{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:08:30Z","timestamp":1768820910523,"version":"3.49.0"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11042-022-13015-7","type":"journal-article","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T12:05:07Z","timestamp":1649333107000},"page":"30663-30683","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Improving grayscale steganography to protect personal information disclosure within hotel services"],"prefix":"10.1007","volume":"81","author":[{"given":"Aditya Kumar","family":"Sahu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0923-202X","authenticated-orcid":false,"given":"Adnan","family":"Gutub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,7]]},"reference":[{"key":"13015_CR1","doi-asserted-by":"publisher","unstructured":"Abu\u2010Hashem M, Gutub A (2021) Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi\u2010core sharing technology. CAAI Transactions on Intelligence Technology. IET (IEE) - Wiley. https:\/\/doi.org\/10.1049\/cit2.12070","DOI":"10.1049\/cit2.12070"},{"issue":"2","key":"13015_CR2","doi-asserted-by":"publisher","first-page":"2585","DOI":"10.1007\/s13369-021-06200-7","volume":"47","author":"E Almehmadi","year":"2022","unstructured":"Almehmadi E, Gutub A (2022) Novel arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing. Arab J Sci Eng 47(2):2585\u20132609. https:\/\/doi.org\/10.1007\/s13369-021-06200-7","journal-title":"Arab J Sci Eng"},{"issue":"2","key":"13015_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.13140\/RG.2.2.32048.30727","volume":"16","author":"S Almutairi","year":"2019","unstructured":"Almutairi S, Gutub A, Al-Ghamdi M (2019) Image steganography to facilitate online students account system. Rev Bus Technol Res (RBTR) 16(2):43\u201349. https:\/\/doi.org\/10.13140\/RG.2.2.32048.30727","journal-title":"Rev Bus Technol Res (RBTR)"},{"key":"13015_CR4","doi-asserted-by":"publisher","unstructured":"Al-Roithy B, Gutub A (2021) Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimed Tools Appl (MTAP) 80:28521\u201328581. https:\/\/doi.org\/10.1007\/s11042-021-11051-3","DOI":"10.1007\/s11042-021-11051-3"},{"key":"13015_CR5","doi-asserted-by":"publisher","unstructured":"Al-Shaarani F, Gutub A (2022) Increasing participants using counting-based secret sharing via involving matrices and practical steganography. Arab J Sci Eng 47(2):2455\u20132477. https:\/\/doi.org\/10.1007\/s13369-021-06165-7","DOI":"10.1007\/s13369-021-06165-7"},{"key":"13015_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.09.009","author":"F Al-Shaarani","year":"2021","unstructured":"Al-Shaarani F, Gutub A (2021) Securing matrix counting-based secret-sharing involving crypto steganography. J King Saud Univ - Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2021.09.009","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"1","key":"13015_CR7","first-page":"1","volume":"1","author":"F Al-Shaarani","year":"2020","unstructured":"Al-Shaarani F, Basakran N, Gutub A (2020) Sensing e-banking cybercrimes vulnerabilities via smart information sciences strategies. RAS Eng Technol 1(1):1\u20139","journal-title":"RAS Eng Technol"},{"issue":"8","key":"13015_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.22937\/IJCSNS.2020.20.08.1","volume":"20","author":"ES Bin-Hureib","year":"2020","unstructured":"Bin-Hureib ES, Gutub A (2020) Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int. J. Comput. Sci. Netw Secur 20(8):1\u20138. https:\/\/doi.org\/10.22937\/IJCSNS.2020.20.08.1","journal-title":"Netw Secur"},{"key":"13015_CR9","unstructured":"Database (2021) http:\/\/sipi.usc.edu\/database\/database.php. Accessed on 03-05-2021"},{"key":"13015_CR10","unstructured":"Enescu I (2016) Unwanted guests: How hackers are targeting the hospitality industry. http:\/\/www.naylornetwork.com\/hoc-nwl\/pdf\/Cybersecurity_Article_for_Roomers_Magazine.pdf. Accessed 1 Dec 2020"},{"key":"13015_CR11","unstructured":"Facchini SW (2016) Cybersecurity and the hospitality industry. https:\/\/www.reviewjournal.com\/opinion\/cybersecurity-and-the-hospitality-industry."},{"issue":"3","key":"13015_CR12","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868\u2013882","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"13015_CR13","doi-asserted-by":"publisher","unstructured":"Gutub A (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2(1):56\u201364. https:\/\/doi.org\/10.4304\/jetwi.2.1.56-64","DOI":"10.4304\/jetwi.2.1.56-64"},{"key":"13015_CR14","doi-asserted-by":"publisher","unstructured":"Gutub A (2022) Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation. Multimed Tools Appl 81(7):9527\u20139547. https:\/\/doi.org\/10.1007\/s11042-022-12062-4","DOI":"10.1007\/s11042-022-12062-4"},{"key":"13015_CR15","doi-asserted-by":"publisher","DOI":"10.5505\/pajes.2021.54837","author":"A Gutub","year":"2022","unstructured":"Gutub A (2022) Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale University Journal of Engineering Sciences. https:\/\/doi.org\/10.5505\/pajes.2021.54837","journal-title":"Pamukkale University Journal of Engineering Sciences"},{"issue":"1","key":"13015_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.2022010118","volume":"16","author":"A Gutub","year":"2022","unstructured":"Gutub A (2022) Watermarking images via counting-based secret sharing for lightweight semi-complete authentication. Int J Inf Secur Priv 16(1):1\u201318. https:\/\/doi.org\/10.4018\/IJISP.2022010118","journal-title":"Int J Inf Secur Priv"},{"issue":"4","key":"13015_CR17","doi-asserted-by":"publisher","first-page":"2631","DOI":"10.1007\/s13369-020-04413-w","volume":"45","author":"A Gutub","year":"2020","unstructured":"Gutub A, Al-Shaarani F (2020) Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons. Arab J Sci Eng 45(4):2631\u20132644. https:\/\/doi.org\/10.1007\/s13369-020-04413-w","journal-title":"Arab J Sci Eng"},{"issue":"3","key":"13015_CR18","doi-asserted-by":"publisher","first-page":"502","DOI":"10.5281\/zenodo.1061621","volume":"1","author":"A Gutub","year":"2007","unstructured":"Gutub A, Fattani M (2007) A novel arabic text steganography method using letter points and extensions. International Journal of Computer, Electrical, Automation, Control and Information Engineering. 1(3):502\u2013505. https:\/\/doi.org\/10.5281\/zenodo.1061621","journal-title":"International Journal of Computer, Electrical, Automation, Control and Information Engineering."},{"key":"13015_CR19","doi-asserted-by":"publisher","unstructured":"Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591\u20135619. https:\/\/doi.org\/10.1007\/s11042-017-5293-6","DOI":"10.1007\/s11042-017-5293-6"},{"issue":"3","key":"13015_CR20","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1108\/JHTT-11-2019-0138","volume":"11","author":"K Gwebu","year":"2020","unstructured":"Gwebu K, Barrows CW (2020) Data breaches in hospitality: is the industry different? J Hosp Tour Technol 11(3):511\u2013527. https:\/\/doi.org\/10.1108\/JHTT-11-2019-0138","journal-title":"J Hosp Tour Technol"},{"issue":"39","key":"13015_CR21","doi-asserted-by":"publisher","first-page":"30087","DOI":"10.1007\/s11042-020-09513-1","volume":"79","author":"FS Hassan","year":"2020","unstructured":"Hassan FS, Gutub A (2020) Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed Tools Appl 79(39):30087\u201330109. https:\/\/doi.org\/10.1007\/s11042-020-09513-1","journal-title":"Multimed Tools Appl"},{"key":"13015_CR22","unstructured":"Hemavathy A (2005) Cybercriminal Activity. https:\/\/cseweb.ucsd.edu\/\/~cfleizac\/WhiteTeam-CyberCrime.pdf. Accessed 1 Apr 2022"},{"issue":"1","key":"13015_CR23","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1080\/15470140802104557","volume":"9","author":"TW Hilliard","year":"2008","unstructured":"Hilliard TW, Baloglu S (2008) Safety and security as part of the hotel services cape for meeting planners. Int Journal of Convention & Event Tourism 9(1):15\u201334","journal-title":"Int Journal of Convention & Event Tourism"},{"issue":"4","key":"13015_CR24","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1108\/09596111111130029","volume":"23","author":"C Ip","year":"2011","unstructured":"Ip C, Leung R, Law R (2011) Progress and development of information and communication technologies in hospitality. Int J Contemp Hosp Manag 23(4):533\u2013551. https:\/\/doi.org\/10.1108\/09596111111130029","journal-title":"Int J Contemp Hosp Manag"},{"key":"13015_CR25","doi-asserted-by":"publisher","unstructured":"Kheshaifaty N, Gutub A (2021) Engineering graphical captcha and AES crypto hash functions for secure online authentication. J Eng Res. https:\/\/doi.org\/10.36909\/jer.13761","DOI":"10.36909\/jer.13761"},{"issue":"6","key":"13015_CR26","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1049\/iet-ipr.2011.0059","volume":"6","author":"M Khodaei","year":"2012","unstructured":"Khodaei M, Faez K (2012) New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Process 6(6):677\u2013686","journal-title":"IET Image Process"},{"key":"13015_CR27","unstructured":"King D (2017) Hotels shown to be susceptible to cybercrime. Travel Weekly"},{"key":"13015_CR28","unstructured":"Koegler S. (2017) How Hotel Cybersecurity Keeps Guests and Data Secure. https:\/\/securityintelligence.com\/how-hotel-cybersecurity-keeps-guests-and-data-secure\/"},{"issue":"8","key":"13015_CR29","doi-asserted-by":"publisher","first-page":"10033","DOI":"10.1007\/s11042-017-4946-9","volume":"77","author":"X Liao","year":"2018","unstructured":"Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033\u201310050","journal-title":"Multimed Tools Appl"},{"key":"13015_CR30","doi-asserted-by":"crossref","unstructured":"Liao X, Li K, Zhu X, Liu KR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955\u2013968. [Accessed: 1st Dec 2020]","DOI":"10.1109\/JSTSP.2020.3002391"},{"key":"13015_CR31","doi-asserted-by":"publisher","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput. [Accessed: 1st Dec 2020] https:\/\/doi.org\/10.1109\/TDSC.2020.3004708","DOI":"10.1109\/TDSC.2020.3004708"},{"key":"13015_CR32","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","volume":"67","author":"X Liao","year":"2018","unstructured":"Liao X, Yin J, Guo S, Li X, Sangaiah AK (2018) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng 67:320\u2013329","journal-title":"Comput Electr Eng"},{"issue":"3","key":"13015_CR33","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"13015_CR34","doi-asserted-by":"crossref","unstructured":"Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285\u2013287.&nbsp;[Accessed: 1st Dec 2020]","DOI":"10.1109\/LSP.2006.870357"},{"key":"13015_CR35","unstructured":"Muraya M. Effects of Cybercrime Management on Information Security of selected Hotels in Nairobi Kenya (Doctoral dissertation, Moi University). [Accessed: 1st Dec 2020]"},{"key":"13015_CR36","doi-asserted-by":"crossref","unstructured":"Papanikolaou A, Vlachos V, Papathanasiou A, Chaikalis K, Dimou M, Karadimou M (2014) A survey of cyber crime in Greece. Telfor J 6(2):86\u201391. [Accessed: 1st Dec 2020]","DOI":"10.5937\/telfor1402086P"},{"key":"13015_CR37","doi-asserted-by":"crossref","unstructured":"Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215\u2013224. [Accessed: 1st Dec 2020]","DOI":"10.1109\/TIFS.2010.2045842"},{"key":"13015_CR38","doi-asserted-by":"publisher","unstructured":"Samkari H, Gutub A (2019) Protecting medical records against cybercrimes within hajj period by 3-layer security. Recent Trends Inf Technol Appl 2(3):1\u201321. [Accessed: 1st Dec 2020]&nbsp;https:\/\/doi.org\/10.5281\/zenodo.3543455","DOI":"10.5281\/zenodo.3543455"},{"key":"13015_CR39","unstructured":"Shabani N (2017) A study of cyber security in hospitality industry-threats and countermeasures: case study in Reno, Nevada. arXiv preprint arXiv:1705.02749"},{"key":"13015_CR40","doi-asserted-by":"publisher","unstructured":"Shambour MK, Gutub A (2021) Personal privacy evaluation of smart devices applications serving Hajj and Umrah Rituals. J Eng Res. https:\/\/doi.org\/10.36909\/jer.13199","DOI":"10.36909\/jer.13199"},{"key":"13015_CR41","doi-asserted-by":"publisher","unstructured":"Shambour MK, Gutub A (2022) Progress of IoT research technologies and applications serving hajj and Umrah. Arab J Sci Eng (AJSE) 47:1253\u20131273. https:\/\/doi.org\/10.1007\/s13369-021-05838-7","DOI":"10.1007\/s13369-021-05838-7"},{"key":"13015_CR42","unstructured":"Shambour MK, Gutub A (2022) The impact of corona disease on the feelings of Twitter users in the two Holy Citiesd during the Hajj season of 1442 AH. Hajj Forum 2022 - the 21st scientific Hajj research Forum, Madinah, Saudi Arabia, pp 254\u2013265. https:\/\/drive.uqu.edu.sa\/up\/profile\/Books\/4310001\/book_path_FeMAOaNgOR.pdf"},{"issue":"1","key":"13015_CR43","first-page":"1","volume":"10","author":"AK Sahu","year":"2019","unstructured":"Sahu AK, Swain G (2019) A novel n-rightmost bit replacement image steganography technique. 3D. Research 10(1):1\u20138","journal-title":"Research"},{"key":"13015_CR44","doi-asserted-by":"publisher","first-page":"102808","DOI":"10.1016\/j.jisa.2021.102808","volume":"58","author":"AK Sahu","year":"2021","unstructured":"Sahu AK, Swain G, Sahu M, Hemalatha J (2021) Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP. Journal of Information Security and Applications 58:102808","journal-title":"Journal of Information Security and Applications"},{"key":"13015_CR45","unstructured":"Seamans E (2018) The unique challenges of data security in the hospitality industry. Insurance & Loss Prevention, Lodging, Risk Management, Technology. https:\/\/hospitalitylawyer.com\/the-unique-challenges-of-data-security-in-the-hospitality-industry\/"},{"key":"13015_CR46","doi-asserted-by":"publisher","unstructured":"Singh A, Satapathy SC, Roy A, Gutub A (2022) AI-based mobile edge computing for IoT: applications challenges and future scope. Arab J Sci Eng. https:\/\/doi.org\/10.1007\/s13369-021-06348-2","DOI":"10.1007\/s13369-021-06348-2"},{"key":"13015_CR47","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.procs.2016.05.173","volume":"85","author":"G Swain","year":"2016","unstructured":"Swain G (2016) Digital image steganography using variable length group of bits substitution. Procedia Computer Science 85:31\u201338","journal-title":"Procedia Computer Science"},{"key":"13015_CR48","unstructured":"The Network Support Company. (2017). Cybercrime and the hospitality industry"},{"key":"13015_CR49","unstructured":"Trust Wave (2016) Hospitality in the Crosshairs of Cybercrime. https:\/\/www.infinigate.co.uk\/fileadmin\/user_upload\/Vendors\/Trustwave\/hospitality-in-the-crosshairs-of-cybercrime.pdf"},{"issue":"9\u201310","key":"13015_CR50","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9\u201310):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"6","key":"13015_CR51","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1080\/13682199.2017.1355089","volume":"65","author":"NI Wu","year":"2017","unstructured":"Wu NI, Hwang MS (2017) A novel LSB data hiding scheme with the lowest distortion. The Imaging Science Journal 65(6):371\u2013378","journal-title":"The Imaging Science Journal"},{"issue":"3","key":"13015_CR52","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1108\/JTF-10-2019-0108","volume":"6","author":"A Yallop","year":"2020","unstructured":"Yallop A, Seraphin H (2020) Big data and analytics in tourism and hospitality: opportunities and risks. Journal of Tourism Futures 6(3):257\u2013262. https:\/\/doi.org\/10.1108\/JTF-10-2019-0108","journal-title":"Journal of Tourism Futures"},{"issue":"11","key":"13015_CR53","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/TIFS.2017.2710946","volume":"12","author":"J Ye","year":"2017","unstructured":"Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security 12(11):2545\u20132557","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"13015_CR54","doi-asserted-by":"publisher","first-page":"2199","DOI":"10.3390\/app8112199","volume":"8","author":"AA Zakaria","year":"2018","unstructured":"Zakaria AA, Hussain M, Wahab AW, Idris MY, Abdullah NA, Jung KH (2018) High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Appl Sci 8(11):2199","journal-title":"Appl Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13015-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13015-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13015-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T05:43:02Z","timestamp":1660714982000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13015-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,7]]},"references-count":54,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["13015"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13015-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,7]]},"assertion":[{"value":"28 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}