{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:21:17Z","timestamp":1757618477674,"version":"3.44.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T00:00:00Z","timestamp":1750896000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T00:00:00Z","timestamp":1750896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s11760-025-04253-x","type":"journal-article","created":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T10:35:02Z","timestamp":1750934102000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reversible data hiding in encrypted images using graph neural networks with thumbnail preserving encryption"],"prefix":"10.1007","volume":"19","author":[{"given":"S.","family":"Bharathidasan","sequence":"first","affiliation":[]},{"given":"V. Tamil","family":"Selvi","sequence":"additional","affiliation":[]},{"given":"V.","family":"Sathiya","sequence":"additional","affiliation":[]},{"given":"Francis H.","family":"Shajin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,26]]},"reference":[{"key":"4253_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.patrec.2021.11.025","volume":"153","author":"Y Sang","year":"2022","unstructured":"Sang, Y., Sang, J., Alam, M.S.: Image encryption based on logistic chaotic systems and deep autoencoder. Pattern Recogn. Lett. 153, 59\u201366 (2022)","journal-title":"Pattern Recogn. Lett."},{"key":"4253_CR2","doi-asserted-by":"publisher","first-page":"108102","DOI":"10.1016\/j.patcog.2021.108102","volume":"120","author":"X Bai","year":"2021","unstructured":"Bai, X., Wang, X., Liu, X., Liu, Q., Song, J., Sebe, N., Kim, B.: Explainable deep learning for efficient and robust pattern recognition: a survey of recent developments. Pattern Recogn. 120, 108102 (2021)","journal-title":"Pattern Recogn."},{"key":"4253_CR3","doi-asserted-by":"publisher","first-page":"110691","DOI":"10.1016\/j.patcog.2024.110691","volume":"155","author":"X Zeng","year":"2024","unstructured":"Zeng, X., Feng, B., Xia, Z., Peng, Z., Qin, T., Lu, W.: Robust image hiding network with frequency and spatial attentions. Pattern Recogn. 155, 110691 (2024)","journal-title":"Pattern Recogn."},{"key":"4253_CR4","doi-asserted-by":"publisher","first-page":"108886","DOI":"10.1016\/j.patcog.2022.108886","volume":"131","author":"X Dong","year":"2022","unstructured":"Dong, X., Cho, S., Kim, Y., Kim, S., Teoh, A.B.J.: Deep rank hashing network for cancellable face identification. Pattern Recogn. 131, 108886 (2022)","journal-title":"Pattern Recogn."},{"key":"4253_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, X., Fu, Z., Yang, J.: Multi-scale dynamic feature encoding network for image demoir\u00e9ing. In: 2019 IEEE\/CVF International Conference on Computer Vision Workshop (ICCVW), pp. 3486\u20133493. IEEE (2019)","DOI":"10.1109\/ICCVW.2019.00432"},{"key":"4253_CR6","doi-asserted-by":"publisher","first-page":"110193","DOI":"10.1016\/j.patcog.2023.110193","volume":"148","author":"Z Zhao","year":"2024","unstructured":"Zhao, Z., Liang, X., Huang, H., Wang, K.: Deep federated learning hybrid optimization model based on encrypted aligned data. Pattern Recogn. 148, 110193 (2024)","journal-title":"Pattern Recogn."},{"key":"4253_CR7","doi-asserted-by":"publisher","first-page":"107898","DOI":"10.1016\/j.patcog.2021.107898","volume":"115","author":"H Yang","year":"2021","unstructured":"Yang, H., Qi, S., Tian, J., Niu, P., Wang, X.: Robust and discriminative image representation: fractional-order Jacobi-Fourier moments. Pattern Recogn. 115, 107898 (2021)","journal-title":"Pattern Recogn."},{"key":"4253_CR8","doi-asserted-by":"publisher","first-page":"110222","DOI":"10.1016\/j.patcog.2023.110222","volume":"149","author":"L Dai","year":"2024","unstructured":"Dai, L., Liu, H., Song, P., Liu, M.: A gated cross-domain collaborative network for underwater object detection. Pattern Recogn. 149, 110222 (2024)","journal-title":"Pattern Recogn."},{"issue":"3","key":"4253_CR9","first-page":"750","volume":"11","author":"FH Shajin","year":"2023","unstructured":"Shajin, F.H., Salini, P., Rajesh, P., Nagoji Rao, V.K.: Efficient framework for brain tumour classification using hierarchical deep learning neural network classifier. Comput. Methods Biomech. Biomed. Eng.: Imaging Vis. 11(3), 750\u2013757 (2023)","journal-title":"Comput. Methods Biomech. Biomed. Eng.: Imaging Vis."},{"issue":"5","key":"4253_CR10","doi-asserted-by":"publisher","first-page":"4639","DOI":"10.1007\/s12652-022-04366-y","volume":"14","author":"MA Hameed","year":"2023","unstructured":"Hameed, M.A., Abdel-Aleem, O.A., Hassaballah, M.: A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J. Ambient. Intell. Humaniz. Comput. 14(5), 4639\u20134657 (2023)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"4253_CR11","unstructured":"Holmes, D.P.: Introduction to Digital Image Steganography (2002)"},{"key":"4253_CR12","doi-asserted-by":"crossref","unstructured":"Hassaballah, M., Hameed, M.A., Aly, S., AbdelRady, A.S.: A color image steganography method based on ADPVD and HOG techniques. In: Digital Media Steganography, pp. 17\u201340. Academic Press (2020)","DOI":"10.1016\/B978-0-12-819438-6.00010-4"},{"issue":"11","key":"4253_CR13","doi-asserted-by":"publisher","first-page":"7743","DOI":"10.1109\/TII.2021.3053595","volume":"17","author":"M Hassaballah","year":"2021","unstructured":"Hassaballah, M., Hameed, M.A., Awad, A.I., Muhammad, K.: A novel image steganography method for industrial internet of things security. IEEE Trans. Ind. Inf. 17(11), 7743\u20137751 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"4253_CR14","doi-asserted-by":"publisher","first-page":"185189","DOI":"10.1109\/ACCESS.2019.2960254","volume":"7","author":"MA Hameed","year":"2019","unstructured":"Hameed, M.A., Hassaballah, M., Aly, S., Awad, A.I.: An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access 7, 185189\u2013185204 (2019)","journal-title":"IEEE Access"},{"key":"4253_CR15","doi-asserted-by":"publisher","first-page":"14705","DOI":"10.1007\/s11042-017-5056-4","volume":"77","author":"M Abdel Hameed","year":"2018","unstructured":"Abdel Hameed, M., Aly, S., Hassaballah, M.: An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimed. Tools Appl. 77, 14705\u201314723 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"4253_CR16","doi-asserted-by":"crossref","unstructured":"Bekhet, S., Hassaballah, M., Kenk, M.A., Hameed, M.A.: An artificial intelligence based technique for COVID-19 diagnosis from chest X-ray. In: 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), pp. 191\u2013195. IEEE (2020)","DOI":"10.1109\/NILES50944.2020.9257930"},{"key":"4253_CR17","doi-asserted-by":"crossref","unstructured":"Kenk, M.A., Hassaballah, M., Hameed, M.A., Bekhet, S.: Visibility enhancer: adaptable for distorted traffic scenes by dusty weather. In: 2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES), pp. 213\u2013218. IEEE (2020, October)","DOI":"10.1109\/NILES50944.2020.9257952"},{"key":"4253_CR18","unstructured":"Hassaballah, M., Aly, S., Abdel Rady, A.S.: A high payload steganography method based on pixel value differencing (2018)"},{"issue":"3","key":"4253_CR19","doi-asserted-by":"publisher","first-page":"2651","DOI":"10.32604\/csse.2023.031720","volume":"46","author":"AM Hafiz","year":"2023","unstructured":"Hafiz, A.M., Hassaballah, M., Alqahtani, A., Alsubai, S., Hameed, M.A.: Reinforcement learning with an ensemble of binary action deep q-networks. Comput. Syst. Sci. Eng. 46(3), 2651 (2023)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"2","key":"4253_CR20","first-page":"1","volume":"4","author":"M Abdel Hameed","year":"2024","unstructured":"Abdel Hameed, M.: Scrambled encryption approach for color images based on 9-d chaotic systems with 3-d substitution bit levels. Aswan Univ. J. Sci. Technol. 4(2), 1\u201318 (2024)","journal-title":"Aswan Univ. J. Sci. Technol."},{"key":"4253_CR21","doi-asserted-by":"crossref","unstructured":"Hameed, M.A., Hassaballah, M., Bekhet, S., Narmatha, C., Kenk, M.A.: A high quality secure medical image steganography method. In: 2023 3rd International Conference on Computing and Information Technology (ICCIT), pp. 465\u2013470. IEEE (2023, September)","DOI":"10.1109\/ICCIT58132.2023.10273950"},{"key":"4253_CR22","doi-asserted-by":"crossref","unstructured":"Das, S., Biswas, P., Kar, N., Sahu, A.K.: Implementation and analysis of digital watermarking techniques for multimedia authentication. In: Securing the Digital World, pp. 18\u201335. CRC Press (2025)","DOI":"10.1201\/9781032663647-2"},{"key":"4253_CR23","doi-asserted-by":"crossref","unstructured":"Ogundokun, R.O., Abikoye, O.C., Ogundepo, E.A., Babatunde, A.N., Abdulahi, A.R.T., Sahu, A.K.: Secured textual medical information using a modified LSB image steganography technique. In: Securing the Digital World, pp. 82\u2013101. CRC Press (2025)","DOI":"10.1201\/9781032663647-5"},{"issue":"1","key":"4253_CR24","first-page":"1034","volume":"18","author":"N Rijati","year":"2025","unstructured":"Rijati, N., Ghosal, S.K., Sahu, A.K., Sambas, A., Ignatius Moses Setiadi, D.R.: DWT-DCT image watermarking with quantum-inspired optimization. Int. J. Intell. Eng. Syst. 18(1), 1034 (2025)","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"4253_CR25","doi-asserted-by":"publisher","first-page":"100679","DOI":"10.1016\/j.cosrev.2024.100679","volume":"54","author":"S Dhar","year":"2024","unstructured":"Dhar, S., Sahu, A.K.: Digital to quantum watermarking: a journey from past to present and into the future. Comput. Sci. Rev. 54, 100679 (2024)","journal-title":"Comput. Sci. Rev."},{"key":"4253_CR26","doi-asserted-by":"publisher","first-page":"124903","DOI":"10.1016\/j.eswa.2024.124903","volume":"256","author":"P Kong","year":"2024","unstructured":"Kong, P., Zhang, Y., Huang, L., Zhou, L., Chen, L., Qin, C.: Neural network-based reversible data hiding for medical image. Expert Syst. Appl. 256, 124903 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"35","key":"4253_CR27","doi-asserted-by":"publisher","first-page":"83113","DOI":"10.1007\/s11042-024-18600-6","volume":"83","author":"H Shi","year":"2024","unstructured":"Shi, H., Zhou, Z., Qin, J., Sun, H., Ren, Y.: A separable privacy-preserving technique based on reversible medical data hiding in plaintext encrypted images using neural network. Multimed. Tools Appl. 83(35), 83113\u201383138 (2024)","journal-title":"Multimed. Tools Appl."},{"key":"4253_CR28","doi-asserted-by":"publisher","first-page":"123270","DOI":"10.1016\/j.eswa.2024.123270","volume":"246","author":"P Ping","year":"2024","unstructured":"Ping, P., Huo, J., Guo, B.: Novel asymmetric CNN-based and adaptive mean predictors for reversible data hiding in encrypted images. Expert Syst. Appl. 246, 123270 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"4253_CR29","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1109\/TCSVT.2023.3298803","volume":"34","author":"Z Hua","year":"2023","unstructured":"Hua, Z., Liu, X., Zheng, Y., Yi, S., Zhang, Y.: Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing. IEEE Trans. Circuits Syst. Video Technol. 34(3), 1799\u20131814 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"4253_CR30","doi-asserted-by":"publisher","first-page":"106209","DOI":"10.1016\/j.bspc.2024.106209","volume":"93","author":"L Qu","year":"2024","unstructured":"Qu, L., Li, M., Chen, P.: Reversible data hiding in encrypted image with secure multi-party for telemedicine applications. Biomed. Signal Process. Control 93, 106209 (2024)","journal-title":"Biomed. Signal Process. Control"},{"key":"4253_CR31","doi-asserted-by":"publisher","first-page":"103870","DOI":"10.1016\/j.dsp.2022.103870","volume":"133","author":"G Gao","year":"2023","unstructured":"Gao, G., Zhang, L., Lin, Y., Tong, S., Yuan, C.: High-performance reversible data hiding in encrypted images with adaptive Huffman code. Digital Signal Process. 133, 103870 (2023)","journal-title":"Digital Signal Process."},{"key":"4253_CR32","doi-asserted-by":"publisher","first-page":"109299","DOI":"10.1016\/j.sigpro.2023.109299","volume":"216","author":"Z Fu","year":"2024","unstructured":"Fu, Z., Chai, X., Tang, Z., He, X., Gan, Z., Cao, G.: Adaptive embedding combining LBE and IBBE for high-capacity reversible data hiding in encrypted images. Signal Process. 216, 109299 (2024)","journal-title":"Signal Process."},{"key":"4253_CR33","unstructured":"https:\/\/www.kaggle.com\/datasets\/jeffaudi\/coco-2014-dataset-for-yolov3"},{"issue":"10","key":"4253_CR34","doi-asserted-by":"publisher","first-page":"101815","DOI":"10.1016\/j.jksuci.2023.101815","volume":"35","author":"D Xie","year":"2023","unstructured":"Xie, D., Zhang, Y., Hu, Z., Chen, F., Wang, T.: ESTPE: an efficient and stable thumbnail-preserving encryption scheme. J. King Saud Univ. \u2013Comput. Inf. Sci. 35(10), 101815 (2023)","journal-title":"J. King Saud Univ. \u2013Comput. Inf. Sci."},{"key":"4253_CR35","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ins.2023.03.057","volume":"633","author":"M Zou","year":"2023","unstructured":"Zou, M., Gan, Z., Cao, R., Guan, C., Leng, S.: Similarity-navigated graph neural networks for node classification. Inf. Sci. 633, 41\u201369 (2023)","journal-title":"Inf. Sci."},{"issue":"1","key":"4253_CR36","doi-asserted-by":"publisher","first-page":"101914","DOI":"10.1016\/j.jksuci.2024.101914","volume":"36","author":"L Qu","year":"2024","unstructured":"Qu, L., Li, M., Sun, Y., Su, S., Liu, Y., Zhang, L.: Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer. J. King Saud Univ. \u2013Comput. Inf. Sci. 36(1), 101914 (2024)","journal-title":"J. King Saud Univ. \u2013Comput. Inf. Sci."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04253-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-04253-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04253-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T22:43:19Z","timestamp":1757198599000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-04253-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,26]]},"references-count":36,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["4253"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-04253-x","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,6,26]]},"assertion":[{"value":"30 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"802"}}