{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:55Z","timestamp":1775745355170,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T00:00:00Z","timestamp":1646611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11042-022-12426-w","type":"journal-article","created":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T13:03:16Z","timestamp":1646658196000},"page":"17817-17830","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Hilbert quantum image scrambling and graph signal processing-based image steganography"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3150-846X","authenticated-orcid":false,"given":"Vijay Kumar","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Prakash Chandra","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Harsh","family":"Goud","sequence":"additional","affiliation":[]},{"given":"Arjun","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,7]]},"reference":[{"issue":"6","key":"12426_CR1","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1049\/iet-ipr.2014.0351","volume":"9","author":"S Ahani","year":"2015","unstructured":"Ahani S, Ghaemmaghami S (2015) Colour image steganography method based on sparse representation. IET Image Process 9(6):496\u2013505","journal-title":"IET Image Process"},{"issue":"10","key":"12426_CR2","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1109\/TIP.2006.877507","volume":"15","author":"AL Da Cunha","year":"2006","unstructured":"Da Cunha AL, Zhou J, Do MN (2006) The nonsubsampled contourlet transform: theory, design, and applications. IEEE Trans Image Process 15(10):3089\u20133101","journal-title":"IEEE Trans Image Process"},{"key":"12426_CR3","doi-asserted-by":"crossref","unstructured":"Das P, Dasgupta T, Bhattacharya S (2016) A novel scheme for bengali handwriting recognition based on morphological operations with adaptive auto-generated structuring elements. In: Proceedings of 2nd International Conference on Control, Instrumentation, Energy and Communication, Kolkata, pp 211\u2013215","DOI":"10.1109\/CIEC.2016.7513754"},{"issue":"1","key":"12426_CR4","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1049\/iet-cds.2015.0245","volume":"11","author":"B Debnath","year":"2017","unstructured":"Debnath B, Das JC, De D (2017) Reversible logic-based image steganography using quantum dot cellular automata for secure nano communication. IET Circ Dev Syst 11(1):58\u201367","journal-title":"IET Circ Dev Syst"},{"issue":"3","key":"12426_CR5","doi-asserted-by":"publisher","first-page":"639","DOI":"10.21629\/JSEE.2018.03.21","volume":"29","author":"E Emad","year":"2018","unstructured":"Emad E, Safey A, Refaat A, Osama Z, Sayed E, Mohamed E (June 2018) A secure image steganography algorithm based on least significant bit and integer wavelet transform. J Syst Eng Electron 29(3):639\u2013649","journal-title":"J Syst Eng Electron"},{"issue":"4","key":"12426_CR6","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1049\/iet-ipr.2018.0088","volume":"12","author":"A Girdhar","year":"2018","unstructured":"Girdhar A, Kumar V (2018) Comprehensive survey of 3D image steganography techniques. IET Image Process 12(4):619\u2013619","journal-title":"IET Image Process"},{"issue":"8","key":"12426_CR7","doi-asserted-by":"publisher","first-page":"716","DOI":"10.1049\/iet-ipr.2013.0663","volume":"9","author":"H Hamidi","year":"2015","unstructured":"Hamidi H, Amirani MC, Arashloo SR (2015) Local selected features of dualtree complex wavelet transform for single sample face recognition. IET Image Process 9(8):716\u2013723","journal-title":"IET Image Process"},{"issue":"2","key":"12426_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.acha.2010.04.005","volume":"30","author":"DK Hammond","year":"2011","unstructured":"Hammond DK, Vandergheynst P, Gribonval R (2011) Wavelets on graphs via spectral graph theory. Appl Comput Harmon Anal 30(2):129\u2013150","journal-title":"Appl Comput Harmon Anal"},{"issue":"7","key":"12426_CR9","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1007\/s10773-014-2046-4","volume":"53","author":"N Jiang","year":"2014","unstructured":"Jiang N, Wang L, Wu W-Y (2014) Quantum Hilbert image scrambling. Int J Theor Phys 53(7):2463\u20132484","journal-title":"Int J Theor Phys"},{"issue":"10","key":"12426_CR10","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1049\/el.2017.4276","volume":"54","author":"CR Kim","year":"2018","unstructured":"Kim CR, Lee SH, Lee JH, Park J (2018) Blind decoding of image steganography using entropy model. Electron Lett 54(10):626\u2013628","journal-title":"Electron Lett"},{"issue":"1","key":"12426_CR11","first-page":"3400","volume":"3","author":"SA Laskar","year":"2014","unstructured":"Laskar SA, Hemachandran K (2014) A review on image steganalysis techniques for attacking steganography. Int J Eng Res Technol 3(1):3400\u20133410","journal-title":"Int J Eng Res Technol"},{"key":"12426_CR12","doi-asserted-by":"crossref","unstructured":"Mostafa R, Ali AF, EI Taweal G (2015) Hybrid curvelet transform and least significant bit for image steganography. IEEE Seventh Int. Conf. Intelligent Computing and Information Systems, pp 300\u2013305","DOI":"10.1109\/IntelCIS.2015.7397238"},{"key":"12426_CR13","doi-asserted-by":"publisher","first-page":"14495","DOI":"10.1007\/s11042-020-10424-4","volume":"80","author":"S Mukhopadhyay","year":"2021","unstructured":"Mukhopadhyay S, Hossain S, Ghosal SK et al (2021) Secured image steganography based on Catalan transform. Multimed Tools Appl 80:14495\u201314520","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"12426_CR14","doi-asserted-by":"publisher","first-page":"2786","DOI":"10.1109\/TSP.2012.2188718","volume":"60","author":"SK Narang","year":"2012","unstructured":"Narang SK, Ortega A (2012) Perfect reconstruction two-channel wavelet filter banks for graph structured data. IEEE Trans Signal Process 60(6):2786\u20132799","journal-title":"IEEE Trans Signal Process"},{"key":"12426_CR15","doi-asserted-by":"publisher","first-page":"13693","DOI":"10.1007\/s11042-019-08415-1","volume":"79","author":"M Nazari","year":"2020","unstructured":"Nazari M, Dorostkar Ahmadi I (2020) A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimed Tools Appl 79:13693\u201313724","journal-title":"Multimed Tools Appl"},{"key":"12426_CR16","unstructured":"Rathore M, Shekhawat NS (2019) Improved performance of image steganography technique using quantum scrambling and pixel\u2019s intensity adjustment. Int J Future Evol Comput Sci Commun Eng 5(8)"},{"key":"12426_CR17","doi-asserted-by":"crossref","unstructured":"Reddy HSM, Sathisha N, Deepa S, Raja KB (2012) LWT based encrypted payload steganography. Fourth international conference on advances in recent Technologies in Communication and Computing (ARTCom2012), Bangalore, India, pp 169\u2013172","DOI":"10.1049\/cp.2012.2519"},{"key":"12426_CR18","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.asoc.2015.01.032","volume":"30","author":"S Sajasi","year":"2015","unstructured":"Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375\u2013389","journal-title":"Appl Soft Comput"},{"key":"12426_CR19","doi-asserted-by":"publisher","first-page":"8423","DOI":"10.1007\/s11042-020-10035-z","volume":"80","author":"DIM Setiadi","year":"2021","unstructured":"Setiadi DIM (2021) PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimed Tools Appl 80:8423\u20138444","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"12426_CR20","first-page":"154","volume":"17","author":"V Sharma","year":"2020","unstructured":"Sharma V, Srivastava D, Mathur P (2020) A Daubechies DWT based image steganography using smoothing operation. Int Arab J Inf Technol 17(2):154\u2013161","journal-title":"Int Arab J Inf Technol"},{"key":"12426_CR21","doi-asserted-by":"crossref","unstructured":"Shrestha A, Timalsina A (2015) Color image steganography technique using Daubechies discrete wavelet transform. In: 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA), pp 9\u201315","DOI":"10.1109\/SKIMA.2015.7400039"},{"issue":"3","key":"12426_CR22","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MSP.2012.2235192","volume":"30","author":"DI Shuman","year":"2013","unstructured":"Shuman DI, Narang SK, Frossard P, Ortega A, Vandergheynst P (2013) The emerging field of signal processing on graphs: extending high-dimensional data analysis to networks and other irregular domains. IEEE Signal Process 30(3):83\u201398","journal-title":"IEEE Signal Process"},{"key":"12426_CR23","doi-asserted-by":"publisher","first-page":"10825","DOI":"10.1007\/s11042-019-08476-2","volume":"79","author":"A Sukumar","year":"2020","unstructured":"Sukumar A, Subramaniyaswamy V, Vijaya Kumar V et al (2020) A secure multimedia steganography scheme using hybrid transform and support vector machine for cloud-based storage. Multimed Tools Appl 79:10825\u201310849","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"12426_CR24","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12(11):2545\u20132557","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"12426_CR25","doi-asserted-by":"crossref","unstructured":"Zhang X (2016) Design of orthogonal graph wavelet filter banks. IEEE annual conference (IECON), pp 889\u2013894","DOI":"10.1109\/IECON.2016.7793133"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12426-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12426-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12426-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T10:24:03Z","timestamp":1651832643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12426-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,7]]},"references-count":25,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["12426"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12426-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,7]]},"assertion":[{"value":"18 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}