"key":"11405_CR5","doi-asserted-by":"publisher","unstructured":"Chan C (2009) On Using LSB Matching Function for Data Hiding in Pixels. Fundamenta Informaticae 96(1\u20132): 49\u201359. https:\/\/doi.org\/10.3233\/FI-2009-166","DOI":"10.3233\/FI-2009-166"},{"key":"11405_CR6","doi-asserted-by":"publisher","unstructured":"Chen B, Luo W, Zheng P, Huang J (2020) Universal stego post-processing for enhancing image steganography. J Inform Secur App 55. https:\/\/doi.org\/10.1016\/j.jisa.2020.102664","DOI":"10.1016\/j.jisa.2020.102664"},{"issue":"24","key":"11405_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20247253","volume":"20","author":"X Duan","year":"2020","unstructured":"Duan X, Gou M, Liu N, Wang W, Qin C (2020) High-capacity image steganography based on improved Xception. Sensors 20(24):1\u201316. https:\/\/doi.org\/10.3390\/s20247253","journal-title":"Sensors"},{"key":"11405_CR8","unstructured":"Durdu A (2007) Analysis of steganographed audio files with the guide of artificial neural networks. Dissertation, Dissertation, Sakarya University"},{"key":"11405_CR9","unstructured":"Durdu A (2016) A high capacity reversible steganography method based on LSB mapping area for hiding lossy images into images. Dissertation, Sakarya University"},{"key":"11405_CR10","doi-asserted-by":"publisher","unstructured":"Hore A, Ziou D (2010) Image Quality Metrics: PSNR vs. SSIM, 2010 20th International Conference on Pattern Recognition, Istanbul 2366\u20132369. https:\/\/doi.org\/10.1109\/ICPR.2010.579","DOI":"10.1109\/ICPR.2010.579"},{"key":"11405_CR11","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2020.1854902","author":"MR Islam","year":"2020","unstructured":"Islam MR, Tanni TR, Parvin S, Sultana MJ, Siddiqa A (2020) A modified LSB image steganography method using filtering algorithm and stream of password. Inform Secur J. https:\/\/doi.org\/10.1080\/19393555.2020.1854902","journal-title":"Inform Secur J"},{"key":"11405_CR12","doi-asserted-by":"publisher","unstructured":"Karakus S, Avci E (2020) A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses 139. https:\/\/doi.org\/10.1016\/j.mehy.2020.109691","DOI":"10.1016\/j.mehy.2020.109691"},{"key":"11405_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02398-w","author":"V Kalaichelvi","year":"2020","unstructured":"Kalaichelvi V, Meenakshi P, Vimala Devi P, Manikandan H, Venkateswari P, Swaminathan S (2020) A stable image steganography: a novel approach based on modified RSA algorithm and 2\u20134 least significant bit (LSB) technique. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-02398-w","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"11405_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09652-5","author":"S Khan","year":"2020","unstructured":"Khan S, Abbas N, Nasir M, Haseeb K, Saba T, Rehman A, Mehmood Z (2020) Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT). Multimedia Tools App. https:\/\/doi.org\/10.1007\/s11042-020-09652-5","journal-title":"Multimedia Tools App"},{"issue":"6","key":"11405_CR15","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1049\/iet-ipr.2011.0059","volume":"6","author":"M Khodaei","year":"2012","unstructured":"Khodaei M, Faez K (2012) New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Proc 6(6):677\u2013686. https:\/\/doi.org\/10.1049\/iet-ipr.2011.0059","journal-title":"IET Image Proc"},{"key":"11405_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09519-9","author":"D Laishram","year":"2020","unstructured":"Laishram D, Tuithung T (2020) A novel minimal distortion-based edge adaptive image steganography scheme using local complexity: (BEASS). Multimedia Tools App. https:\/\/doi.org\/10.1007\/s11042-020-09519-9","journal-title":"Multimedia Tools App"},{"key":"11405_CR17","doi-asserted-by":"publisher","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features. IEEE Trans Dependable Secur Comput 1\u20131. https:\/\/doi.org\/10.1109\/tdsc.2020.3004708","DOI":"10.1109\/tdsc.2020.3004708"},{"issue":"3","key":"11405_CR18","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A New Payload Partition Strategy in Color Image Steganography. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696. https:\/\/doi.org\/10.1109\/TCSVT.2019.2896270","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"11","key":"11405_CR19","doi-asserted-by":"publisher","first-page":"4537","DOI":"10.3837\/tiis.2020.11.016","volume":"14","author":"HH Liu","year":"2020","unstructured":"Liu HH, Su PC, Hsu MH (2020) An Improved Steganography Method Based on Least-Significant-Bit Substitution and Pixel-Value Differencing. KSII Trans Internet Inf Syst 14(11):4537\u20134556. https:\/\/doi.org\/10.3837\/tiis.2020.11.016","journal-title":"KSII Trans Internet Inf Syst"},{"key":"11405_CR20","doi-asserted-by":"publisher","unstructured":"Mandal JK, Das D (2012) Steganography using adaptive pixel value differencing(APVD)of gray images through exclusion of overflow\/underflow. In 2nd Int Conf Comp Sci Eng App (CCSEA-2012), Delhi, India. https:\/\/doi.org\/10.5121\/csit.2012.2211","DOI":"10.5121\/csit.2012.2211"},{"issue":"5","key":"11405_CR21","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285\u2013287. https:\/\/doi.org\/10.1109\/LSP.2006.870357","journal-title":"IEEE Signal Process Lett"},{"issue":"1","key":"11405_CR22","first-page":"17","volume":"10","author":"C Olcay","year":"2013","unstructured":"Olcay C, Saran N (2013) \u0130mge \u0130\u00e7ine Bilgi Gizlemede Kullan\u0131lan LSB Y\u00f6ntemlerinin Kar\u015f\u0131la\u015ft\u0131rmas\u0131. \u00c7ankaya Univ J Sci Eng 10(1):17\u201332","journal-title":"\u00c7ankaya Univ J Sci Eng"},{"key":"11405_CR23","doi-asserted-by":"publisher","unstructured":"Sharp T (2001) An Implementation of Key-Based Digital Signal Steganography. In: Moskowitz I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg 2137. https:\/\/doi.org\/10.1007\/3-540-45496-92","DOI":"10.1007\/3-540-45496-92"},{"key":"11405_CR24","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","volume":"48","author":"SY Shen","year":"2015","unstructured":"Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Comput Secur 48:131\u2013141. https:\/\/doi.org\/10.1016\/j.cose.2014.07.008","journal-title":"Comput Secur"},{"issue":"21","key":"11405_CR25","doi-asserted-by":"publisher","first-page":"13541","DOI":"10.1007\/s11042-015-2937-2","volume":"75","author":"G Swain","year":"2016","unstructured":"Swain G (2016) Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools App 75(21):13541\u201313556. https:\/\/doi.org\/10.1007\/s11042-015-2937-2","journal-title":"Multimedia Tools App"},{"key":"11405_CR26","doi-asserted-by":"publisher","first-page":"21463","DOI":"10.1007\/s11042-017-5569-x","volume":"77","author":"T Tuncer","year":"2018","unstructured":"Tuncer T (2018) A probabilistic image authentication method based on chaos. Multimedia Tools Appl 77:21463\u201321480. https:\/\/doi.org\/10.1007\/s11042-017-5569-x","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"11405_CR27","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612. https:\/\/doi.org\/10.1109\/TIP.2003.819861","journal-title":"IEEE Trans Image Process"},{"key":"11405_CR28","doi-asserted-by":"publisher","unstructured":"Wang Y, Tang M, Wang Z (2020) High-capacity adaptive steganography based on LSB and Hamming code. Optik 213. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164685","DOI":"10.1016\/j.ijleo.2020.164685"},{"issue":"9\u201310","key":"11405_CR29","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D Wu","year":"2003","unstructured":"Wu D, Tsai W (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9\u201310):1613\u20131626. https:\/\/doi.org\/10.1016\/S0167-8655(02)00402-6","journal-title":"Pattern Recogn Lett"},{"key":"11405_CR30","doi-asserted-by":"crossref","unstructured":"Yang CY, Wang WF (2015) Block-based colour image steganography using smart pixel-adjustment. In: Sun H, Yang CY, Lin CW, Pan JS, Snasel V, Abraham A (eds) Genetic and Evolutionary Computing. Adv Intelligent Syst Comput Springer, Germany, pp 145\u2013154","DOI":"10.1007\/978-3-319-12286-1_15"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11405-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11405-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11405-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T20:36:34Z","timestamp":1642710994000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11405-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,20]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["11405"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11405-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,9,20]]},"assertion":[{"value":"9 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}