{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T11:41:09Z","timestamp":1765280469545,"version":"3.40.4"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03881-x","type":"journal-article","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:34:58Z","timestamp":1744900498000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Approach to Steganography Security: Embedding Encrypted Text in Color Images Using Langton\u2019s Ant Cellular Automaton and Hybrid Chaotic Map"],"prefix":"10.1007","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4872-9901","authenticated-orcid":false,"given":"Dipankar","family":"Dey","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2297-6576","authenticated-orcid":false,"given":"Dipak Kumar","family":"Jana","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Prajna","family":"Bhunia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"key":"3881_CR1","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1016\/j.procs.2023.01.072","volume":"218","author":"S John","year":"2023","unstructured":"John S, Kumar SN. 2D Lorentz chaotic model coupled with logistic chaotic model for medical image encryption: towards ensuring security for teleradiology. Procedia Comput Sci. 2023;218:918\u201326. https:\/\/doi.org\/10.1016\/j.procs.2023.01.072. (ISSN 1877-0509).","journal-title":"Procedia Comput Sci"},{"key":"3881_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.vlsi.2023.01.005","volume":"90","author":"J Luo","year":"2023","unstructured":"Luo J, Chen X. Transmission synchronization of multiple memristor chaotic circuits via single input controller and its application in secure communication. Integration. 2023;90:40\u201350. https:\/\/doi.org\/10.1016\/j.vlsi.2023.01.005. (ISSN 0167-9260).","journal-title":"Integration"},{"key":"3881_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2024.103835","volume":"85","author":"D Wang","year":"2024","unstructured":"Wang D, Yang G, Guo Z, Chen J. Improving image steganography security via ensemble steganalysis and adversarial perturbation minimization. J Inf Secur Appl. 2024;85: 103835. https:\/\/doi.org\/10.1016\/j.jisa.2024.103835. (ISSN 2214-2126).","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"3881_CR4","doi-asserted-by":"publisher","first-page":"4643","DOI":"10.32604\/cmc.2024.055195","volume":"80","author":"ZKJ Jasim","year":"2024","unstructured":"Jasim ZKJ, Kurnaz S. An improved image steganography security and capacity using ant colony algorithm optimization. Comput Mater Continua. 2024;80(3):4643\u201362. https:\/\/doi.org\/10.32604\/cmc.2024.055195. (ISSN 1546-2218).","journal-title":"Comput Mater Continua"},{"key":"3881_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2024.109546","volume":"223","author":"Y Peng","year":"2024","unstructured":"Peng Y, Fu C, Zheng Y, Tian Y, Cao G, Chen J. Medical steganography: enhanced security and image quality, and new S-Q assessment. Signal Process. 2024;223: 109546. https:\/\/doi.org\/10.1016\/j.sigpro.2024.109546. (ISSN 0165-1684).","journal-title":"Signal Process"},{"key":"3881_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103325","volume":"80","author":"C Qin","year":"2021","unstructured":"Qin C, Zhang W, Dong X, Zha H, Nenghai Y. Adversarial steganography based on sparse cover enhancement. J Visual Commun Image Represent. 2021;80: 103325. https:\/\/doi.org\/10.1016\/j.jvcir.2021.103325. (ISSN 1047\u20133203).","journal-title":"J Visual Commun Image Represent"},{"key":"3881_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.168956","volume":"259","author":"SM Basha","year":"2022","unstructured":"Basha SM, Mathivanan P, Ganesh AB. Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map. Optik. 2022;259: 168956. https:\/\/doi.org\/10.1016\/j.ijleo.2022.168956. (ISSN. 0030\u20134026).","journal-title":"Optik"},{"key":"3881_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170316","volume":"272","author":"S Benaissi","year":"2023","unstructured":"Benaissi S, Chikouche N, Rafik HA. novel image encryption algorithm based on hybrid chaotic maps using a key image. Optik. 2023;272: 170316. https:\/\/doi.org\/10.1016\/j.ijleo.2022.170316. (ISSN 0030\u20134026).","journal-title":"Optik"},{"key":"3881_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2022.112905","volume":"166","author":"H Lin","year":"2022","unstructured":"Lin H, Wang C, Sun J, Zhang X, Sun Y, Iu Herbert HC. Memristor-coupled asymmetric neural networks: Bionic modeling, chaotic dynamics analysis and encryption application. Chaos Solitons Fractals. 2022;166: 112905. https:\/\/doi.org\/10.1016\/j.chaos.2022.112905. (ISSN. 2023;0960\u20130779).","journal-title":"Chaos Solitons Fractals"},{"key":"3881_CR10","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.future.2023.03.035","volume":"145","author":"A Yang","year":"2023","unstructured":"Yang A, Bai Y, Xue T, Li Y, Li J. A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security. Future Gener Comput Syst. 2023;145:293\u2013302. https:\/\/doi.org\/10.1016\/j.future.2023.03.035. (ISSN 0167-739X).","journal-title":"Future Gener Comput Syst"},{"key":"3881_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2022.103758","volume":"131","author":"W Su","year":"2022","unstructured":"Su W, Ni J, Xianglei H, Huang F. Towards improving the security of image steganography via minimizing the spatial embedding impact. Digital Signal Process. 2022;131: 103758. https:\/\/doi.org\/10.1016\/j.dsp.2022.103758. (ISSN. 1051\u20132004).","journal-title":"Digital Signal Process"},{"key":"3881_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.119841","volume":"222","author":"A Mart\u00edn","year":"2023","unstructured":"Mart\u00edn A, Hern\u00e1ndez A, Alazab M, Jung J, Camacho D. Networks evolving generative adversarial, to improve image steganography. Expert Syst Appl. 2023;222: 119841. https:\/\/doi.org\/10.1016\/j.eswa.2023.119841. (ISSN 0957\u20134174).","journal-title":"Expert Syst Appl."},{"key":"3881_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108484","volume":"105","author":"V Sharma","year":"2023","unstructured":"Sharma V, Mir RN, Rout RK. Towards secured image steganography based on content-adaptive adversarial perturbation. Comput Electric Eng. 2023;105: 108484. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108484. (ISSN 0045\u20137906).","journal-title":"Comput Electric Eng"},{"key":"3881_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2022.103646","volume":"89","author":"M Chen","year":"2022","unstructured":"Chen M, He P, Liu J. HLTD-CSA: Cover selection algorithm based on hybrid local texture descriptor for color image steganography. J Visual Commun Image Represent. 2022;89: 103646. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103646. (ISSN 1047\u20133203).","journal-title":"J Visual Commun Image Represent"},{"key":"3881_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108711","volume":"201","author":"T Muralidharan","year":"2022","unstructured":"Muralidharan T, Cohen A, Cohen A, Nissim N. The infinite race between steganography and steganalysis in images. Signal Process. 2022;201: 108711. https:\/\/doi.org\/10.1016\/j.sigpro.2022.108711. (ISSN 0165\u20131684).","journal-title":"Signal Process"},{"issue":"8","key":"3881_CR16","doi-asserted-by":"publisher","first-page":"1852","DOI":"10.1016\/j.jss.2012.02.046","volume":"85","author":"X Wu","year":"2012","unstructured":"Wu X, Ou D, Liang Q. W Sun. A user-friendly secret image sharing scheme with reversible steganography based on cellular automata, J Syst Softw. 2012;85(8):1852\u201363. https:\/\/doi.org\/10.1016\/j.jss.2012.02.046. (ISSN 0164-1212).","journal-title":"A user-friendly secret image sharing scheme with reversible steganography based on cellular automata, J Syst Softw"},{"key":"3881_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.nancom.2017.11.001","volume":"15","author":"B Debnath","year":"2018","unstructured":"Debnath B, Das JC, De D. Design of image steganographic architecture using quantum-dot cellular automata for secure nano communication networks. Nano Commun Netw. 2018;15:41\u201358. https:\/\/doi.org\/10.1016\/j.nancom.2017.11.001. (ISSN 1878-7789).","journal-title":"Nano Commun Netw"},{"key":"3881_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106227","volume":"134","author":"H Ghanbari-Ghalehjoughi","year":"2020","unstructured":"Ghanbari-Ghalehjoughi H, Eslami M, Ahmadi-Kandjani S, Ghanbari-Ghalehjoughi M, Zeyun Y. Multiple layer encryption and steganography via multi-channel ghost imaging. Opt Laser Eng. 2020;134: 106227. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106227. (ISSN 0143\u20138166).","journal-title":"Opt Laser Eng"},{"key":"3881_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107920","volume":"181","author":"L Li","year":"2021","unstructured":"Li L, Zhang W, Qin C, Chen K, Zhou W, Nenghai Y. Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 2021;181: 107920. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107920. (ISSN 0165\u20131684).","journal-title":"Signal Process"},{"key":"3881_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100446","volume":"7","author":"M Kumar","year":"2024","unstructured":"Kumar M, Khaladkar VP. Secure communication using an adaptable multilevel RGB image encryption algorithm for wireless sensor networks. e-Prime - Adv Electric Engi Electron Energy. 2024;7: 100446. https:\/\/doi.org\/10.1016\/j.prime.2024.100446. (ISSN 2772\u20136711).","journal-title":"e-Prime - Adv Electric Engi Electron Energy"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03881-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03881-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03881-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:34:59Z","timestamp":1744900499000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03881-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,17]]},"references-count":20,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["3881"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03881-x","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,17]]},"assertion":[{"value":"5 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"For the publishing of this research, the authors have no Conflict of interest. No other journal has published this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"According to the authors, neither participant studies involving humans nor animals are included in this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This research paper maintains a commitment to authenticity and integrity. All experiments, analyses, and statistical evaluations are original and have been conducted using MATLAB 2014a. This rigorous methodological approach underscores the originality of our contributions to the field, demonstrating the reliability and validity of our results.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Authenticity and Integrity of Research"}}],"article-number":"402"}}