{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T03:54:18Z","timestamp":1762055658786,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T00:00:00Z","timestamp":1708387200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T00:00:00Z","timestamp":1708387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s12065-024-00907-w","type":"journal-article","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T04:35:38Z","timestamp":1708403738000},"page":"2617-2636","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A recent approach based on inspired crows behavior in steganography"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8489-259X","authenticated-orcid":false,"given":"Taha E.","family":"Rashad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2373-6307","authenticated-orcid":false,"given":"Soheir M.","family":"Khamis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8137-7939","authenticated-orcid":false,"given":"Hatem M.","family":"Bahig","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5550-3372","authenticated-orcid":false,"given":"Dieaa I.","family":"Nassr","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,20]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Abbas SA et al (2015) Optimized video steganography using Cuckoo Search algorithm. In: 2015 IEEE seventh international conference on intelligent computing and information systems (ICICIS). IEEE, pp\u00a0572\u2013577. https:\/\/doi.org\/10.1109\/IntelCIS.2015.7397279","key":"907_CR1","DOI":"10.1109\/IntelCIS.2015.7397279"},{"key":"907_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07830-0","author":"Abd-El-Atty Bassem","year":"2022","unstructured":"Bassem Abd-El-Atty (2022) A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-022-07830-0","journal-title":"Neural Comput Appl"},{"issue":"10","key":"907_CR3","doi-asserted-by":"publisher","first-page":"7461","DOI":"10.1166\/asl.2018.12959","volume":"24","author":"HS Alamri","year":"2018","unstructured":"Alamri HS, Alsariera YA, Zamli KZ (2018) Opposition-based whale optimization algorithm. Adv Sci Lett 24(10):7461\u20137464","journal-title":"Adv Sci Lett"},{"key":"907_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compstruc.2016.03.001","volume":"169","author":"A Askarzadeh","year":"2016","unstructured":"Askarzadeh A (2016) A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1\u201312. https:\/\/doi.org\/10.1016\/j.compstruc.2016.03.001","journal-title":"Comput Struct"},{"key":"907_CR5","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S et al (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76:18451\u201318472. https:\/\/doi.org\/10.1007\/s11042-016-3930-0","journal-title":"Multimed Tools Appl"},{"key":"907_CR6","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1007\/s11269-020-02488-6","volume":"34","author":"FB Banadkooki","year":"2020","unstructured":"Banadkooki FB et al (2020) Crow Algorithm for irrigation management: a case study. Water Resour Manag 34:1021\u20131045. https:\/\/doi.org\/10.1007\/s11269-020-02488-6","journal-title":"Water Resour Manag"},{"doi-asserted-by":"publisher","unstructured":"Bandyopadhyay D et al (2014) A framework of secured and bio-inspired image steganography using chaotic encryption with genetic algorithm optimization (CEGAO). In: Proceedings of the fifth international conference on innovations in bio-inspired computing and applications IBICA 2014, vol\u00a0303. Springer International Publishing, pp\u00a0271\u2013280. https:\/\/doi.org\/10.1007\/978-3-319-78597-4","key":"907_CR7","DOI":"10.1007\/978-3-319-78597-4"},{"key":"907_CR8","doi-asserted-by":"publisher","first-page":"27491","DOI":"10.1007\/s11042-018-5933-5","volume":"77","author":"A Banharnsakun","year":"2018","unstructured":"Banharnsakun A (2018) Artificial bee colony approach for enhancing LSB based image steganography. Multimed Tools Appl 77:27491\u201327504. https:\/\/doi.org\/10.1007\/s11042-018-5933-5","journal-title":"Multimed Tools Appl"},{"key":"907_CR9","doi-asserted-by":"publisher","first-page":"11957","DOI":"10.1007\/s00500-019-04640-w","volume":"24","author":"AK Bhullar","year":"2020","unstructured":"Bhullar AK, Kaur R, Sondhi S (2020) Enhanced crow search algorithm for AVR optimization. Soft Comput 24:11957\u201311987. https:\/\/doi.org\/10.1007\/s00500-019-04640-w","journal-title":"Soft Comput"},{"doi-asserted-by":"publisher","unstructured":"Blue J, Condell J, Lunney T (2017) Identity document authentication using steganographic techniques: the challenges of noise, pp 1\u20136. https:\/\/doi.org\/10.1109\/ISSC.2017.7983646","key":"907_CR10","DOI":"10.1109\/ISSC.2017.7983646"},{"doi-asserted-by":"publisher","unstructured":"Cheddad A et al (2010) Digital image steganography: survey and analysis of current methods. Signal Process pp\u00a0683\u2013686. https:\/\/doi.org\/10.1016\/j.sigpro.2009.08.010","key":"907_CR11","DOI":"10.1016\/j.sigpro.2009.08.010"},{"doi-asserted-by":"publisher","unstructured":"Eltahir ME et al (2009) High rate video streaming steganography. In: 2009 International conference on information management and engineering, pp\u00a0550\u2013553. https:\/\/doi.org\/10.1109\/ICIME.2009.13","key":"907_CR12","DOI":"10.1109\/ICIME.2009.13"},{"issue":"6","key":"907_CR13","doi-asserted-by":"publisher","first-page":"3258","DOI":"10.11591\/eei.v11i6.4337","volume":"11","author":"E Halboos","year":"2022","unstructured":"Halboos E, Albakry A (2022) Hiding text using the least significant bit technique to improve cover image in the steganography system. Bull Electr Eng Inform 11(6):3258\u20133271. https:\/\/doi.org\/10.11591\/eei.v11i6.4337","journal-title":"Bull Electr Eng Inform"},{"issue":"8","key":"907_CR14","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s00521-017-3251-x","volume":"29","author":"S Hinojosa","year":"2018","unstructured":"Hinojosa S et al (2018) Improving multi-criterion optimization with chaos: a novel multi-objective chaotic crow search algorithm. Neural Comput Appl 29(8):319\u2013335. https:\/\/doi.org\/10.1007\/s00521-017-3251-x","journal-title":"Neural Comput Appl"},{"doi-asserted-by":"publisher","unstructured":"Hsu C, Tu S (2010) Finding optimal LSB substitution using ant colony optimization algorithm. In: 2010 Second international conference on communication software and networks, pp\u00a0293\u2013297. https:\/\/doi.org\/10.1109\/ICCSN.2010.61","key":"907_CR15","DOI":"10.1109\/ICCSN.2010.61"},{"key":"907_CR16","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M et al (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46\u201366. https:\/\/doi.org\/10.1016\/j.image.2018.03.012","journal-title":"Signal Process Image Commun"},{"key":"907_CR17","doi-asserted-by":"publisher","first-page":"173548","DOI":"10.1109\/ACCESS.2020.3024108","volume":"8","author":"AG Hussien","year":"2020","unstructured":"Hussien AG et al (2020) Crow search algorithm: theory, recent advances, and applications. IEEE Access 8:173548\u2013173565. https:\/\/doi.org\/10.1109\/ACCESS.2020.3024108","journal-title":"IEEE Access"},{"issue":"2","key":"907_CR18","first-page":"142","volume":"2","author":"B Li","year":"2011","unstructured":"Li B et al (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimed Signal Process 2(2):142\u2013172","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"1\u20132","key":"907_CR19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1177\/1077546320923438","volume":"27","author":"X Lin","year":"2021","unstructured":"Lin X, Chen S, Lin W (2021) Modified crow search algorithm-based fuzzy control of adjacent buildings connected by magnetorheological dampers considering soil-structure interaction. J Vib Control 27(1\u20132):57\u201372. https:\/\/doi.org\/10.1177\/1077546320923438","journal-title":"J Vib Control"},{"key":"907_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.swevo.2017.09.010","volume":"39","author":"S Mahdavi","year":"2018","unstructured":"Mahdavi S, Rahnamayan S, Deb K (2018) Opposition based learning: a literature review. Swarm Evolut Comput 39:1\u201323. https:\/\/doi.org\/10.1016\/j.swevo.2017.09.010","journal-title":"Swarm Evolut Comput"},{"doi-asserted-by":"publisher","unstructured":"Nadiya PV, Imran BM (2013) Image steganography in DWT domain using double-stegging with RSA encryption. In: International conference on signal processing, image processing and pattern recognition 2013, ICSIPR 2013 1. https:\/\/doi.org\/10.1109\/ICSIPR.2013.6497941","key":"907_CR21","DOI":"10.1109\/ICSIPR.2013.6497941"},{"issue":"1","key":"907_CR22","doi-asserted-by":"publisher","first-page":"67","DOI":"10.6633\/IJNS.20210123(1).09","volume":"23","author":"DI Nassr","year":"2020","unstructured":"Nassr DI, Khamis SM (2020) Applying permutations and cuckoo search for obtaining a new steganography approach in spatial domain. Int J Netw Secur 23(1):67\u201376. https:\/\/doi.org\/10.6633\/IJNS.20210123(1).09","journal-title":"Int J Netw Secur"},{"key":"907_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113572","volume":"159","author":"S Ouadfel","year":"2020","unstructured":"Ouadfel S, Abd-Elaziz M (2020) Enhanced crow search algorithm for feature selection. Expert Syst Appl 159:113572. https:\/\/doi.org\/10.1016\/j.eswa.2020.113572","journal-title":"Expert Syst Appl"},{"doi-asserted-by":"publisher","unstructured":"Ramya G, Janarthanan PP, Mohanapriya D (2018) Steganography based data hiding for security applications. In: 2018 International conference on intelligent computing and communication for smart world (I2C2SW), pp 131\u2013135. https:\/\/doi.org\/10.1109\/I2C2SW45816.2018.8997153","key":"907_CR24","DOI":"10.1109\/I2C2SW45816.2018.8997153"},{"doi-asserted-by":"publisher","unstructured":"Saha A et al (2017) Crow search algorithm for solving optimal power flow problem. In: 2017 Second international conference on electrical, computer and communication technologies (ICECCT), pp 1\u20138. https:\/\/doi.org\/10.1109\/ICECCT.2017.8118028","key":"907_CR25","DOI":"10.1109\/ICECCT.2017.8118028"},{"issue":"21","key":"907_CR26","doi-asserted-by":"publisher","first-page":"30663","DOI":"10.1007\/s11042-022-13015-7","volume":"81","author":"AK Sahu","year":"2022","unstructured":"Sahu AK, Gutub A (2022) Improving grayscale steganography to protect personal information disclosure within hotel services. Multimed Tools Appl 81(21):30663\u201330683. https:\/\/doi.org\/10.1007\/s11042-022-13015-7","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"907_CR27","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1515\/comp-2020-0136","volume":"10","author":"AK Sahu","year":"2020","unstructured":"Sahu AK, Sahu M (2020) Digital image steganography and steganalysis: a journey of the past three decades. Open Comput Sci 10(1):296\u2013342. https:\/\/doi.org\/10.1515\/comp-2020-0136","journal-title":"Open Comput Sci"},{"issue":"Jan","key":"907_CR28","first-page":"5205","volume":"8","author":"AK Sahu","year":"2017","unstructured":"Sahu AK, Sahu M (2017) Digital image steganography techniques in spatial domain: a study. Int J Pharm Technol 8(Jan):5205\u20135217","journal-title":"Int J Pharm Technol"},{"issue":"4","key":"907_CR29","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1049\/cit2.12130","volume":"7","author":"M Sahu","year":"2022","unstructured":"Sahu M et al (2022) Local binary pattern-based reversible data hiding. CAAI Trans Intell Technol 7(4):695\u2013709. https:\/\/doi.org\/10.1049\/cit2.12130","journal-title":"CAAI Trans Intell Technol"},{"issue":"4","key":"907_CR30","doi-asserted-by":"publisher","first-page":"3189","DOI":"10.3233\/JIFS-169262","volume":"32","author":"R Sarkhel","year":"2017","unstructured":"Sarkhel R et al (2017) A novel harmony search algorithm embedded with metaheuristic opposition based learning. J Intell Fuzzy Syst 32(4):3189\u20133199. https:\/\/doi.org\/10.3233\/JIFS-169262","journal-title":"J Intell Fuzzy Syst"},{"doi-asserted-by":"crossref","unstructured":"Shan X, Liu K, Sun P (2016) Modified bat algorithm based on l\u00e9vy flight and opposition based learning. In: Scientific programming 2016","key":"907_CR31","DOI":"10.1155\/2016\/8031560"},{"key":"907_CR32","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.isatra.2019.09.004","volume":"99","author":"S Shekhawat","year":"2020","unstructured":"Shekhawat S, Saxena A (2020) Development and applications of an intelligent crow search algorithm based on opposition based learning. ISA Trans 99:210\u2013230. https:\/\/doi.org\/10.1016\/j.isatra.2019.09.004","journal-title":"ISA Trans"},{"key":"907_CR33","doi-asserted-by":"publisher","first-page":"166513","DOI":"10.1109\/ACCESS.2020.3023197","volume":"8","author":"S Solak","year":"2020","unstructured":"Solak S (2020) High embedding capacity data hiding technique based on EMSD and LSB substitution algorithms. IEEE Access 8:166513\u2013166524. https:\/\/doi.org\/10.1109\/ACCESS.2020.3023197","journal-title":"IEEE Access"},{"issue":"6","key":"907_CR34","doi-asserted-by":"publisher","first-page":"3489","DOI":"10.1016\/j.jksuci.2020.08.007","volume":"34","author":"M Suresh","year":"2020","unstructured":"Suresh M, Sam IS (2020) Optimized interesting region identification for video steganography using fractional grey wolf optimization along with multi-objective cost function. J King Saud Univ Comput Inf Sci 34(6):3489\u20133496. https:\/\/doi.org\/10.1016\/j.jksuci.2020.08.007","journal-title":"J King Saud Univ Comput Inf Sci"},{"doi-asserted-by":"publisher","unstructured":"Tzanetos A, Dounias G (2020) A comprehensive survey on the applications of swarm intelligence and bio-inspired evolutionary strategies. In: Tsihrintzis GA, Jain LC (eds) Machine learning paradigms: advances in deep learning-based technological applications. Springer, pp 337\u2013378. https:\/\/doi.org\/10.1007\/978-3-030-49724-8_15","key":"907_CR35","DOI":"10.1007\/978-3-030-49724-8_15"},{"key":"907_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105522","volume":"97","author":"P Upadhyay","year":"2020","unstructured":"Upadhyay P, Chhabra JK (2020) Kapur\u2019s entropy based optimal multilevel image segmentation using cow search algorithm. Appl Soft Comput 97:105522. https:\/\/doi.org\/10.1016\/j.asoc.2019.105522","journal-title":"Appl Soft Comput"},{"key":"907_CR37","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.neucom.2015.11.018","volume":"177","author":"G Wang","year":"2016","unstructured":"Wang G et al (2016) Opposition-based krill herd algorithm with Cauchy mutation and position clamping. Neurocomputing 177:147\u2013157. https:\/\/doi.org\/10.1016\/j.neucom.2015.11.018","journal-title":"Neurocomputing"},{"issue":"3","key":"907_CR38","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R Wang","year":"2001","unstructured":"Wang R, Lin C, Lin J (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit 34(3):671\u2013683. https:\/\/doi.org\/10.1016\/S0031-3203(00)00015-7","journal-title":"Pattern Recognit"},{"doi-asserted-by":"publisher","unstructured":"Yahya A (2019) Steganography techniques for digital images. Springer International Publishing AG, part of Springer Nature 2019, pp XVI, 122. https:\/\/doi.org\/10.1007\/978-3-319-78597-4","key":"907_CR39","DOI":"10.1007\/978-3-319-78597-4"},{"issue":"4","key":"907_CR40","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1016\/j.cnsns.2013.08.017","volume":"19","author":"D Yang","year":"2014","unstructured":"Yang D, Liu Z, Zhou J (2014) Chaos optimization algorithms based on chaotic maps with different probability distribution and search speed for global optimization. Commun Nonlinear Sci Numer Simul 19(4):1229\u20131246. https:\/\/doi.org\/10.1016\/j.cnsns.2013.08.017","journal-title":"Commun Nonlinear Sci Numer Simul"},{"doi-asserted-by":"publisher","unstructured":"Zolghadr-Asli B, Bozorg-Haddad O, Chu X (2018) Crow search algorithm (CSA). Studies in computational intelligence. In: Bozorg-Haddad O (ed) Advanced optimization by nature-inspired algorithms, vol 720, pp 143\u2013149. Springer. https:\/\/doi.org\/10.1007\/978-981-10-5221-7_14","key":"907_CR41","DOI":"10.1007\/978-981-10-5221-7_14"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-024-00907-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12065-024-00907-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-024-00907-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T05:30:59Z","timestamp":1720675859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12065-024-00907-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,20]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["907"],"URL":"https:\/\/doi.org\/10.1007\/s12065-024-00907-w","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"type":"print","value":"1864-5909"},{"type":"electronic","value":"1864-5917"}],"subject":[],"published":{"date-parts":[[2024,2,20]]},"assertion":[{"value":"4 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}