{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:45:04Z","timestamp":1771703104468,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s12652-022-04366-y","type":"journal-article","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T08:03:30Z","timestamp":1663920210000},"page":"4639-4657","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques"],"prefix":"10.1007","volume":"14","author":[{"given":"Mohamed Abdel","family":"Hameed","sequence":"first","affiliation":[]},{"given":"Omar A.","family":"Abdel-Aleem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5655-8511","authenticated-orcid":false,"given":"M.","family":"Hassaballah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,23]]},"reference":[{"key":"4366_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11045-021-00793-w","volume":"33","author":"A Almawgani","year":"2022","unstructured":"Almawgani A, Alhawari AR, Hindi AT, Al-Arashi WH, Al-Ashwal A (2022) Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data. Multidimensional Syst Signal Process 33:1\u201318","journal-title":"Multidimensional Syst Signal Process"},{"key":"4366_CR2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.ins.2012.01.010","volume":"193","author":"R Amirtharajan","year":"2012","unstructured":"Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115\u2013124","journal-title":"Inf Sci"},{"issue":"5","key":"4366_CR3","doi-asserted-by":"crossref","first-page":"1889","DOI":"10.1007\/s12652-019-01345-8","volume":"11","author":"Z Bao","year":"2021","unstructured":"Bao Z, Guo Y, Li X, Zhang Y, Xu M, Luo X (2021) A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J Ambient Intell Humaniz Comput 11(5):1889\u20131901","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"4366_CR4","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1016\/j.compeleceng.2012.12.021","volume":"39","author":"P Bedi","year":"2013","unstructured":"Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39(2):640\u2013654","journal-title":"Comput Electr Eng"},{"key":"4366_CR5","unstructured":"Boehm B (2014) StegExpose\u2014a tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656"},{"issue":"3","key":"4366_CR6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"C-K Chan","year":"2004","unstructured":"Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469\u2013474","journal-title":"Pattern Recogn"},{"issue":"7","key":"4366_CR8","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1016\/S0031-3203(02)00289-3","volume":"36","author":"C-C Chang","year":"2003","unstructured":"Chang C-C, Hsiao J-Y, Chan C-S (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583\u20131595","journal-title":"Pattern Recogn"},{"issue":"6","key":"4366_CR7","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1016\/j.patcog.2005.12.011","volume":"39","author":"C-C Chang","year":"2006","unstructured":"Chang C-C, Chan C-S, Fan Y-H (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155\u20131167","journal-title":"Pattern Recogn"},{"key":"4366_CR9","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/B978-0-12-819438-6.00022-0","volume-title":"Digital media steganography: principles, algorithms, and advances","author":"M Chaumont","year":"2020","unstructured":"Chaumont M (2020) Deep learning in steganography and steganalysis. Digital media steganography: principles, algorithms, and advances. Elsevier, Amsterdam, pp 321\u2013349"},{"key":"4366_CR10","doi-asserted-by":"crossref","unstructured":"Cogranne R, Giboulot Q, Bas P (2019) The ALASKA steganalysis challenge: a first step towards steganalysis. In: ACM workshop on information hiding and multimedia security, pp 125\u2013137","DOI":"10.1145\/3335203.3335726"},{"key":"4366_CR11","doi-asserted-by":"crossref","first-page":"87563","DOI":"10.1109\/ACCESS.2021.3089357","volume":"9","author":"S Dhawan","year":"2021","unstructured":"Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana AK, Pani SK (2021) SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IOT. IEEE Access 9:87563\u201387578","journal-title":"IEEE Access"},{"key":"4366_CR12","doi-asserted-by":"crossref","unstructured":"Dumitrescu S, Wu X, Memon N (2002a) On steganalysis of random LSB embedding in continuous-tone images. In: International conference on image processing, vol\u00a03. IEEE, pp 641\u2013644","DOI":"10.1109\/ICIP.2002.1039052"},{"key":"4366_CR13","doi-asserted-by":"crossref","unstructured":"Dumitrescu S, Wu X, Wang Z (2002b) Detection of LSB steganography via sample pair analysis. In: International workshop on information hiding. Springer, pp 355\u2013372","DOI":"10.1007\/3-540-36415-3_23"},{"key":"4366_CR14","doi-asserted-by":"crossref","unstructured":"Elharrouss O, Almaadeed N, Al-Maadeed S (2020) An image steganography approach based on k-least significant bits (k-LSB). In: IEEE international conference on informatics, IoT, and enabling technologies. IEEE, pp 131\u2013135","DOI":"10.1109\/ICIoT48696.2020.9089566"},{"issue":"4","key":"4366_CR15","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/93.959097","volume":"8","author":"J Fridrich","year":"2001","unstructured":"Fridrich J, Goljan M, Du R (2001\u00e0) Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4):22\u201328","journal-title":"IEEE Multimedia"},{"key":"4366_CR16","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Du R (2001b) Reliable detection of LSB steganography in color and grayscale images. New challenges. In: Workshop on multimedia and security, pp 27\u201330","DOI":"10.1145\/1232454.1232466"},{"issue":"12","key":"4366_CR17","doi-asserted-by":"crossref","first-page":"14705","DOI":"10.1007\/s11042-017-5056-4","volume":"77","author":"MA Hameed","year":"2018","unstructured":"Hameed MA, Aly S, Hassaballah M (2018) An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimedia Tools Appl 77(12):14705\u201314723","journal-title":"Multimedia Tools Appl"},{"key":"4366_CR18","doi-asserted-by":"crossref","first-page":"185189","DOI":"10.1109\/ACCESS.2019.2960254","volume":"7","author":"MA Hameed","year":"2019","unstructured":"Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access 7:185189\u2013185204","journal-title":"IEEE Access"},{"key":"4366_CR19","volume-title":"Digital media steganography: principles, algorithms, and advances","author":"M Hassaballah","year":"2020","unstructured":"Hassaballah M (2020) Digital media steganography: principles, algorithms, and advances. Academic Press"},{"issue":"11","key":"4366_CR20","doi-asserted-by":"crossref","first-page":"7743","DOI":"10.1109\/TII.2021.3053595","volume":"17","author":"M Hassaballah","year":"2021","unstructured":"Hassaballah M, Hameed MA, Awad AI, Muhammad K (2021) A novel image steganography method for industrial internet of things security. IEEE Trans Ind Inf 17(11):7743\u20137751","journal-title":"IEEE Trans Ind Inf"},{"key":"4366_CR21","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","volume":"97","author":"AA Heidari","year":"2019","unstructured":"Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: Algorithm and applications. Futur Gener Comput Syst 97:849\u2013872","journal-title":"Futur Gener Comput Syst"},{"key":"4366_CR22","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1007\/s12652-021-03675-y","volume":"13","author":"KM Hosny","year":"2022","unstructured":"Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Humaniz Comput 13:973\u2013988","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4366_CR23","doi-asserted-by":"crossref","unstructured":"Hsu C-S, Tu,S-F (2010) Finding optimal LSB substitution using ant colony optimization algorithm. In: 2nd International conference on communication software and networks. IEEE, pp 293\u2013297","DOI":"10.1109\/ICCSN.2010.61"},{"key":"4366_CR24","doi-asserted-by":"crossref","first-page":"4544","DOI":"10.1109\/TIFS.2021.3109464","volume":"16","author":"X Hu","year":"2021","unstructured":"Hu X, Ni J, Zhang W, Huang J (2021) Efficient JPEG batch steganography using intrinsic energy of image contents. IEEE Trans Inf Forensics Secur 16:4544\u20134558","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4366_CR25","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46\u201366","journal-title":"Signal Process Image Commun"},{"key":"4366_CR26","doi-asserted-by":"crossref","unstructured":"Jaradat A, Taqieddin E, Mowafi M (2021) 2021. A high-capacity image steganography method using chaotic particle swarm optimization. Security and Communication Networks","DOI":"10.1155\/2021\/6679284"},{"key":"4366_CR27","doi-asserted-by":"crossref","unstructured":"Jegou H, Douze M, Schmid C (2008a) Hamming embedding and weak geometric consistency for large scale image search. In: European conference on computer vision. Springer, pp 304\u2013317","DOI":"10.1007\/978-3-540-88682-2_24"},{"key":"4366_CR28","unstructured":"Jegou H, Douze M, Schmid C (2008b) Inria holidays dataset. Available http:\/\/lear.inrialpes.fr\/people\/jegou\/data.php"},{"key":"4366_CR29","doi-asserted-by":"crossref","first-page":"7235","DOI":"10.1007\/s12652-020-02398-w","volume":"12","author":"V Kalaichelvi","year":"2021","unstructured":"Kalaichelvi V, Meenakshi P, Devi PV, Manikandan H, Venkateswari P, Swaminathan S (2021) A stable image steganography: a novel approach based on modified RSA algorithm and 2\u20134 least significant bit (LSB) technique. J Ambient Intell Humaniz Comput 12:7235\u20137243","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"29","key":"4366_CR30","doi-asserted-by":"crossref","first-page":"21155","DOI":"10.1007\/s11042-020-08925-3","volume":"79","author":"S Kang","year":"2020","unstructured":"Kang S, Park H, Park J-I (2020) Combining LSB embedding with modified Octa-PVD embedding. Multimedia Tools Appl 79(29):21155\u201321175","journal-title":"Multimedia Tools Appl"},{"key":"4366_CR31","first-page":"217","volume":"40","author":"K Karampidis","year":"2018","unstructured":"Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. J Inf Secur Appl 40:217\u2013235","journal-title":"J Inf Secur Appl"},{"key":"4366_CR32","doi-asserted-by":"crossref","first-page":"5835","DOI":"10.1007\/s12652-020-02126-4","volume":"12","author":"P Karthika","year":"2021","unstructured":"Karthika P, Vidhya Saraswathi P (2021) IoT using machine learning security enhancement in video steganography allocation for raspberry pi. J Ambient Intell Humaniz Comput 12:5835\u20135844","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"4366_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11045-020-00725-0","volume":"32","author":"R Kaur","year":"2021","unstructured":"Kaur R, Singh B (2021) A hybrid algorithm for robust image steganography. Multidimension Syst Signal Process 32(1):1\u201323","journal-title":"Multidimension Syst Signal Process"},{"issue":"6","key":"4366_CR34","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1109\/LSP.2005.847889","volume":"12","author":"AD Ker","year":"2005","unstructured":"Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441\u2013444","journal-title":"IEEE Signal Process Lett"},{"key":"4366_CR35","volume":"190","author":"F Li","year":"2022","unstructured":"Li F, Yu Z, Qin C (2022) GAN-based spatial image steganography with cross feedback mechanism. Signal Process 190:108341","journal-title":"Signal Process"},{"issue":"1","key":"4366_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jvcir.2010.08.007","volume":"22","author":"X Liao","year":"2011","unstructured":"Liao X, Wen Q-Y, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1\u20138","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"4366_CR37","first-page":"1","volume":"21","author":"Z Lv","year":"2021","unstructured":"Lv Z, Qiao L, Kumar Singh A, Wang Q (2021) AI-empowered IoT security for smart cities. ACM Trans Internet Technol 21(4):1\u201321","journal-title":"ACM Trans Internet Technol"},{"key":"4366_CR38","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2021.107255","volume":"93","author":"DK Mahto","year":"2021","unstructured":"Mahto DK, Singh A (2021) A survey of color image watermarking: state-of-the-art and research directions. Comput Electr Eng 93:107255","journal-title":"Comput Electr Eng"},{"key":"4366_CR39","doi-asserted-by":"crossref","unstructured":"Mishra M, Kumar S, Mishra S (2012) Security enhanced digital image steganography based on successive arnold transformation. In: Advances in computer science, engineering & applications. Springer, pp 221\u2013229","DOI":"10.1007\/978-3-642-30111-7_21"},{"key":"4366_CR40","volume":"92","author":"PK Muhuri","year":"2020","unstructured":"Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:106257","journal-title":"Appl Soft Comput"},{"issue":"3s","key":"4366_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3392665","volume":"16","author":"S Namasudra","year":"2021","unstructured":"Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2021) Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Trans Multimed Comput Commun Appl 16(3s):1\u201319","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"14","key":"4366_CR42","doi-asserted-by":"crossref","first-page":"8319","DOI":"10.1007\/s11042-015-2752-9","volume":"75","author":"TD Nguyen","year":"2016","unstructured":"Nguyen TD, Arch-Int S, Arch-Int N (2016) An adaptive multi bit-plane image steganography using block data-hiding. Multimedia Tools Appl 75(14):8319\u20138345","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"4366_CR43","doi-asserted-by":"crossref","first-page":"246","DOI":"10.3390\/e24020246","volume":"24","author":"P Pan","year":"2022","unstructured":"Pan P, Wu Z, Yang C, Zhao B (2022) Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage. Entropy 24(2):246\u2013267","journal-title":"Entropy"},{"key":"4366_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/1804953","volume":"2018","author":"A Pradhan","year":"2018","unstructured":"Pradhan A, Sekhar KR, Swain G (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng 2018:1\u201312","journal-title":"Math Probl Eng"},{"key":"4366_CR45","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.ins.2014.02.007","volume":"277","author":"K Qazanfari","year":"2014","unstructured":"Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90\u2013101","journal-title":"Inf Sci"},{"key":"4366_CR46","doi-asserted-by":"crossref","unstructured":"Qin X, Li B, Tan S, Tang W, Huang J (2022) Gradually enhanced adversarial perturbations on color pixel vectors for image steganography. IEEE Trans Circuits Syst Video Technol","DOI":"10.1109\/TCSVT.2022.3148406"},{"issue":"4","key":"4366_CR47","first-page":"593","volume":"19","author":"S Rajendran","year":"2017","unstructured":"Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using lsb technique. Int J Netw Secur 19(4):593\u2013598","journal-title":"Int J Netw Secur"},{"issue":"2","key":"4366_CR48","first-page":"1","volume":"3","author":"S Roy","year":"2022","unstructured":"Roy S, Islam M et al (2022) A hybrid secured approach combining LSB steganography and AES using mosaic images for ensuring data security. SN Comput Sci 3(2):1\u201312","journal-title":"SN Comput Sci"},{"issue":"1","key":"4366_CR49","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11220-019-0262-y","volume":"21","author":"AK Sahu","year":"2020","unstructured":"Sahu AK, Swain G (2020) Reversible image steganography using dual-layer LSB matching. Sens Imag 21(1):1\u201321","journal-title":"Sens Imag"},{"key":"4366_CR50","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.asoc.2015.01.032","volume":"30","author":"S Sajasi","year":"2015","unstructured":"Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375\u2013389","journal-title":"Appl Soft Comput"},{"key":"4366_CR51","doi-asserted-by":"crossref","unstructured":"Sajay K, Babu SS, Vijayalakshmi Y (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Humaniz Comput 1\u201310","DOI":"10.1007\/s12652-019-01403-1"},{"issue":"2","key":"4366_CR52","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s10710-020-09396-z","volume":"22","author":"N Sharma","year":"2021","unstructured":"Sharma N, Batra U (2021) An enhanced Huffman-pso based image optimization algorithm for image steganography. Genet Program Evolvable Mach 22(2):189\u2013205","journal-title":"Genet Program Evolvable Mach"},{"issue":"2","key":"4366_CR53","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/TIP.2005.859378","volume":"15","author":"HR Sheikh","year":"2006","unstructured":"Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430\u2013444","journal-title":"IEEE Trans Image Process"},{"key":"4366_CR54","doi-asserted-by":"crossref","DOI":"10.1201\/9781315121109","volume-title":"Digital watermarking and steganography: fundamentals and techniques","author":"FY Shih","year":"2017","unstructured":"Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press"},{"issue":"3s","key":"4366_CR55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3382772","volume":"16","author":"A Singh","year":"2021","unstructured":"Singh A (2021) Data hiding: current trends, innovation and potential challenges. ACM Trans Multimed Comput Commun Appl 16(3s):1\u201316","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"4","key":"4366_CR58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00138-021-01227-0","volume":"32","author":"O Singh","year":"2021","unstructured":"Singh O, Singh A (2021) A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD. Mach Vis Appl 32(4):1\u201313","journal-title":"Mach Vis Appl"},{"issue":"23","key":"4366_CR57","doi-asserted-by":"crossref","first-page":"15901","DOI":"10.1007\/s11042-018-6407-5","volume":"79","author":"L Singh","year":"2020","unstructured":"Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimedia Tools Appl 79(23):15901\u201315921","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"4366_CR56","volume":"32","author":"AK Singh","year":"2021","unstructured":"Singh AK, Liu X, Wang H, Ko H (2021) Recent advances in multimedia security and information hiding. Trans Emerg Telecommun Technol 32(2):e4193","journal-title":"Trans Emerg Telecommun Technol"},{"key":"4366_CR59","doi-asserted-by":"crossref","unstructured":"Sonar R, Swain G (2022) A hybrid steganography technique based on RR, AQVD, and QVC. Glob Perspect Inf Secur J 1\u201320","DOI":"10.1080\/19393555.2021.1912219"},{"key":"4366_CR60","doi-asserted-by":"crossref","first-page":"23409","DOI":"10.1109\/ACCESS.2021.3053998","volume":"9","author":"N Subramanian","year":"2021","unstructured":"Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: a review of the recent advances. IEEE Access 9:23409\u201323423","journal-title":"IEEE Access"},{"issue":"00","key":"4366_CR61","first-page":"1","volume":"00","author":"P Wenwen","year":"2022","unstructured":"Wenwen P, Yin Y, Wang X, Jing Y, Song M (2022) Seek-and-hide: adversarial steganography via deep reinforcement learning. IEEE Trans Pattern Anal Machine Intell 00(00):1\u201315","journal-title":"IEEE Trans Pattern Anal Machine Intell"},{"key":"4366_CR62","doi-asserted-by":"crossref","unstructured":"Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: International workshop on information hiding. Springer, pp 61\u201376","DOI":"10.1007\/10719724_5"},{"issue":"4","key":"4366_CR63","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1093\/comjnl\/17.4.324","volume":"17","author":"M Wilkes","year":"1974","unstructured":"Wilkes M (1974) The art of computer programming, volume 3, sorting and searching. Comput J 17(4):324\u2013324","journal-title":"Comput J"},{"issue":"9","key":"4366_CR64","first-page":"1613","volume":"24","author":"D-C Wu","year":"2003","unstructured":"Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613\u20131626","journal-title":"Pattern Recogn Lett"},{"key":"4366_CR65","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/TIFS.2020.3013204","volume":"16","author":"W You","year":"2020","unstructured":"You W, Zhang H, Zhao X (2020) A siamese CNN for image steganalysis. IEEE Trans Inf Forensics Secur 16:291\u2013306","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4366_CR66","doi-asserted-by":"crossref","unstructured":"Zeng K, Chen K, Zhang W, Wang Y, Yu N (2022) Improving robust adaptive steganography via minimizing channel errors. Signal Process 108498","DOI":"10.1016\/j.sigpro.2022.108498"},{"issue":"3","key":"4366_CR67","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.patrec.2003.10.014","volume":"25","author":"X Zhang","year":"2004","unstructured":"Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331\u2013339","journal-title":"Pattern Recogn Lett"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04366-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-022-04366-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04366-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T13:29:34Z","timestamp":1728048574000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-022-04366-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":67,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["4366"],"URL":"https:\/\/doi.org\/10.1007\/s12652-022-04366-y","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"18 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}