{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:20:42Z","timestamp":1771950042300,"version":"3.50.1"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T00:00:00Z","timestamp":1648166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11042-022-12691-9","type":"journal-article","created":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T14:47:26Z","timestamp":1648219646000},"page":"25913-25946","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["High payload image steganography scheme with minimum distortion based on distinction grade value method"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4693-5325","authenticated-orcid":false,"given":"Mustafa Sabah","family":"Taha","sequence":"first","affiliation":[]},{"given":"Mohd Shafry Mohd","family":"Rahem","sequence":"additional","affiliation":[]},{"given":"Mohammed Mahdi","family":"Hashim","sequence":"additional","affiliation":[]},{"given":"Hiyam N.","family":"Khalid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,25]]},"reference":[{"key":"12691_CR1","doi-asserted-by":"publisher","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","volume":"6","author":"AA Abd El-Latif","year":"2018","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075\u201321083","journal-title":"IEEE Access"},{"key":"12691_CR2","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral dissertation, University of Buckingham"},{"key":"12691_CR3","doi-asserted-by":"crossref","unstructured":"Abdullatif FA, Abdullatif AA & al-Saffar A (2018) Hiding techniques for dynamic encryption text based on corner point. J Physics: Conf Series (Vol. 1003, no. 1, p. 012027). IOP Publishing","DOI":"10.1088\/1742-6596\/1003\/1\/012027"},{"issue":"1","key":"12691_CR4","first-page":"2088","volume":"10","author":"A ALabaichi","year":"2020","unstructured":"ALabaichi A, Al-Dabbas MAAAK, Salih A (2020) Image steganography using least significant bit and secret map techniques. Int J Electrical Comput Eng 10(1):2088\u20138708","journal-title":"Int J Electrical Comput Eng"},{"key":"12691_CR5","doi-asserted-by":"crossref","unstructured":"Alam, S., Ahmad, T., & Doja, M. N. (2017). A novel edge based chaotic steganography method using neural network. In proceedings of the 5th international conference on Frontiers in intelligent computing: theory and applications (pp. 467\u2013475). Springer, Singapore","DOI":"10.1007\/978-981-10-3156-4_48"},{"issue":"4","key":"12691_CR6","doi-asserted-by":"publisher","first-page":"731","DOI":"10.14716\/ijtech.v10i4.653","volume":"10","author":"MAF Al-Husainy","year":"2019","unstructured":"Al-Husainy MAF, Uliyan DM (2019) A secret-key image steganography technique using random chain codes. Int J Technol 10(4):731\u2013740","journal-title":"Int J Technol"},{"issue":"1","key":"12691_CR7","first-page":"1","volume":"13","author":"AGT Al-Tamimi","year":"2015","unstructured":"Al-Tamimi AGT, Alqobaty AA (2015) Image steganography using least significant bits (LSBs): a novel algorithm. Int J Comp Sci Inform Secur 13(1):1","journal-title":"Int J Comp Sci Inform Secur"},{"key":"12691_CR8","doi-asserted-by":"crossref","unstructured":"Anushiadevi R, Praveenkumar P, Rayappan JBB, Amirtharajan R (2020) Reversible data hiding method based on pixel expansion and homomorphic encryption. Journal of Intelligent & Fuzzy Systems, (preprint), 1-14.","DOI":"10.3233\/JIFS-191478"},{"key":"12691_CR9","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426\u2013437","journal-title":"Measurement"},{"issue":"18","key":"12691_CR10","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451\u201318472","journal-title":"Multimed Tools Appl"},{"key":"12691_CR11","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jcta.2015.04.005","volume":"135","author":"A Bower","year":"2015","unstructured":"Bower A, Insoft R, Li S, Miller SJ, Tosteson P (2015) The distribution of gaps between summands in generalized Zeckendorf decompositions. J Comb Theory, Series A 135:130\u2013160","journal-title":"J Comb Theory, Series A"},{"issue":"1","key":"12691_CR12","doi-asserted-by":"publisher","first-page":"99","DOI":"10.11591\/eei.v6i1.599","volume":"6","author":"S Fadhel","year":"2017","unstructured":"Fadhel S, Shafry M, Farook O (2017) Chaos image encryption methods: a survey study. Bull Electrical Eng Inform 6(1):99\u2013104","journal-title":"Bull Electrical Eng Inform"},{"key":"12691_CR13","unstructured":"Fadhil AM (2016). Bit inverting map method for improved steganography scheme. Diss. Universiti Teknologi Malaysia."},{"key":"12691_CR14","doi-asserted-by":"crossref","unstructured":"Gambhir A, & Arya R (2019) Performance analysis and implementation of DES algorithm and RSA algorithm with image and audio steganography techniques. In computing, communication and signal processing (pp. 1021\u20131028). Springer, Singapore","DOI":"10.1007\/978-981-13-1513-8_103"},{"issue":"01","key":"12691_CR15","doi-asserted-by":"publisher","first-page":"1860010","DOI":"10.1142\/S0218001418600108","volume":"32","author":"IR Grajeda-Mar\u00edn","year":"2018","unstructured":"Grajeda-Mar\u00edn IR, Montes-Venegas HA, Marcial-Romero JR, Hern\u00e1ndez-Serv\u00edn JA, Mu\u00f1oz-Jim\u00e9nez V, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. Int J Pattern Recognit Artif Intell 32(01):1860010","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"01","key":"12691_CR16","doi-asserted-by":"publisher","first-page":"1860010","DOI":"10.1142\/S0218001418600108","volume":"32","author":"IR Grajeda-Mar\u00edn","year":"2018","unstructured":"Grajeda-Mar\u00edn IR, Montes-Venegas HA, Marcial-Romero JR, Hern\u00e1ndez-Serv\u00edn JA, Mu\u00f1oz-Jim\u00e9nez V, Luna GDI (2018) A new optimization strategy for solving the fall-off boundary value problem in pixel-value differencing steganography. Int J Pattern Recognit Artif Intell 32(01):1860010","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"4","key":"12691_CR17","doi-asserted-by":"publisher","first-page":"2631","DOI":"10.1007\/s13369-020-04413-w","volume":"45","author":"A Gutub","year":"2020","unstructured":"Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45(4):2631\u20132644","journal-title":"Arab J Sci Eng"},{"key":"12691_CR18","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung KH (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46\u201366","journal-title":"Signal Process Image Commun"},{"issue":"1","key":"12691_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13662-018-1939-6","volume":"2019","author":"L Jouini","year":"2019","unstructured":"Jouini L, Ouannas A, Khennaoui AA, Wang X, Grassi G, Pham VT (2019) The fractional form of a new three-dimensional generalized H\u00e9non map. Adv Diff Equa 2019(1):1\u201312","journal-title":"Adv Diff Equa"},{"issue":"2","key":"12691_CR20","first-page":"74","volume":"18","author":"J Jumanto","year":"2018","unstructured":"Jumanto J (2018) An enhanced LSB-image steganography using the hybrid canny-Sobel edge detection. Cybern Inf\u00a0Technol 18(2):74\u201388","journal-title":"Cybern Inf\u00a0Technol"},{"key":"12691_CR21","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299\u2013326","journal-title":"Neurocomputing"},{"key":"12691_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.cogsys.2019.11.002","volume":"60","author":"IJ Kadhim","year":"2020","unstructured":"Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res 60:20\u201332","journal-title":"Cogn Syst Res"},{"key":"12691_CR23","doi-asserted-by":"crossref","unstructured":"Kumar R, Singh H (2020) Recent trends in text steganography with experimental study, In handbook of computer networks and cyber security (pp. 849\u2013872). Springer, Cham","DOI":"10.1007\/978-3-030-22277-2_34"},{"issue":"11","key":"12691_CR24","doi-asserted-by":"publisher","first-page":"13279","DOI":"10.1007\/s11042-017-4947-8","volume":"77","author":"V Kumar","year":"2018","unstructured":"Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77(11):13279\u201313308","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"12691_CR25","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.ipl.2015.08.003","volume":"116","author":"WC Kuo","year":"2016","unstructured":"Kuo WC, Wang CC, Hou HC (2016) Signed digit data hiding scheme. Inf Process Lett 116(2):183\u2013191","journal-title":"Inf Process Lett"},{"issue":"1","key":"12691_CR26","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s11042-020-09519-9","volume":"80","author":"D Laishram","year":"2021","unstructured":"Laishram D, Tuithung T (2021) A novel minimal distortion-based edge adaptive image steganography scheme using local complexity. Multimed Tools Appl 80(1):831\u2013854","journal-title":"Multimed Tools Appl"},{"key":"12691_CR27","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432\u2013447","journal-title":"Inf Sci"},{"issue":"4","key":"12691_CR28","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545\u20134561","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"12691_CR29","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Video Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"3","key":"12691_CR30","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/s11042-010-0663-3","volume":"57","author":"X Luo","year":"2012","unstructured":"Luo X, Liu F, Yang C, Lian S, Zeng Y (2012) Steganalysis of adaptive image steganography in multiple gray code bit-planes. Multimed Tools Appl 57(3):651\u2013667","journal-title":"Multimed Tools Appl"},{"key":"12691_CR31","doi-asserted-by":"crossref","unstructured":"Mahana SK, & Aggarwal RK (2019). Image steganography: Analysis & Evaluation of secret communication. In proceedings of international conference on sustainable computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India.","DOI":"10.2139\/ssrn.3358094"},{"key":"12691_CR32","unstructured":"Mukherjee N, Paul G, Saha SK, Burman D (2020) A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimed Tools Appl\u00a01\u201331"},{"issue":"5","key":"12691_CR33","first-page":"187","volume":"3","author":"R Nayak","year":"2015","unstructured":"Nayak R (2015) Steganography with BSS-RSA-LSB technique: a new approach to steganography. IJSEAT 3(5):187\u2013190","journal-title":"IJSEAT"},{"issue":"14","key":"12691_CR34","doi-asserted-by":"publisher","first-page":"8319","DOI":"10.1007\/s11042-015-2752-9","volume":"75","author":"TD Nguyen","year":"2016","unstructured":"Nguyen TD, Arch-Int S, Arch-Int N (2016) An adaptive multi bit-plane image steganography using block data-hiding. Multimed Tools Appl 75(14):8319\u20138345","journal-title":"Multimed Tools Appl"},{"key":"12691_CR35","doi-asserted-by":"crossref","unstructured":"Nikam VP, Dhande SS (2019) Extended Fibonacci series for selection of carrier samples in data hiding and extraction. In international conference on intelligent data communication technologies and internet of things (pp. 40-50). Springer, Cham.","DOI":"10.1007\/978-3-030-34080-3_5"},{"key":"12691_CR36","doi-asserted-by":"crossref","unstructured":"Nisha CD, Monoth T (2020) Analysis of spatial domain image steganography based on pixel-value differencing method. In soft computing for problem solving (pp. 385\u2013397). Springer, Singapore.","DOI":"10.1007\/978-981-15-0184-5_34"},{"key":"12691_CR37","doi-asserted-by":"crossref","unstructured":"Nyeem H (2017) Reversible data hiding with image bit-plane slicing. In 2017 20th international conference of computer and information technology (ICCIT) (pp. 1-6). IEEE.","DOI":"10.1109\/ICCITECHN.2017.8281763"},{"key":"12691_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/1804953","volume":"2018","author":"A Pradhan","year":"2018","unstructured":"Pradhan A, Sekhar KR, Swain G (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng 2018:1\u201311","journal-title":"Math Probl Eng"},{"key":"12691_CR39","doi-asserted-by":"crossref","unstructured":"Prasad S, & Pal AK (2019). Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement. In emerging Technologies in Data Mining and Information Security (pp. 203\u2013214). Springer, Singapore","DOI":"10.1007\/978-981-13-1501-5_17"},{"key":"12691_CR40","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.eswa.2015.12.010","volume":"49","author":"P Ramu","year":"2016","unstructured":"Ramu P, Swaminathan R (2016) Imperceptibility\u2014robustness tradeoff studies for ECG steganography using continuous ant colony optimization. Expert Syst Appl 49:123\u2013135","journal-title":"Expert Syst Appl"},{"key":"12691_CR41","doi-asserted-by":"crossref","unstructured":"Rao CS, Devi VB (2016) Comparative analysis of HVS based robust video watermarking scheme, In microelectronics, electromagnetics and telecommunications (pp. 103\u2013110). Springer, New Delhi","DOI":"10.1007\/978-81-322-2728-1_10"},{"issue":"3","key":"12691_CR42","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1007\/s11042-019-08263-z","volume":"79","author":"R Rawat","year":"2020","unstructured":"Rawat R, Singh B, Sur A, Mitra P (2020) Steganalysis for clustering modification directions steganography. Multimed Tools Appl 79(3):1971\u20131986","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"12691_CR43","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-019-06393-z","volume":"108","author":"AK Sahu","year":"2019","unstructured":"Sahu AK, Swain G (2019) An optimal information hiding approach based on pixel value differencing and modulus function. Wirel Pers Commun 108(1):159\u2013174","journal-title":"Wirel Pers Commun"},{"issue":"11","key":"12691_CR44","doi-asserted-by":"publisher","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493\u201313510","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"12691_CR45","first-page":"124","volume":"18","author":"SA Seyyedi","year":"2016","unstructured":"Seyyedi SA, Sadau V, Ivanov N (2016) A secure steganography method based on integer lifting wavelet transform. IJ Network Security 18(1):124\u2013132","journal-title":"IJ Network Security"},{"issue":"5","key":"12691_CR46","doi-asserted-by":"publisher","first-page":"3975","DOI":"10.1007\/s11042-019-7584-6","volume":"79","author":"R Shanthakumari","year":"2020","unstructured":"Shanthakumari R, Malliga S (2020) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79(5):3975\u20133991","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"12691_CR47","doi-asserted-by":"publisher","first-page":"10373","DOI":"10.1007\/s11042-018-6539-7","volume":"78","author":"S Som","year":"2019","unstructured":"Som S, Mitra A, Palit S, Chaudhuri BB (2019) A selective bitplane image encryption scheme using chaotic maps. Multimed Tools Appl 78(8):10373\u201310400","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"12691_CR48","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/81.915385","volume":"48","author":"T Stojanovski","year":"2001","unstructured":"Stojanovski T, Kocarev L (2001) Chaos-based random number generators-part I: analysis [cryptography]. IEEE Trans Circ Syst I: Fundamental Theory Appl 48(3):281\u2013288","journal-title":"IEEE Trans Circ Syst I: Fundamental Theory Appl"},{"issue":"3","key":"12691_CR49","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1007\/s11042-019-08221-9","volume":"79","author":"MS Subhedar","year":"2020","unstructured":"Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79(3):1865\u20131886","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"12691_CR50","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"Sun S (2016) A novel edge based image steganography with 2k correction and Huffman encoding. Inf Process Lett 116(2):93\u201399","journal-title":"Inf Process Lett"},{"key":"12691_CR51","first-page":"2018","volume":"2018","author":"G Swain","year":"2018","unstructured":"Swain G (2018) High capacity image steganography using modified LSB substitution and PVD against pixel difference histogram analysis. Secur Commun Networks 2018:2018\u20132014","journal-title":"Secur Commun Networks"},{"issue":"12","key":"12691_CR52","doi-asserted-by":"publisher","first-page":"7549","DOI":"10.1007\/s13369-018-3163-9","volume":"43","author":"G Swain","year":"2018","unstructured":"Swain G (2018) Adaptive and non-adaptive PVD steganography using overlapped pixel blocks. Arab J Sci Eng 43(12):7549\u20137562","journal-title":"Arab J Sci Eng"},{"issue":"4","key":"12691_CR53","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s13369-018-3372-2","volume":"44","author":"G Swain","year":"2019","unstructured":"Swain G (2019) Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab J Sci Eng 44(4):2995\u20133004","journal-title":"Arab J Sci Eng"},{"key":"12691_CR54","unstructured":"Thomas E (2015) The Fibonacci sequence through a different lens (doctoral dissertation)"},{"key":"12691_CR55","unstructured":"Vikranth BM, Momin MH, Mohsin SM, Rimal S, Pandey SR (2015) A survey of image steganography. J Emerg Technol Innov Res 2(4)"},{"issue":"9\u201310","key":"12691_CR56","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9\u201310):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"14","key":"12691_CR57","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-017-4444-0","volume":"77","author":"Y Yang","year":"2018","unstructured":"Yang Y, Zhang W, Liang D, Yu N (2018) A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images. Multimed Tools Appl 77(14):18043\u201318065","journal-title":"Multimed Tools Appl"},{"key":"12691_CR58","doi-asserted-by":"publisher","unstructured":"Yeung Y, Lu W, Xue Y, Chen J, Li R (2019) Secure binary image steganography based on LTP distortion minimization. Multimed Tools Appl.\u00a0https:\/\/doi.org\/10.1007\/s11042-019-7731-0","DOI":"10.1007\/s11042-019-7731-0"},{"issue":"2","key":"12691_CR59","first-page":"115","volume":"32","author":"H Zodpe","year":"2020","unstructured":"Zodpe H, Sapkal A (2020) An efficient AES implementation using FPGA with enhanced security features. J King Saud Univ Eng Sci 32(2):115\u2013122","journal-title":"J King Saud Univ Eng Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12691-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12691-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12691-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T05:46:27Z","timestamp":1668231987000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12691-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,25]]},"references-count":59,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["12691"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12691-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,25]]},"assertion":[{"value":"29 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}