{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:09:38Z","timestamp":1771456178189,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T00:00:00Z","timestamp":1661299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11042-022-13677-3","type":"journal-article","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T04:02:54Z","timestamp":1661313774000},"page":"7529-7552","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Development of secrete images in image transferring system"],"prefix":"10.1007","volume":"82","author":[{"given":"Hemanta Kumar","family":"Bhuyan","sequence":"first","affiliation":[]},{"given":"A.","family":"Vijayaraj","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6873-6469","authenticated-orcid":false,"given":"Vinayakumar","family":"Ravi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"13677_CR1","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M,Ghemawat S, Irving G, Isard M et al. (2016) Tensorflow: a system forlarge-scale machine learning. In OSDI, vol. 16, pp. 265\u2013283"},{"key":"13677_CR2","doi-asserted-by":"crossref","unstructured":"Aslam MA, Azam MRF, Abbas M, Rasheed Y, Alotaibi SS, Anwar MW (2022) Image Steganography using Least Significant Bit (LSB) - A Systematic Literature Review. 2022 2nd international conference on computing and information technology (ICCIT), Tabuk, Saudi Arabia, pp. 32\u201338","DOI":"10.1109\/ICCIT52419.2022.9711628"},{"issue":"1","key":"13677_CR3","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0893-6080(89)90014-2","volume":"2","author":"P Baldi","year":"1989","unstructured":"Baldi P, Hornik K (1989) Neural networks and principal component analysis. Neural Netw 2(1):53\u201358","journal-title":"Neural Netw"},{"issue":"7","key":"13677_CR4","doi-asserted-by":"publisher","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","volume":"42","author":"S Baluja","year":"2020","unstructured":"Baluja S (2020) Hiding images within images. IEEE Trans Pattern Anal Mach Intell 42(7):1685\u20131697","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"11","key":"13677_CR5","doi-asserted-by":"publisher","first-page":"3467","DOI":"10.1016\/j.patcog.2008.05.006","volume":"41","author":"S Baluja","year":"2008","unstructured":"Baluja S, Covell M (2008) Wave print: efficient wavelet-based audio finger printing. Pattern Recogn 41(11):3467\u20133480","journal-title":"Pattern Recogn"},{"issue":"4","key":"13677_CR6","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s10586-014-0393-9","volume":"17","author":"HK Bhuyan","year":"2014","unstructured":"Bhuyan HK, Kamila NK (2014) Privacy preserving sub-feature selection based on fuzzy probabilities. Cluster Computing Springer 17(4):1383\u20131399","journal-title":"Cluster Computing Springer"},{"key":"13677_CR7","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.asoc.2015.06.060","volume":"36","author":"HK Bhuyan","year":"2015","unstructured":"Bhuyan HK, Kamila NK (2015) Privacy preserving sub-feature selection in distributed data mining. Applied Soft Computing Elsevier 36:552\u2013569","journal-title":"Applied Soft Computing Elsevier"},{"issue":"8","key":"13677_CR8","first-page":"424","volume":"3","author":"HK Bhuyan","year":"2011","unstructured":"Bhuyan HK, Kamila NK, Dash SK (2011) An approach for privacy preservation of distributed data in peer-to-peer network using multiparty computation. Int Journal Comput Sci Issues (IJCSI) 3(8):424\u2013429","journal-title":"Int Journal Comput Sci Issues (IJCSI)"},{"issue":"1","key":"13677_CR9","doi-asserted-by":"publisher","first-page":"297","DOI":"10.4156\/ijact.vol4.issue1.34","volume":"4","author":"HK Bhuyan","year":"2012","unstructured":"Bhuyan HK, Dash SK, Roy S, Swain DK (2012) Privacy Preservation with Penalty in Decentralized Network using Multiparty Computation. Int J Advanc Comput Technol (IJACT) 4(1):297\u2013303","journal-title":"Int J Advanc Comput Technol (IJACT)"},{"issue":"4","key":"13677_CR10","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1007\/s10586-016-0643-0","volume":"19","author":"HK Bhuyan","year":"2016","unstructured":"Bhuyan HK, Kamila NK, Jena LD (2016) Pareto-based multi-objective optimization for classification in data mining. Cluster Computing (Springer) 19(4):1723\u20131745","journal-title":"Cluster Computing (Springer)"},{"key":"13677_CR11","doi-asserted-by":"crossref","unstructured":"Bhuyan HK, Kumar LR, Reddy RK (2019) Optimization model for Sub-feature selection in data mining, 2nd International Conference on Smart Systems and Inventive Technology (ICSSIT 2019), IEEE Explore, pp 1212\u20131216","DOI":"10.1109\/ICSSIT46314.2019.8987780"},{"key":"13677_CR12","doi-asserted-by":"crossref","unstructured":"Bhuyan HK, Chakraborty C, Pani SK, Ravi VK (2021) Feature and sub-feature selection for classification using correlation coefficient and fuzzy model. IEEE Trans Eng Manag:1\u201315","DOI":"10.1109\/TEM.2021.3065699"},{"issue":"3","key":"13677_CR13","first-page":"1","volume":"39","author":"HK Bhuyan","year":"2021","unstructured":"Bhuyan HK, Chakraborty C, Shelke Y, Pani SK (2021) COVID-19 diagnosis system by deep learning approaches. Expert Syst 39(3):1\u201318","journal-title":"Expert Syst"},{"key":"13677_CR14","doi-asserted-by":"crossref","unstructured":"Bhuyan HK, Kamila NK, Pani SK (2021) Individual privacy in data mining using fuzzy optimization, engineering optimization. Pp. 1-19 (early published)","DOI":"10.1080\/0305215X.2021.1922897"},{"key":"13677_CR15","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/TIP.2021.3128329","volume":"31","author":"J Burke","year":"2022","unstructured":"Burke J, King S (2022) Edge tracing using Gaussian process regression. IEEE Trans Image Process 31:138\u2013148","journal-title":"IEEE Trans Image Process"},{"key":"13677_CR16","doi-asserted-by":"crossref","unstructured":"Chandra K, Kapoor G, Kohli R, Archana G. (2016) Improving software quality using machine learning. In: 2016 international conference on innovation and challenges in cyber security (ICICCS-INBUSH). Pp. 115-118","DOI":"10.1109\/ICICCS.2016.7542340"},{"issue":"3","key":"13677_CR17","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.jss.2012.11.042","volume":"86","author":"M Chaumont","year":"2013","unstructured":"Chaumont M, Puech W, Lahanier C (2013) Securing color information of an image by concealing the color palette. J Syst Softw 86(3):809\u2013825","journal-title":"J Syst Softw"},{"issue":"4","key":"13677_CR18","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"L-C Chen","year":"2018","unstructured":"Chen L-C, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2018) Deep lab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans Pattern Anal Mach Intell 40(4):834\u2013848","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"13677_CR19","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8(4):22\u201328","journal-title":"IEEE Multimed"},{"key":"13677_CR20","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Soukal D (2004) Searching for the stego-key. In Proceedings of SPIE, vol. 5306, pp. 70\u201382","DOI":"10.1117\/12.521353"},{"issue":"12","key":"13677_CR21","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1109\/TPAMI.2012.193","volume":"35","author":"Y Gong","year":"2013","unstructured":"Gong Y, Lazebnik S, Gordo A, Perronnin F (2013) Iterative quantization: a procrustean approach to learning binary codes forlarge-scale image retrieval. IEEE Trans Pattern Anal Mach Intell 35(12):2916\u20132929","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"13677_CR22","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D,Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In Adv. in Neural Information Processing Systems, pp 2672\u20132680. https:\/\/papers.nips.cc\/paper\/2014\/hash\/5ca3e9b122f61f8f06494c97b1afccf3-Abstract.html"},{"issue":"5786","key":"13677_CR23","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504\u2013507","journal-title":"Science"},{"key":"13677_CR24","doi-asserted-by":"publisher","first-page":"38303","DOI":"10.1109\/ACCESS.2018.2852771","volume":"6","author":"D Hu","year":"2018","unstructured":"Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6:38303\u201338314","journal-title":"IEEE Access"},{"key":"13677_CR25","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1109\/TIP.2022.3141255","volume":"31","author":"Z Huang","year":"2022","unstructured":"Huang Z, Yang S, Zhou MC, Li Z, Zheng G, Chen Y (2022) Feature map distillation of thin nets for low-resolution object recognition. IEEE Trans Image Process 31:1364\u20131379","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"13677_CR26","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1109\/TPAMI.2003.1240122","volume":"25","author":"AK Jain","year":"2003","unstructured":"Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494\u20131498","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"13677_CR27","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.asoc.2018.03.023","volume":"67","author":"R Jarusek","year":"2018","unstructured":"Jarusek R, Volna E, Kotyrba M (2018) Robust steganographic method based on unconventional approach of neural networks. Appl Soft Comput 67:505\u2013518","journal-title":"Appl Soft Comput"},{"issue":"3","key":"13677_CR28","first-page":"1","volume":"6","author":"GC Kessler","year":"2014","unstructured":"Kessler GC (2014) An overview of steganography for the computer forensics examiner. Forensic Sci Commun 6(3):1\u201329","journal-title":"Forensic Sci Commun"},{"key":"13677_CR29","doi-asserted-by":"crossref","unstructured":"Kingma D, Adam JB (2015) A method for stochastic optimization. in ICLR, pp 1\u201315","DOI":"10.1007\/978-3-662-46214-0_1"},{"issue":"4","key":"13677_CR30","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/JSTSP.2017.2692389","volume":"11","author":"P Korshunov","year":"2017","unstructured":"Korshunov P, Marcel S (2017) Impact of score fusion on voice biometrics and presentation attack detection in cross-database evaluations. IEEE J Select Top Signal Process 11(4):695\u2013705","journal-title":"IEEE J Select Top Signal Process"},{"key":"13677_CR31","unstructured":"Larsen ABL, S\u00f8nderby SK, Winther O (2015) Autoencoding beyond pixels using a learned similarity metric. Pp 1\u20138, arXiv:1512.09300"},{"issue":"3","key":"13677_CR32","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/TCSVT.2008.918116","volume":"18","author":"S Li","year":"2008","unstructured":"Li S, Li C, Lo K-T, Chen G (2008) Cryptanalysis of an image scrambling scheme without bandwidth expansion. IEEE Trans Circuits Syst Vid Technol 18(3):338\u2013349","journal-title":"IEEE Trans Circuits Syst Vid Technol"},{"key":"13677_CR33","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multim Tools Appl 76:20739\u201320753","journal-title":"Multim Tools Appl"},{"issue":"3","key":"13677_CR34","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Zheng Q (2020) A new payload partition strategy in color image steganography. IEEE Transact Circuits Syst Vid Technol 30(3):685\u2013696","journal-title":"IEEE Transact Circuits Syst Vid Technol"},{"key":"13677_CR35","doi-asserted-by":"crossref","unstructured":"Liao X, Yin J, Chen M, Zheng Q (2020) Adaptive payload distribution in multiple images steganography based on image texture features, IEEE transactions on dependable and secure computing. Pp. 1-14","DOI":"10.1109\/TDSC.2020.3004708"},{"issue":"1","key":"13677_CR36","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2007.08.007","volume":"178","author":"Q Liu","year":"2008","unstructured":"Liu Q, Sung AH (2008) Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci 178(1):21\u201336","journal-title":"Inf Sci"},{"key":"13677_CR37","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TIP.2021.3127850","volume":"31","author":"H Ma","year":"2022","unstructured":"Ma H, Liu S, Liao Q, Zhang J, Xue J-H (2022) Defocus image Deblurring network with defocus map estimation as auxiliary task. IEEE Trans Image Process 31:216\u2013226","journal-title":"IEEE Trans Image Process"},{"key":"13677_CR38","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/TIP.2021.3128321","volume":"31","author":"J Miao","year":"2022","unstructured":"Miao J, Kou KI (2022) Color image recovery using low-rank quaternion matrix completion algorithm. IEEE Trans Image Process 31:190\u2013201","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"13677_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078","volume":"2016","author":"L Pibre","year":"2016","unstructured":"Pibre L, Pasquet J, Ienco D, Chaumont M (2016) Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch. Electron Imaging 2016(8):1\u201311","journal-title":"Electron Imaging"},{"issue":"3","key":"13677_CR40","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1109\/TPAMI.2005.54","volume":"27","author":"A Qamra","year":"2005","unstructured":"Qamra A, Meng Y, Chang EY (2005) Enhanced perceptual distance functions and indexing for image replica recognition. IEEE Trans Pattern Anal Mach Intell 27(3):379\u2013391","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"7","key":"13677_CR41","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/TPAMI.2006.134","volume":"28","author":"D Tao","year":"2006","unstructured":"Tao D, Tang X, Li X, Wu X (2006) Asymmetric bagging and random subspace for support vector machines-based relevance feedback in image retrieval. IEEE Trans Pattern Anal Mach Intell 28(7):1088\u20131099","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"10","key":"13677_CR42","doi-asserted-by":"publisher","first-page":"3125","DOI":"10.1109\/TMI.2020.2987796","volume":"39","author":"V Trung","year":"2020","unstructured":"Trung V, Lai P, Raich R, Pham A, Fern XZ, Arvind Rao UK (2020) A Novel Attribute-Based Symmetric Multiple Instance Learning for Histopathological Image Analysis. IEEE Trans Med Imaging 39(10):3125\u20133136","journal-title":"IEEE Trans Med Imaging"},{"issue":"6","key":"13677_CR43","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1109\/TCSVT.2004.828325","volume":"14","author":"D Van De Ville","year":"2004","unstructured":"Van De Ville D, Philips W, Van de Walle R, Lemahieu I (2004) Image scrambling without bandwidth expansion. IEEE Trans On Circuits and Sys Vid Technol 14(6):892\u2013897","journal-title":"IEEE Trans On Circuits and Sys Vid Technol"},{"issue":"Dec","key":"13677_CR44","first-page":"3371","volume":"11","author":"P Vincent","year":"2010","unstructured":"Vincent P, Larochelle H, Lajoie I, Bengio Y, Manzagol P (2010) Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. JMLR 11(Dec):3371\u20133408","journal-title":"JMLR"},{"key":"13677_CR45","first-page":"2856","volume":"9","author":"MH Vu","year":"2020","unstructured":"Vu MH, L\u00f6fstedt T, TufveNyholm RS (2020) A question-centric model for visual question answering in medical imaging. IEEE transactions on medical imaging, volume: 39. Issue 9:2856\u20132868","journal-title":"Issue"},{"issue":"6","key":"13677_CR46","doi-asserted-by":"publisher","first-page":"2706","DOI":"10.1109\/TIT.2008.921684","volume":"55","author":"Y Wang","year":"2008","unstructured":"Wang Y, Moulin P (2008) Perfectly secure steganography: capacity, error exponents, and code constructions. IEEE Trans Inform Theory Special Issue Security 55(6):2706\u20132722","journal-title":"IEEE Trans Inform Theory Special Issue Security"},{"issue":"4","key":"13677_CR47","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"13677_CR48","doi-asserted-by":"publisher","first-page":"2177","DOI":"10.1109\/TPAMI.2012.29","volume":"34","author":"G Wang","year":"2012","unstructured":"Wang G, Hoiem D, Forsyth D (2012) Learning image similarity from flickr groups using fast kernel machines. IEEE Trans Pattern Anal Mach Intell 34(11):2177\u20132188","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"13677_CR49","first-page":"57","volume":"29","author":"WZX Wang","year":"2019","unstructured":"Wang WZX, You W, Chen J, Dai P, Zhang P (2019) RESLS: region and edge synergetic level set framework for image segmentation. IEEE Trans Image Process 29:57\u201371","journal-title":"IEEE Trans Image Process"},{"key":"13677_CR50","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TIP.2021.3125266","volume":"31","author":"W Xu","year":"2022","unstructured":"Xu W, Wang G (2022) A domain gap aware generative adversarial network for multi-domain image translation. IEEE Trans Image Process 31:72\u201384","journal-title":"IEEE Trans Image Process"},{"key":"13677_CR51","doi-asserted-by":"crossref","unstructured":"Yedroudj M, Comby F, Chaumont M, Yedrouj-net (2018) An efficient CNN for spatial steganalysis. In IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP\u20192018, pp 2092\u20132096","DOI":"10.1109\/ICASSP.2018.8461438"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13677-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13677-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13677-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,26]],"date-time":"2023-01-26T08:26:01Z","timestamp":1674721561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13677-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,24]]},"references-count":51,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["13677"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13677-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,24]]},"assertion":[{"value":"19 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/competing interests"}}]}}