{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T11:56:14Z","timestamp":1768996574836,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s11042-023-14735-0","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T22:02:20Z","timestamp":1678140140000},"page":"33063-33085","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Securing encrypted image information in audio data"],"prefix":"10.1007","volume":"82","author":[{"given":"Zeba","family":"Shamsi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6169-4200","authenticated-orcid":false,"given":"Dolendro Singh","family":"Laiphrakpam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,6]]},"reference":[{"key":"14735_CR1","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.optlastec.2019.03.005","volume":"116","author":"AA Abd EL-Latif","year":"2019","unstructured":"Abd EL-Latif A A, Abd-El-Atty B, Venegas-Andraca S E (2019) A novel image steganography technique based on quantum substitution boxes. Opt Laser Technol 116:92\u2013102","journal-title":"Opt Laser Technol"},{"key":"14735_CR2","doi-asserted-by":"crossref","unstructured":"Bansal R, Badal N (2022) A novel approach for dual layer security of message using steganography and cryptography. Multimed Tools Appl 81:20669\u201320684","DOI":"10.1007\/s11042-022-12084-y"},{"key":"14735_CR3","doi-asserted-by":"crossref","unstructured":"Basu S, Debnath A, Basu A, et al. (2022) An image data hiding technique using differential evolution. Multimed Tools Appl 1\u201318","DOI":"10.1007\/s11042-022-12557-0"},{"key":"14735_CR4","unstructured":"Bbc sound effects. http:\/\/bbcsfx.acropolis.org.uk. Accessed 29 June 2020"},{"key":"14735_CR5","unstructured":"Chattopadhyay C, Sarkar B, Mukherjee D (2015) Encoding by dna relations and randomization through chaotic sequences for image encryption. arXiv preprint arXiv:1505.01795"},{"issue":"5","key":"14735_CR6","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1016\/j.jksuci.2020.07.010","volume":"34","author":"A Ditta","year":"2022","unstructured":"Ditta A, Azeem M, Naseem S et al (2022) A secure and size efficient algorithm to enhance data hiding capacity and security of cover text by using unicode. Journal of King Saud University - Computer and Information Sciences 34 (5):2180\u20132191","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"issue":"1","key":"14735_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-4722-2012-25","volume":"2012","author":"F Djebbar","year":"2012","unstructured":"Djebbar F, Ayad B, Meraim K A, et al. (2012) Comparative study of digital audio steganography techniques. EURASIP J Audio Speech Music Process 2012(1):1\u201316","journal-title":"EURASIP J Audio Speech Music Process"},{"key":"14735_CR8","doi-asserted-by":"crossref","unstructured":"El-Khamy S E, Korany N, El-sherif MH (2017a) Robust image hiding in audio based on integer wavelet transform and chaotic maps hopping. In: 2017 34Th national radio science conference (NRSC), IEEE, pp 205\u2013212","DOI":"10.1109\/NRSC.2017.7893505"},{"issue":"22","key":"14735_CR9","doi-asserted-by":"publisher","first-page":"24091","DOI":"10.1007\/s11042-016-4113-8","volume":"76","author":"SE El-Khamy","year":"2017","unstructured":"El-Khamy SE, Korany NO, El-Sherif MH (2017b) A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and rsa encryption. Multimedia Tools Appl 76 (22):24091\u201324106","journal-title":"Multimedia Tools Appl"},{"key":"14735_CR10","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.compeleceng.2016.09.001","volume":"70","author":"SA El-Rahman","year":"2018","unstructured":"El-Rahman SA (2018) A comparative analysis of image steganography based on dct algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electr Eng 70:380\u2013399","journal-title":"Comput Electr Eng"},{"key":"14735_CR11","doi-asserted-by":"crossref","unstructured":"Gupta Banik B, Bandyopadhyay S K (2018) Blind key based attack resistant audio steganography using cocktail party effect. Secur Commun Netw. 2018:1781384:1\u20131781384:21","DOI":"10.1155\/2018\/1781384"},{"issue":"12","key":"14735_CR12","first-page":"2050173(1)","volume":"30","author":"AK Hongjun Liu","year":"2020","unstructured":"Hongjun Liu A K, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos 30 (12):2050173(1)\u20132050173(14)","journal-title":"Int J Bifurcation Chaos"},{"key":"14735_CR13","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab A W A, Idris Y I B, et al. (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46\u201366","journal-title":"Signal Process Image Commun"},{"key":"14735_CR14","doi-asserted-by":"publisher","first-page":"709","DOI":"10.1103\/PhysRevLett.45.709","volume":"45","author":"K Ikeda","year":"1980","unstructured":"Ikeda K, Daido H, Akimoto O (1980) Optical turbulence: Chaotic behavior of transmitted light from a ring cavity. Phys Rev Lett 45:709\u2013712. https:\/\/doi.org\/10.1103\/PhysRevLett.45.709","journal-title":"Phys Rev Lett"},{"key":"14735_CR15","doi-asserted-by":"publisher","first-page":"109691","DOI":"10.1016\/j.mehy.2020.109691","volume":"139","author":"S Karakus","year":"2020","unstructured":"Karakus S, Avci E (2020) A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses 139:109691","journal-title":"Med Hypotheses"},{"key":"14735_CR16","doi-asserted-by":"publisher","unstructured":"Lochter M, Merkle J (2010) Elliptic curve cryptography (ecc) brainpool standard curves and curve generation. https:\/\/doi.org\/10.17487\/RFC5639. https:\/\/www.rfc-editor.org\/info\/rfc5639","DOI":"10.17487\/RFC5639"},{"issue":"14","key":"14735_CR17","doi-asserted-by":"publisher","first-page":"18,451","DOI":"10.1007\/s11042-018-5720-3","volume":"77","author":"G Paul","year":"2018","unstructured":"Paul G, Saha S K, et al. (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77(14):18,451\u201318,481","journal-title":"Multimed Tools Appl"},{"key":"14735_CR18","doi-asserted-by":"publisher","first-page":"102814","DOI":"10.1016\/j.jvcir.2020.102814","volume":"70","author":"B Qi","year":"2020","unstructured":"Qi B, Yang C, Tan L, et al. (2020) A novel haze image steganography method via cover-source switching. J Vis Commun Image Represent 70:102814","journal-title":"J Vis Commun Image Represent"},{"key":"14735_CR19","first-page":"102863","volume":"59","author":"Y Ren","year":"2021","unstructured":"Ren Y, Cai S, Wang L (2021) Secure aac steganography scheme based on multi-view statistical distortion (sofmvd). J Inf Secur Appl 59:102863","journal-title":"J Inf Secur Appl"},{"key":"14735_CR20","volume-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"A Rukhin","year":"2001","unstructured":"Rukhin A, Soto J, Nechvatal J, et al. (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Booz-allen and hamilton inc mclean va, Tech. rep."},{"key":"14735_CR21","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.ins.2020.10.031","volume":"550","author":"A Sahasrabuddhe","year":"2021","unstructured":"Sahasrabuddhe A, Laiphrakpam D S (2021) Multiple images encryption based on 3d scrambling and hyper-chaotic system. Inf Sci 550:252\u2013267","journal-title":"Inf Sci"},{"key":"14735_CR22","doi-asserted-by":"crossref","unstructured":"Shafi K, Sankaranarayanan A, Prashanth G et al (2010) A novel audio steganography scheme using amplitude differencing. In: Trendz in Information Sciences & Computing (TISC2010), IEEE, pp 163\u2013167","DOI":"10.1109\/TISC.2010.5714631"},{"key":"14735_CR23","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.jisa.2018.03.004","volume":"40","author":"R Thanki","year":"2018","unstructured":"Thanki R, Borra S (2018) A color image steganography in hybrid FRT\u2013DWT domain. J Inf Secur Appl 40:92\u2013102. https:\/\/doi.org\/10.1016\/j.jisa.2018.03.004","journal-title":"J Inf Secur Appl"},{"key":"14735_CR24","unstructured":"The usc-sipi image database. http:\/\/sipi.usc.edu\/database. Accessed 01 July 2020"},{"key":"14735_CR25","first-page":"142","volume":"34","author":"MY Valandar","year":"2017","unstructured":"Valandar M Y, Ayubi P, Barani M J (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34:142\u2013151","journal-title":"J Inf Secur Appl"},{"key":"14735_CR26","doi-asserted-by":"publisher","first-page":"31805","DOI":"10.1109\/ACCESS.2021.3060317","volume":"9","author":"OFA Wahab","year":"2021","unstructured":"Wahab O F A, Khalaf A A, Hussein A I, et al. (2021) Hiding data using efficient combination of rsa cryptography, and compression steganography techniques. IEEE Access 9:31805\u201331815","journal-title":"IEEE Access"},{"issue":"2","key":"14735_CR27","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan J P, Agaian S, et al. (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Sel Areas Telecommun (JSAT) 1(2):31\u201338","journal-title":"J Sel Areas Telecommun (JSAT)"},{"issue":"1","key":"14735_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13636-017-0101-9","volume":"2017","author":"S Xiang","year":"2017","unstructured":"Xiang S, Li Z (2017) Reversible audio data hiding algorithm using noncausal prediction of alterable orders. EURASIP J Audio Speech Music Process 2017(1):1\u201316","journal-title":"EURASIP J Audio Speech Music Process"},{"issue":"13","key":"14735_CR29","doi-asserted-by":"publisher","first-page":"17875","DOI":"10.1007\/s11042-022-12643-3","volume":"81","author":"AO Younis","year":"2022","unstructured":"Younis A O (2022) A novel approach of steganography by using strong edge detection and chaos theory. Multimed Tools Appl 81(13):17875\u201317888","journal-title":"Multimed Tools Appl"},{"key":"14735_CR30","unstructured":"Younus ZS, Hussain MK (2019) Image steganography using exploiting modification direction for compressed encrypted data"},{"key":"14735_CR31","doi-asserted-by":"publisher","first-page":"162271","DOI":"10.1109\/ACCESS.2020.3015851","volume":"8","author":"H Yu","year":"2020","unstructured":"Yu H, Wang R, Dong L, et al. (2020) A high-capacity reversible data hiding scheme using dual-channel audio. IEEE Access 8:162271\u2013162278","journal-title":"IEEE Access"},{"key":"14735_CR32","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.image.2019.07.019","volume":"78","author":"H Zhang","year":"2019","unstructured":"Zhang H, Hu L (2019) A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Process Image Commun 78:331\u2013344","journal-title":"Signal Process Image Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14735-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14735-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14735-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T09:03:20Z","timestamp":1693472600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14735-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,6]]},"references-count":32,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["14735"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14735-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,6]]},"assertion":[{"value":"18 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We wish to confirm that there are no known conflicts of interest associated with this publication. We confirm that the manuscript has been read and approved by all named authors and that there are no other persons who satisfied the criteria for authorship but are not listed. We further confirm that the order of authors listed in the manuscript has been approved by all of us.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Competing interests"}}]}}