{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:15:55Z","timestamp":1767374155535,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T00:00:00Z","timestamp":1644364800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T00:00:00Z","timestamp":1644364800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11042-022-12062-4","type":"journal-article","created":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T23:02:31Z","timestamp":1644447751000},"page":"9527-9547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0923-202X","authenticated-orcid":false,"given":"Adnan Abdul-Aziz","family":"Gutub","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,9]]},"reference":[{"key":"12062_CR1","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12070","author":"M Abu-Hashem","year":"2022","unstructured":"Abu-Hashem M, Gutub A (2022) Efficient computation of hash hirschberg protein alignment utilizing hyper threading multi-core sharing technology. CAAI Transactions on Intelligence Technology. https:\/\/doi.org\/10.1049\/cit2.12070","journal-title":"CAAI Transactions on Intelligence Technology"},{"issue":"14","key":"12062_CR2","doi-asserted-by":"publisher","first-page":"8745","DOI":"10.1007\/s11042-015-2789-9","volume":"75","author":"L Agilandeeswari","year":"2016","unstructured":"Agilandeeswari L, Ganesan K (2016) A robust color video watermarking scheme based on hybrid embedding techniques. Multimed Tools Appl 75(14):8745\u20138780","journal-title":"Multimed Tools Appl"},{"key":"12062_CR3","doi-asserted-by":"publisher","unstructured":"Alanazi N, Khan E, Gutub A (2021) Involving spaces of unicode standard within irreversible Arabic text steganography for practical implementations. Arab J Sci Eng (AJSE), in press. https:\/\/doi.org\/10.1007\/s13369-021-05605-8","DOI":"10.1007\/s13369-021-05605-8"},{"key":"12062_CR4","doi-asserted-by":"publisher","first-page":"16283","DOI":"10.1007\/s11042-018-6977-2","volume":"78","author":"M Al-Ghamdi","year":"2019","unstructured":"Al-Ghamdi M, Al-Ghamdi M, Gutub A (2019) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78:16283\u201316310. https:\/\/doi.org\/10.1007\/s11042-018-6977-2","journal-title":"Multimed Tools Appl"},{"key":"12062_CR5","doi-asserted-by":"publisher","first-page":"3403","DOI":"10.1007\/s13369-020-04422-9","volume":"45","author":"T AlKhodaidi","year":"2020","unstructured":"AlKhodaidi T, Gutub A (2020) Trustworthy target key alteration helping counting-based secret sharing applicability. Arab J Sci Eng 45:3403\u20133423. https:\/\/doi.org\/10.1007\/s13369-020-04422-9","journal-title":"Arab J Sci Eng"},{"key":"12062_CR6","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1007\/s11042-020-09720-w","volume":"80","author":"T AlKhodaidi","year":"2021","unstructured":"AlKhodaidi T, Gutub A (2021) Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimed Tools Appl 80:1143\u20131173. https:\/\/doi.org\/10.1007\/s11042-020-09720-w","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"12062_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.jksuci.2018.02.006","volume":"32","author":"M Almazrooie","year":"2020","unstructured":"Almazrooie M, Samsudin A, Gutub A, Salleh MS, Omar MA, Hassan SA (2020) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Univ Comput Inf Sci 32(1):24\u201334. https:\/\/doi.org\/10.1016\/j.jksuci.2018.02.006","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"12062_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06200-7","author":"E Almehmadi","year":"2022","unstructured":"Almehmadi E, Gutub A (2022) Novel arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-021-06200-7","journal-title":"Arab J Sci Eng"},{"key":"12062_CR9","doi-asserted-by":"publisher","unstructured":"Al-Nofaie S, Gutub A, Al-Ghamdi M (2019) Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. J King Saud Univ Comput Inf Sci. In Press. https:\/\/doi.org\/10.1016\/j.jksuci.2019.06.010","DOI":"10.1016\/j.jksuci.2019.06.010"},{"key":"12062_CR10","doi-asserted-by":"crossref","unstructured":"Al-Otaibi N, Gutub A (2014)2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory, Engineering and Technology Publishing 2(2):151\u2013157","DOI":"10.12720\/lnit.2.2.151-157"},{"key":"12062_CR11","doi-asserted-by":"publisher","unstructured":"Al-Roithy B, Gutub A (2021) Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimed Tools Appl (MTAP), in press. https:\/\/doi.org\/10.1007\/s11042-021-11051-3","DOI":"10.1007\/s11042-021-11051-3"},{"key":"12062_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06165-7","author":"F Al-Shaarani","year":"2022","unstructured":"Al-Shaarani F, Gutub A (2022) Increasing participants using counting-based secret sharing via involving matrices and practical steganography. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-021-06165-7","journal-title":"Arab J Sci Eng"},{"key":"12062_CR13","doi-asserted-by":"publisher","unstructured":"Bin-Hureib E, Gutub A (2020) Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography. Int J Comput Sci Netw Secur (IJCSNS) 20(12):232\u2013241. https:\/\/doi.org\/10.22937\/IJCSNS.2020.20.12.26","DOI":"10.22937\/IJCSNS.2020.20.12.26"},{"issue":"1","key":"12062_CR14","first-page":"44","volume":"4","author":"PR Deshmukh","year":"2014","unstructured":"Deshmukh PR, Rahangdale B (2014) Hash based least significant bit technique for video steganography. Int J Eng Res Appl 4(1):44\u201349","journal-title":"Int J Eng Res Appl"},{"issue":"3","key":"12062_CR15","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.aeue.2012.07.010","volume":"67","author":"OS Faragallah","year":"2013","unstructured":"Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU-Int J Electron Commun 67(3):189\u2013196","journal-title":"AEU-Int J Electron Commun"},{"issue":"12","key":"12062_CR16","first-page":"32","volume":"6","author":"H Gupta","year":"2013","unstructured":"Gupta H, Chaturvedi S (2013) Video steganography through LSB based hybrid approach. Int J Eng Res Dev 6(12):32\u201342","journal-title":"Int J Eng Res Dev"},{"issue":"1","key":"12062_CR17","first-page":"56","volume":"2","author":"A Gutub","year":"2010","unstructured":"Gutub A (2010) Pixel indicator technique for RGB image steganography. J Emerg Technol Web Intell (JETWI) 2(1):56\u201364","journal-title":"J Emerg Technol Web Intell (JETWI)"},{"key":"12062_CR18","doi-asserted-by":"publisher","DOI":"10.5505\/pajes.2021.54837","author":"A Gutub","year":"2022","unstructured":"Gutub A (2022) Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale University Journal of Engineering Sciences. https:\/\/doi.org\/10.5505\/pajes.2021.54837","journal-title":"Pamukkale University Journal of Engineering Sciences"},{"issue":"1","key":"12062_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.2022010118","volume":"16","author":"A Gutub","year":"2022","unstructured":"Gutub A (2022) Watermarking images via counting-based secret sharing for lightweight semi-complete authentication. Int J Inf Secur Priv 16(1):1\u201318. https:\/\/doi.org\/10.4018\/IJISP.2022010118","journal-title":"Int J Inf Secur Priv"},{"key":"12062_CR20","doi-asserted-by":"publisher","unstructured":"Gutub A, Alaseri K (2019) Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing. J King Saud Univ Comput Inf Sci. In Press. https:\/\/doi.org\/10.1016\/j.jksuci.2019.06.014","DOI":"10.1016\/j.jksuci.2019.06.014"},{"key":"12062_CR21","doi-asserted-by":"publisher","first-page":"2433","DOI":"10.1007\/s13369-019-04010-6","volume":"45","author":"A Gutub","year":"2020","unstructured":"Gutub A, Alaseri K (2020) Hiding shares of counting-based secret sharing via arabic text steganography for personal usage. Arab J Sci Eng 45:2433\u20132458. https:\/\/doi.org\/10.1007\/s13369-019-04010-6","journal-title":"Arab J Sci Eng"},{"key":"12062_CR22","doi-asserted-by":"publisher","unstructured":"Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res 10:6. https:\/\/doi.org\/10.1007\/s13319-019-0216-0","DOI":"10.1007\/s13319-019-0216-0"},{"key":"12062_CR23","doi-asserted-by":"publisher","first-page":"7951","DOI":"10.1007\/s11042-019-08427-x","volume":"79","author":"A Gutub","year":"2020","unstructured":"Gutub A, Al-Ghamdi M (2020) Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimed Tools Appl 79:7951\u20137985. https:\/\/doi.org\/10.1007\/s11042-019-08427-x","journal-title":"Multimed Tools Appl"},{"key":"12062_CR24","doi-asserted-by":"publisher","first-page":"17373","DOI":"10.1007\/s11042-020-08695-y","volume":"79","author":"A Gutub","year":"2020","unstructured":"Gutub A, Alkhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimed Tools Appl 79:17373\u201317401. https:\/\/doi.org\/10.1007\/s11042-020-08695-y","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"12062_CR25","doi-asserted-by":"publisher","first-page":"91","DOI":"10.36909\/jer.v8i3.8079","volume":"8","author":"A Gutub","year":"2020","unstructured":"Gutub A, Al-Qurashi A (2020) Secure shares generation via M-blocks partitioning for counting-based secret sharing. J Eng Res 8(3):91\u2013117. https:\/\/doi.org\/10.36909\/jer.v8i3.8079","journal-title":"J Eng Res"},{"issue":"3","key":"12062_CR26","doi-asserted-by":"publisher","first-page":"502","DOI":"10.5281\/zenodo.1061621","volume":"1","author":"A Gutub","year":"2007","unstructured":"Gutub A, Fattani M (2007) A novel Arabic text steganography method using letter points and extensions. Int J Comput Electr Autom Control Inf Eng 1(3):502\u2013505. https:\/\/doi.org\/10.5281\/zenodo.1061621","journal-title":"Int J Comput Electr Autom Control Inf Eng"},{"key":"12062_CR27","doi-asserted-by":"crossref","unstructured":"Gutub A, Ghouti L, Amin A, Alkharobi T, Ibrahim MK (2007) Utilizing extension character \u2018Kashida\u2019 with pointed letters for arabic text digital watermarking. International Conference on Security and Cryptography (SECRYPT), pp 329-332, Barcelona, Spain","DOI":"10.5220\/0002116903290332"},{"issue":"1","key":"12062_CR28","doi-asserted-by":"publisher","first-page":"48","DOI":"10.4304\/jetwi.2.1.48-55","volume":"2","author":"A Gutub","year":"2010","unstructured":"Gutub A, Al-Haidari F, Al-Kahsah K, Hamodi J (2010)e-Text watermarking: utilizing \u2018Kashida\u2019 extensions in arabic language electronic writing. J Emerg Technol Web Intell (JETWI) 2(1):48\u201355. https:\/\/doi.org\/10.4304\/jetwi.2.1.48-55","journal-title":"J Emerg Technol Web Intell (JETWI)"},{"key":"12062_CR29","doi-asserted-by":"publisher","first-page":"5591","DOI":"10.1007\/s11042-017-5293-6","volume":"78","author":"A Gutub","year":"2019","unstructured":"Gutub A, Al-Juaid N, Khan E (2019)Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78:5591\u20135619. https:\/\/doi.org\/10.1007\/s11042-017-5293-6","journal-title":"Multimed Tools Appl"},{"key":"12062_CR30","doi-asserted-by":"publisher","unstructured":"Hassan FS, Gutub A (2021) Improving data hiding within colour images using hue component of HSV colour space, CAAI Transactions on Intelligence Technology, IET (IEE), in press (2021)https:\/\/doi.org\/10.1049\/cit2.12053","DOI":"10.1049\/cit2.12053"},{"key":"12062_CR31","doi-asserted-by":"publisher","unstructured":"Hassan F, Gutub A (2021) Efficient image reversible data hiding technique based on interpolation optimization. Arab J Sci Eng (AJSE), in press. https:\/\/doi.org\/10.1007\/s13369-021-05529-3","DOI":"10.1007\/s13369-021-05529-3"},{"issue":"2","key":"12062_CR32","first-page":"199","volume":"28","author":"A Karmakar","year":"2016","unstructured":"Karmakar A, Phadikar A, Phadikar BS, Maity GK (2016) A blind video watermarking scheme resistant to rotation and collusion attacks. J King Saud Univ Comput Inf Sci 28(2):199\u2013210","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"12062_CR33","doi-asserted-by":"publisher","unstructured":"Kheshaifaty N, Gutub A (2021) Engineering graphical captcha and AES crypto hash functions for secure online authentication. J Eng Res. https:\/\/doi.org\/10.36909\/jer.13761","DOI":"10.36909\/jer.13761"},{"key":"12062_CR34","unstructured":"Kong W, Yang B, Wu D, Niu X (2006) SVD based blind video watermarking algorithm. IEEE International Conference on Innovative Computing, Information and Control (ICICIC), pp 265\u2013268"},{"key":"12062_CR35","doi-asserted-by":"publisher","unstructured":"Li S, Song Z, Lu W, Sun D, Wei J (2017) Parameterization of LSB in self-recovery speech watermarking framework in big data mining. 2017:3847092. https:\/\/doi.org\/10.1155\/2017\/3847092","DOI":"10.1155\/2017\/3847092"},{"key":"12062_CR36","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1016\/j.jvcir.2016.05.001","volume":"38","author":"P Rasti","year":"2016","unstructured":"Rasti P, Samiei S, Agoyi M, Escalera S, Anbarjafari G (2016) Robust non-blind color video watermarking using QR decomposition and entropy analysis. J Vis Commun Image Represent 38:838\u2013847","journal-title":"J Vis Commun Image Represent"},{"key":"12062_CR37","unstructured":"Richard Popa An Analysis of Steganogrphic Techniques. Master Thesis submitted to Department of Computer Science and Software Engineering, Faculty of Automatics and Computers, The Politehnica University of Timisoara"},{"key":"12062_CR38","doi-asserted-by":"publisher","unstructured":"Shambour MK, Gutub A (2021) Personal privacy evaluation of smart devices applications serving Hajj and Umrah rituals. J Eng Res. https:\/\/doi.org\/10.36909\/jer.13199","DOI":"10.36909\/jer.13199"},{"key":"12062_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05838-7","author":"MK Shambour","year":"2022","unstructured":"Shambour MK, Gutub A (2022) Progress of IoT research technologies and applications serving Hajj and Umrah. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-021-05838-7","journal-title":"Arab J Sci Eng"},{"issue":"5","key":"12062_CR40","first-page":"105","volume":"4","author":"K Singh","year":"2014","unstructured":"Singh K (2014) Video-steganography: text hiding in video by LSB substitution. Int J Eng Res Appl 4(5):105\u2013108","journal-title":"Int J Eng Res Appl"},{"key":"12062_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06348-2","author":"A Singh","year":"2022","unstructured":"Singh A, Chandra S, Roy A, Gutub A (2022) AI-based mobile edge computing for IoT: applications challenges and future scope. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-021-06348-2","journal-title":"Arab J Sci Eng"},{"issue":"8","key":"12062_CR42","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1016\/j.aeue.2013.01.008","volume":"67","author":"TR Singh","year":"2013","unstructured":"Singh TR, Singh KM, Roy S (2013) Video watermarking scheme based on visual cryptography and scene change detection. AEU-Int J Electron Commun 67(8):645\u2013651","journal-title":"AEU-Int J Electron Commun"},{"issue":"5","key":"12062_CR43","first-page":"1620","volume":"2","author":"A Swathi","year":"2012","unstructured":"Swathi A, Jilani S (2012)Video-steganography by LSB substitution using different polynomial equations. Int J Comput Eng Res 2(5):1620\u20131623","journal-title":"Int J Comput Eng Res"},{"key":"12062_CR44","doi-asserted-by":"crossref","unstructured":"Tabassum T, Islam SM (2012) A digital video watermarking technique based on identical frame extraction in 3-Level DWT. IEEE International Conference on Computer and Information Technology (ICCIT), pp 101\u2013106","DOI":"10.1109\/ICCITechn.2012.6509780"},{"issue":"1","key":"12062_CR45","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1504\/IJCAET.2020.103839","volume":"12","author":"PS Venugopala","year":"2020","unstructured":"Venugopala PS, Sarojadevi H, Chiplunkar N (2020) Evaluation of video watermarking algorithms on mobile device. Int J Comput Aided Eng Technol (IJCAET) 12(1):55\u201367. https:\/\/doi.org\/10.1504\/IJCAET.2020.103839","journal-title":"Int J Comput Aided Eng Technol (IJCAET)"},{"issue":"3","key":"12062_CR46","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s11042-011-0857-3","volume":"62","author":"J Xuemei","year":"2013","unstructured":"Xuemei J, Quan L, Qiaoyan W (2013) A new video watermarking algorithm based on shot segmentation and block classification. Multimedia Tools Appl 62(3):545\u2013560","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"12062_CR47","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1007\/s11042-013-1515-8","volume":"73","author":"SM Youssef","year":"2014","unstructured":"Youssef SM, ElFarag AA, Ghatwary NM (2014) Adaptive video watermarking integrating a fuzzy wavelet-based human visual system perceptual model. Multimed Tools Appl 73(3):1545\u20131573","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12062-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12062-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12062-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T06:02:03Z","timestamp":1726639323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12062-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,9]]},"references-count":47,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["12062"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12062-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,2,9]]},"assertion":[{"value":"1 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that this work is original and not considered to be published in any other publication media.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Agreement"}},{"value":"This article does not contain any studies with human participants or animals performed by the author.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The author declare that they have no conflict of interest.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}