{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T17:58:37Z","timestamp":1774893517778,"version":"3.50.1"},"reference-count":175,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T00:00:00Z","timestamp":1774828800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T00:00:00Z","timestamp":1774828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-026-04908-7","type":"journal-article","created":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T15:29:10Z","timestamp":1774884550000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Advances in Steganography Systems for Image and Audio Data: A Survey on Techniques, Limitations, and Future Prospects"],"prefix":"10.1007","volume":"7","author":[{"given":"Zeba","family":"Shamsi","sequence":"first","affiliation":[]},{"given":"Lilapati","family":"Waikhom","sequence":"additional","affiliation":[]},{"given":"Ripon","family":"Patgiri","sequence":"additional","affiliation":[]},{"given":"Dolendro Singh","family":"Laiphrakpam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,30]]},"reference":[{"issue":"3","key":"4908_CR1","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: survey and analysis of current methods. Signal Process. 2010;90(3):727\u201352.","journal-title":"Signal Process"},{"key":"4908_CR2","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B. Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing. 2019;335:299\u2013326.","journal-title":"Neurocomputing"},{"issue":"2","key":"4908_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.1998.4655281","volume":"31","author":"NF Johnson","year":"1998","unstructured":"Johnson NF, Jajodia S. Exploring steganography: seeing the unseen. Computer. 1998;31(2):26\u201334. https:\/\/doi.org\/10.1109\/MC.1998.4655281.","journal-title":"Computer"},{"key":"4908_CR4","first-page":"1","volume":"29","author":"SGR Ekodeck","year":"2016","unstructured":"Ekodeck SGR, Ndoundam R. Pdf steganography based on chinese remainder theorem. J Inf Secur Appl. 2016;29:1\u201315.","journal-title":"J Inf Secur Appl"},{"key":"4908_CR5","doi-asserted-by":"publisher","unstructured":"Introduction and historical background. In: Hassan NA, Hijazi R (eds.) Data Hiding Techniques in Windows OS, pp. 1\u201322. Syngress, Boston 2017. https:\/\/doi.org\/10.1016\/B978-0-12-804449-0.00001-4","DOI":"10.1016\/B978-0-12-804449-0.00001-4"},{"key":"4908_CR6","volume":"85","author":"A Dwaik","year":"2024","unstructured":"Dwaik A, Belkhouche Y. Enhancing the performance of convolutional neural network image-based steganalysis in spatial domain using spatial rich model and 2d gabor filters. J Inf Secur Appl. 2024;85:103864.","journal-title":"J Inf Secur Appl"},{"key":"4908_CR7","doi-asserted-by":"crossref","unstructured":"Kalaiarasi G, Sudharani B, Jonnalagadda SC, Battula HV, Sanagala B. A comprehensive survey of image steganography. In: 2024 2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS), IEEE; 2024. pp. 1225\u20131230.","DOI":"10.1109\/ICSCSS60660.2024.10625295"},{"key":"4908_CR8","doi-asserted-by":"publisher","first-page":"166589","DOI":"10.1109\/ACCESS.2020.3022779","volume":"8","author":"O Evsutin","year":"2020","unstructured":"Evsutin O, Melman A, Meshcheryakov R. Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access. 2020;8:166589\u2013611.","journal-title":"IEEE Access"},{"key":"4908_CR9","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.matpr.2021.04.583","volume":"51","author":"DK Sharma","year":"2022","unstructured":"Sharma DK, Singh NC, Noola DA, Doss AN, Sivakumar J. A review on various cryptographic techniques & algorithms. Mater Today Proc. 2022;51:104\u20139.","journal-title":"Mater Today Proc"},{"key":"4908_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101754","volume":"109","author":"Certificateless public key encryption with cryptographic reverse firewalls","year":"2020","unstructured":"Certificateless public key encryption with cryptographic reverse firewalls. J Syst Arch. 2020;109:101754. https:\/\/doi.org\/10.1016\/j.sysarc.2020.101754.","journal-title":"J Syst Arch"},{"key":"4908_CR11","doi-asserted-by":"publisher","unstructured":"Content based double encryption algorithm using symmetric key cryptography. Procedia Comput Sci. 2015;57:1228\u20131234. https:\/\/doi.org\/10.1016\/j.procs.2015.07.420. 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015)","DOI":"10.1016\/j.procs.2015.07.420"},{"key":"4908_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116523","volume":"100","author":"O Evsutin","year":"2022","unstructured":"Evsutin O, Dzhanashia K. Watermarking schemes for digital images: robustness overview. Signal Process Image Commun. 2022;100:116523.","journal-title":"Signal Process Image Commun"},{"key":"4908_CR13","doi-asserted-by":"crossref","unstructured":"Hu K, Wang M, Ma X, Chen J, Wang X, Wang X. Learning-based image steganography and watermarking: a survey. Expert Syst Appl, 2024;123715","DOI":"10.1016\/j.eswa.2024.123715"},{"key":"4908_CR14","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","volume":"27","author":"AF Qasim","year":"2018","unstructured":"Qasim AF, Meziane F, Aspin R. Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev. 2018;27:45\u201360.","journal-title":"Comput Sci Rev"},{"key":"4908_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.168958","volume":"259","author":"F Horasan","year":"2022","unstructured":"Horasan F. A novel image watermarking scheme using ulv decomposition. Optik. 2022;259:168958.","journal-title":"Optik"},{"key":"4908_CR16","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.sigpro.2019.05.035","volume":"164","author":"H Zheng","year":"2019","unstructured":"Zheng H, Wang C, Wang J, Xiang S. A new reversible watermarking scheme using the content-adaptive block size for prediction. Signal Process. 2019;164:74\u201383.","journal-title":"Signal Process"},{"issue":"11","key":"4908_CR17","first-page":"4537","volume":"14","author":"H-H Liu","year":"2020","unstructured":"Liu H-H, Su P-C, Hsu M-H. An improved steganography method based on least-significant-bit substitution and pixel-value differencing. KSII Trans Int Info Syst (TIIS). 2020;14(11):4537\u201356.","journal-title":"KSII Trans Int Info Syst (TIIS)"},{"key":"4908_CR18","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.ins.2021.11.086","volume":"586","author":"Y Xue","year":"2022","unstructured":"Xue Y, Kong L, Peng W, Zhong P, Wen J. An effective linguistic steganalysis framework based on hierarchical mutual learning. Inf Sci. 2022;586:140\u201354.","journal-title":"Inf Sci"},{"key":"4908_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2024.109499","volume":"185","author":"BK Pandey","year":"2025","unstructured":"Pandey BK, Pandey D. Securing healthcare medical image information using advance morphological component analysis, information hiding systems, and hybrid convolutional neural networks on iomt. Comput Biol Med. 2025;185:109499.","journal-title":"Comput Biol Med"},{"key":"4908_CR20","doi-asserted-by":"publisher","first-page":"60575","DOI":"10.1109\/ACCESS.2020.2983175","volume":"8","author":"J Liu","year":"2020","unstructured":"Liu J, Ke Y, Zhang Z, Lei Y, Li J, Zhang M, et al. Recent advances of image steganography with generative adversarial networks. IEEE Access. 2020;8:60575\u201397.","journal-title":"IEEE Access"},{"issue":"1","key":"4908_CR21","first-page":"30","volume":"9","author":"AZ Al-Othmani","year":"2012","unstructured":"Al-Othmani AZ, Manaf AA, Zeki AM. A survey on steganography techniques in real time audio signals and evaluation. Int J Comput Sci Issue (IJCSI). 2012;9(1):30.","journal-title":"Int J Comput Sci Issue (IJCSI)"},{"key":"4908_CR22","doi-asserted-by":"publisher","first-page":"23409","DOI":"10.1109\/ACCESS.2021.3053998","volume":"9","author":"N Subramanian","year":"2021","unstructured":"Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. Image steganography: a review of the recent advances. IEEE Access. 2021;9:23409\u201323. https:\/\/doi.org\/10.1109\/ACCESS.2021.3053998.","journal-title":"IEEE Access"},{"key":"4908_CR23","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1016\/j.ins.2022.07.120","volume":"609","author":"PC Mandal","year":"2022","unstructured":"Mandal PC, Mukherjee I, Paul G, Chatterji B. Digital image steganography: a literature survey. Inf Sci. 2022;609:1451\u201388.","journal-title":"Inf Sci"},{"issue":"3","key":"4908_CR24","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1002\/spy2.281","volume":"6","author":"A Kumar","year":"2023","unstructured":"Kumar A, Rani R, Singh S. A survey of recent advances in image steganography. Security and Privacy. 2023;6(3):281.","journal-title":"Security and Privacy"},{"issue":"2","key":"4908_CR25","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1007\/s11042-023-15806-y","volume":"83","author":"P Aberna","year":"2024","unstructured":"Aberna P. Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multim Tools Appl. 2024;83(2):5531\u201391.","journal-title":"Multim Tools Appl"},{"key":"4908_CR26","volume":"78","author":"R Kumar","year":"2023","unstructured":"Kumar R, Sharma D, Dua A, Jung K-H. A review of different prediction methods for reversible data hiding. J Info Security Appl. 2023;78:103572.","journal-title":"J Info Security Appl"},{"key":"4908_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108908","volume":"206","author":"S Rustad","year":"2023","unstructured":"Rustad S, Andono PN, Shidik GF, et al. Digital image steganography survey and investigation (goal, assessment, method, development, and dataset). Signal Process. 2023;206:108908.","journal-title":"Signal Process"},{"issue":"1","key":"4908_CR28","doi-asserted-by":"publisher","first-page":"22054","DOI":"10.1038\/s41598-024-70940-3","volume":"14","author":"MA Nasr","year":"2024","unstructured":"Nasr MA, El-Shafai W, El-Rabaie E-SM, El-Fishawy AS, El-Hoseny HM, Abd\u00a0El-Samie FE, et al. A robust audio steganography technique based on image encryption using different chaotic maps. Sci Rep. 2024;14(1):22054.","journal-title":"Sci Rep"},{"key":"4908_CR29","doi-asserted-by":"publisher","first-page":"103565","DOI":"10.1109\/ACCESS.2024.3434576","volume":"12","author":"J He","year":"2024","unstructured":"He J, Zhu P, Liu Z, Cao Y. A novel digital audio encryption and forensics watermarking scheme. IEEE Access. 2024;12:103565\u201382.","journal-title":"IEEE Access"},{"key":"4908_CR30","unstructured":"Kumar M, Kumar S, Nagar H. Comparative analysis of different steganography technique for image or data security. Int J Adv Sci Tech (IJAST) 2020;29(4)."},{"key":"4908_CR31","unstructured":"Zhang KA, Cuesta-Infante A, Xu L, Veeramachaneni K. Steganogan: high capacity image steganography with gans. arXiv preprint arXiv:1901.03892 2019."},{"key":"4908_CR32","unstructured":"Sharma N, Gupta D. Using phase coding method for audio steganography with the stream cipher encrypt technique. Int J Comput Appl 2019."},{"key":"4908_CR33","unstructured":"Chen Y, et al. Multilayer reversible information hiding with prediction-error expansion and dynamic threshold analysis. Signal Processing: Image Communication 2022."},{"key":"4908_CR34","unstructured":"Alghamdi S, et al. Double layer security using crypto-stego techniques. Multim Tools Appl 2023."},{"key":"4908_CR35","unstructured":"Hussain M, et al. A new multimedia cryptosystem using chaos, quaternion theory and modular arithmetic. Multimedia Systems 2024."},{"issue":"6","key":"4908_CR36","doi-asserted-by":"publisher","first-page":"8423","DOI":"10.1007\/s11042-020-10035-z","volume":"80","author":"DRIM Setiadi","year":"2021","unstructured":"Setiadi DRIM. Psnr vs ssim: imperceptibility quality assessment for image steganography. Multim Tools Appl. 2021;80(6):8423\u201344.","journal-title":"Multim Tools Appl"},{"key":"4908_CR37","doi-asserted-by":"publisher","first-page":"9597","DOI":"10.1007\/s11042-020-09980-6","volume":"80","author":"S-T Chen","year":"2021","unstructured":"Chen S-T, Huang T-W, Yang C-T. High-snr steganography for digital audio signal in the wavelet domain. Multim Tools Appl. 2021;80:9597\u2013614.","journal-title":"Multim Tools Appl"},{"key":"4908_CR38","doi-asserted-by":"crossref","unstructured":"Setiadi DRIM. Improved payload capacity in lsb image steganography uses dilated hybrid edge detection 2022.","DOI":"10.1016\/j.jksuci.2019.12.007"},{"key":"4908_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108668","volume":"200","author":"M Liu","year":"2022","unstructured":"Liu M, Fan H, Wei K, Luo W, Lu W. Adversarial robust image steganography against lossy jpeg compression. Signal Process. 2022;200:108668.","journal-title":"Signal Process"},{"key":"4908_CR40","doi-asserted-by":"crossref","unstructured":"Wayner P. Disappearing cryptography: information hiding: steganography and watermarking. Morgan Kaufmann, 2009.","DOI":"10.1016\/B978-012374479-1.50006-X"},{"key":"4908_CR41","unstructured":"Provos N, Honeyman P. Detecting steganographic content on the internet. Technical report, Center for Information Technology Integration 2001."},{"key":"4908_CR42","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.procs.2016.03.042","volume":"79","author":"S Sabnis","year":"2016","unstructured":"Sabnis S, Awale R. Statistical steganalysis of high capacity image steganography with cryptography. Procedia Comput Sci. 2016;79:321\u20137.","journal-title":"Procedia Comput Sci"},{"key":"4908_CR43","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1016\/j.procs.2020.04.123","volume":"171","author":"M Ramalingam","year":"2020","unstructured":"Ramalingam M, Isa NAM, Puviarasi R. A secured data hiding using affine transformation in video steganography. Procedia Comput Sci. 2020;171:1147\u201356.","journal-title":"Procedia Comput Sci"},{"key":"4908_CR44","doi-asserted-by":"crossref","unstructured":"Erfurt J, Helmrich CR, Bosse S, Schwarz H, Marpe D, Wiegand T. A study of the perceptually weighted peak signal-to-noise ratio (wpsnr) for image compression. In: 2019 IEEE International Conference on Image Processing (ICIP), IEEE; 2019. pp. 2339\u20132343.","DOI":"10.1109\/ICIP.2019.8803307"},{"issue":"3","key":"4908_CR45","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/97.995823","volume":"9","author":"Z Wang","year":"2002","unstructured":"Wang Z, Bovik AC. A universal image quality index. IEEE Signal Process Lett. 2002;9(3):81\u20134.","journal-title":"IEEE Signal Process Lett"},{"issue":"2","key":"4908_CR46","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TIP.2005.859378","volume":"15","author":"HR Sheikh","year":"2006","unstructured":"Sheikh HR, Bovik AC. Image information and visual quality. IEEE Trans Image Process. 2006;15(2):430\u201344.","journal-title":"IEEE Trans Image Process"},{"key":"4908_CR47","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H. Image steganography in spatial domain: a survey. Signal Process Image Commun. 2018;65:46\u201366.","journal-title":"Signal Process Image Commun"},{"issue":"11","key":"4908_CR48","first-page":"137","volume":"2","author":"R Kumar","year":"2012","unstructured":"Kumar R, Rattan M. Analysis of various quality metrics for medical image processing. Int J Adv Res Comput Sci Soft Eng. 2012;2(11):137\u201344.","journal-title":"Int J Adv Res Comput Sci Soft Eng"},{"key":"4908_CR49","doi-asserted-by":"publisher","unstructured":"Bas P, Filler T, Pevn\u00fd T. Break our steganographic system - the ins and outs of organizing boss. In: Information Hiding, Berlin: Springer; 2011. pp. 59\u201370. https:\/\/doi.org\/10.1007\/978-3-642-24178-9_5","DOI":"10.1007\/978-3-642-24178-9_5"},{"issue":"10","key":"4908_CR50","doi-asserted-by":"publisher","first-page":"2525","DOI":"10.1109\/TIFS.2019.2906372","volume":"14","author":"R Cogranne","year":"2019","unstructured":"Cogranne R, Verdoliva L. Alaska: image dataset for steganalysis benchmarking. IEEE Trans Inf Forensics Secur. 2019;14(10):2525\u201330. https:\/\/doi.org\/10.1109\/TIFS.2019.2906372.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4908_CR51","unstructured":"Break Our Watermarking System 2 (BOWS-2). http:\/\/bows2.gipsa-lab.inpg.fr\/. Accessed 01 May 2025"},{"key":"4908_CR52","unstructured":"Weber I. The USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database\/. Accessed 01 May 2025. 1997."},{"key":"4908_CR53","unstructured":"Garofolo JS, et al. TIMIT Acoustic-Phonetic Continuous Speech Corpus. https:\/\/catalog.ldc.upenn.edu\/LDC93S1. Linguistic Data Consortium, Accessed 01 May 2025. 1993."},{"issue":"3","key":"4908_CR54","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/0167-6393(93)90095-3","volume":"12","author":"A Varga","year":"1993","unstructured":"Varga A, Steeneken HJM. Assessment for automatic speech recognition: Ii. noisex-92: a database and an experiment to study the effect of additive noise on speech recognition systems. Speech Commun. 1993;12(3):247\u201351. https:\/\/doi.org\/10.1016\/0167-6393(93)90095-3.","journal-title":"Speech Commun"},{"key":"4908_CR55","unstructured":"BBC Sound Effects Library. https:\/\/sound-effects.bbcrewind.co.uk. Accessed 01 May 2025."},{"key":"4908_CR56","doi-asserted-by":"crossref","unstructured":"Westfeld A, Pfitzmann A. Attacks on steganographic systems: breaking the steganographic utilities ezstego, jsteg, steganos, and s-tools-and some lessons learned. In: International Workshop on Information Hiding, Berlin: Springer; 1999. pp. 61\u201376.","DOI":"10.1007\/10719724_5"},{"issue":"2\u20133","key":"4908_CR57","first-page":"276","volume":"10","author":"DC Kar","year":"2018","unstructured":"Kar DC, Nakka AM, Katangur AK. A new statistical attack resilient steganography scheme for hiding messages in audio files. Int J Inf Comput Secur. 2018;10(2\u20133):276\u2013302.","journal-title":"Int J Inf Comput Secur"},{"issue":"8","key":"4908_CR58","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/35.940053","volume":"39","author":"S Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun Mag. 2001;39(8):118\u201326.","journal-title":"IEEE Commun Mag"},{"issue":"8","key":"4908_CR59","doi-asserted-by":"publisher","first-page":"10981","DOI":"10.1007\/s11042-022-12109-6","volume":"81","author":"H Du","year":"2022","unstructured":"Du H, Liu J, Tian Y, Luo X. Steganographic key recovery for adaptive steganography under \u201cknown-message attacks\u2019\u2019. Multim Tools Appl. 2022;81(8):10981\u20131004.","journal-title":"Multim Tools Appl"},{"key":"4908_CR60","doi-asserted-by":"crossref","unstructured":"Sharp A, Qi Q, Yang Y, Peng D, Sharif H. A novel active warden steganographic attack for next-generation steganography. In: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE; 2013. pp. 1138\u20131143.","DOI":"10.1109\/IWCMC.2013.6583717"},{"key":"4908_CR61","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107809","volume":"99","author":"V Sabeti","year":"2022","unstructured":"Sabeti V, Sobhani M, Hasheminejad SMH. An adaptive image steganography method based on integer wavelet transform using genetic algorithm. Comput Electr Eng. 2022;99:107809.","journal-title":"Comput Electr Eng"},{"issue":"2","key":"4908_CR62","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/s40815-017-0420-0","volume":"20","author":"C Vanmathi","year":"2018","unstructured":"Vanmathi C, Prabu S. Image steganography using fuzzy logic and chaotic for large payload and high imperceptibility. Int J Fuzzy Syst. 2018;20(2):460\u201373.","journal-title":"Int J Fuzzy Syst"},{"issue":"4","key":"4908_CR63","doi-asserted-by":"publisher","first-page":"5191","DOI":"10.1007\/s11042-021-11741-y","volume":"81","author":"HT Elshoush","year":"2022","unstructured":"Elshoush HT, Mahmoud MM, Altigani A. A new high capacity and secure image realization steganography based on ascii code matching. Multim Tools Appl. 2022;81(4):5191\u2013237.","journal-title":"Multim Tools Appl"},{"issue":"2","key":"4908_CR64","first-page":"142","volume":"2","author":"B Li","year":"2011","unstructured":"Li B, He J, Huang J, Shi YQ. A survey on image steganography and steganalysis. J Inf Hiding Multim Signal Process. 2011;2(2):142\u201372.","journal-title":"J Inf Hiding Multim Signal Process"},{"key":"4908_CR65","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-018-5720-3","volume":"77","author":"N Mukherjee","year":"2018","unstructured":"Mukherjee N, Paul G, Saha SK. An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multim Tools Appl. 2018;77:18451\u201381.","journal-title":"Multim Tools Appl"},{"key":"4908_CR66","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116556","volume":"101","author":"H-W Tseng","year":"2022","unstructured":"Tseng H-W, Leng H-S. A reversible modified least significant bit (lsb) matching revisited method. Signal Process Image Commun. 2022;101:116556. https:\/\/doi.org\/10.1016\/j.image.2021.116556.","journal-title":"Signal Process Image Commun"},{"key":"4908_CR67","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1016\/j.procs.2016.07.245","volume":"93","author":"R Bhardwaj","year":"2016","unstructured":"Bhardwaj R, Sharma V. Image steganography based on complemented message and inverted bit lsb substitution. Procedia Comput Sci. 2016;93:832\u20138.","journal-title":"Procedia Comput Sci"},{"issue":"6","key":"4908_CR68","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1016\/j.jksuci.2020.12.017","volume":"34","author":"S Rustad","year":"2021","unstructured":"Rustad S, Syukur A, Andono PN, et al. Inverted lsb image steganography using adaptive pattern to improve imperceptibility. J King Saud University-Comput Info Sci. 2021;34(6):3559\u201368.","journal-title":"J King Saud University-Comput Info Sci"},{"issue":"6","key":"4908_CR69","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1007\/s11042-013-1832-y","volume":"74","author":"K-H Jung","year":"2015","unstructured":"Jung K-H, Yoo K-Y. Steganographic method based on interpolation and lsb substitution of digital images. Multim Tools Appl. 2015;74(6):2143\u201355.","journal-title":"Multim Tools Appl"},{"issue":"3","key":"4908_CR70","first-page":"782","volume":"24","author":"PD Shah","year":"2021","unstructured":"Shah PD, Bichkar RS. Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure. Eng Sci Tech Int J. 2021;24(3):782\u201394.","journal-title":"Eng Sci Tech Int J"},{"key":"4908_CR71","volume":"48","author":"A Malik","year":"2019","unstructured":"Malik A, Wang H, Chen T, Yang T, Khan AN, Wu H, et al. Reversible data hiding in homomorphically encrypted image using interpolation technique. J Info Secur Appl. 2019;48:102374.","journal-title":"J Info Secur Appl"},{"key":"4908_CR72","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.jvcir.2016.05.008","volume":"39","author":"Y Liu","year":"2016","unstructured":"Liu Y, Qu X, Xin G. A roi-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Represent. 2016;39:51\u20137.","journal-title":"J Vis Commun Image Represent"},{"key":"4908_CR73","doi-asserted-by":"publisher","DOI":"10.1016\/j.mehy.2020.109691","volume":"139","author":"S Karakus","year":"2020","unstructured":"Karakus S, Avci E. A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses. 2020;139:109691.","journal-title":"Med Hypotheses"},{"issue":"6","key":"4908_CR74","doi-asserted-by":"publisher","first-page":"2951","DOI":"10.1016\/j.jksuci.2019.04.008","volume":"34","author":"ZS Younus","year":"2019","unstructured":"Younus ZS, Hussain MK. Image steganography using exploiting modification direction for compressed encrypted data. J King Saud University-Comput Info Sci. 2019;34(6):2951\u201363.","journal-title":"J King Saud University-Comput Info Sci"},{"issue":"11","key":"4908_CR75","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett. 2006;10(11):781\u20133.","journal-title":"IEEE Commun Lett"},{"key":"4908_CR76","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/LSP.2008.924000","volume":"15","author":"B Li","year":"2008","unstructured":"Li B, Fang Y, Huang J. Steganalysis of multiple-base notational system steganography. IEEE Signal Process Lett. 2008;15:493\u20136.","journal-title":"IEEE Signal Process Lett"},{"key":"4908_CR77","doi-asserted-by":"crossref","unstructured":"Afrakhteh M, Ibrahim S. Adaptive steganography scheme using more surrounding pixels. In: 2010 International Conference On Computer Design and Applications, 2010;1:1\u2013225. IEEE","DOI":"10.1109\/ICCDA.2010.5541442"},{"issue":"1","key":"4908_CR78","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2011","unstructured":"Hong W, Chen T-S. A novel data embedding method using adaptive pixel pair matching. IEEE Trans Inf Forensics Secur. 2011;7(1):176\u201384.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4908_CR79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/658047","volume":"2009","author":"R-M Chao","year":"2009","unstructured":"Chao R-M, Wu H-C, Lee C-C, Chu Y-P. A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur. 2009;2009:1\u20139.","journal-title":"EURASIP J Inf Secur"},{"issue":"4","key":"4908_CR80","doi-asserted-by":"publisher","first-page":"4677","DOI":"10.1007\/s11042-017-4899-z","volume":"77","author":"W Hong","year":"2018","unstructured":"Hong W, Chen M, Chen TS, Huang C-C. An efficient authentication method for ambtc compressed images using adaptive pixel pair matching. Multim Tools Appl. 2018;77(4):4677\u201395.","journal-title":"Multim Tools Appl"},{"key":"4908_CR81","doi-asserted-by":"publisher","unstructured":"Hassaballah M, Hameed MA, Alkinani MH. Introduction to digital image steganography. In: Hassaballah M (ed.) Digital Media Steganography, New York: Academic Press; 2020. pp. 1\u201315. https:\/\/doi.org\/10.1016\/B978-0-12-819438-6.00009-8","DOI":"10.1016\/B978-0-12-819438-6.00009-8"},{"issue":"5","key":"4908_CR82","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1093\/comjnl\/bxaa017","volume":"64","author":"R Vk","year":"2021","unstructured":"Vk R, Rs VK. Pixel prediction-based image steganography by support vector neural network. Comput J. 2021;64(5):731\u201348.","journal-title":"Comput J"},{"key":"4908_CR83","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH. Current status and key issues in image steganography: a survey. Comput Sci Rev. 2014;13:95\u2013113.","journal-title":"Comput Sci Rev"},{"issue":"7","key":"4908_CR84","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","volume":"23","author":"C Qin","year":"2012","unstructured":"Qin C, Chang C-C, Huang Y-H, Liao L-T. An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol. 2012;23(7):1109\u201318.","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4908_CR85","doi-asserted-by":"publisher","first-page":"1505133","DOI":"10.1155\/2022\/1505133","volume":"2022","author":"G Peter","year":"2022","unstructured":"Peter G, Sherine A, Teekaraman Y, Kuppusamy R, Radhakrishnan A. Histogram shifting-based quick response steganography method for secure communication. Wirel Commun Mob Comput. 2022;2022:1505133.","journal-title":"Wirel Commun Mob Comput"},{"issue":"2","key":"4908_CR86","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1080\/09720502.2020.1731949","volume":"23","author":"N Ayub","year":"2020","unstructured":"Ayub N, Selwal A. An improved image steganography technique using edge based data hiding in dct domain. J Interdiscip Math. 2020;23(2):357\u201366.","journal-title":"J Interdiscip Math"},{"key":"4908_CR87","doi-asserted-by":"publisher","unstructured":"Robust coverless steganography using limited mapping images. J King Saud University - Comput Info Sci 2022. https:\/\/doi.org\/10.1016\/j.jksuci.2022.05.012","DOI":"10.1016\/j.jksuci.2022.05.012"},{"issue":"1","key":"4908_CR88","first-page":"56","volume":"2","author":"AA-A Gutub","year":"2010","unstructured":"Gutub AA-A, et al. Pixel indicator technique for rgb image steganography. J Emerg Technol Web Intell. 2010;2(1):56\u201364.","journal-title":"J Emerg Technol Web Intell"},{"key":"4908_CR89","doi-asserted-by":"crossref","unstructured":"Roy R, Changder S, Sarkar A, Debnath NC. Evaluating image steganography techniques: Future research challenges. In: 2013 International Conference on Computing, Management and Telecommunications (ComManTel), IEEE; 2013. pp. 309\u2013314.","DOI":"10.1109\/ComManTel.2013.6482411"},{"key":"4908_CR90","unstructured":"Muhammad K, Ahmad J, Rehman NU, Jan Z, Qureshi RJ. A secure cyclic steganographic technique for color images using randomization. arXiv preprint arXiv:1502.07808 2015."},{"issue":"1","key":"4908_CR91","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-019-0262-y","volume":"21","author":"AK Sahu","year":"2020","unstructured":"Sahu AK, Swain G. Reversible image steganography using dual-layer lsb matching. Sens and Imaging. 2020;21(1):1\u201321.","journal-title":"Sens and Imaging"},{"issue":"15","key":"4908_CR92","doi-asserted-by":"publisher","first-page":"23393","DOI":"10.1007\/s11042-020-10224-w","volume":"80","author":"A AbdelRaouf","year":"2021","unstructured":"AbdelRaouf A. A new data hiding approach for image steganography based on visual color sensitivity. Multim Tools Appl. 2021;80(15):23393\u2013417.","journal-title":"Multim Tools Appl"},{"issue":"4","key":"4908_CR93","doi-asserted-by":"publisher","first-page":"5325","DOI":"10.1007\/s11042-021-11605-5","volume":"81","author":"PC Mandal","year":"2022","unstructured":"Mandal PC, Mukherjee I. High capacity data hiding based on multi-directional pixel value differencing and decreased difference expansion. Multim Tools Appl. 2022;81(4):5325\u201347.","journal-title":"Multim Tools Appl"},{"key":"4908_CR94","volume":"58","author":"AK Sahu","year":"2021","unstructured":"Sahu AK, Swain G, Sahu M, Hemalatha J. Multi-directional block based pvd and modulus function image steganography to avoid fobp and iep. J Info Secur Appl. 2021;58:102808.","journal-title":"J Info Secur Appl"},{"issue":"29","key":"4908_CR95","doi-asserted-by":"publisher","first-page":"20973","DOI":"10.1007\/s11042-020-08951-1","volume":"79","author":"S Saha","year":"2020","unstructured":"Saha S, Chakraborty A, Chatterjee A, Dhargupta S, Ghosal SK, Sarkar R. Extended exploiting modification direction based steganography using hashed-weightage array. Multim Tools Appl. 2020;79(29):20973\u201393.","journal-title":"Multim Tools Appl"},{"key":"4908_CR96","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1109\/ACCESS.2021.3136883","volume":"10","author":"H-S Leng","year":"2021","unstructured":"Leng H-S, Tsai C-J, Wu T-J. A multilayer steganographic method using improved exploiting modification directions scheme. IEEE Access. 2021;10:468\u201385.","journal-title":"IEEE Access"},{"key":"4908_CR97","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.ins.2016.03.045","volume":"358","author":"W-S Chen","year":"2016","unstructured":"Chen W-S, Liao Y-K, Lin Y-T, Wang C-M. A novel general multiple-base data embedding algorithm. Inf Sci. 2016;358:164\u201390.","journal-title":"Inf Sci"},{"issue":"3","key":"4908_CR98","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.image.2014.01.003","volume":"29","author":"J Chen","year":"2014","unstructured":"Chen J. A pvd-based data hiding method with histogram preserving using pixel pair matching. Signal Process Image Commun. 2014;29(3):375\u201384.","journal-title":"Signal Process Image Commun"},{"issue":"33","key":"4908_CR99","doi-asserted-by":"publisher","first-page":"24329","DOI":"10.1007\/s11042-019-08402-6","volume":"79","author":"X-Z Xie","year":"2020","unstructured":"Xie X-Z, Chang C-C, Hu Y-C. An adaptive reversible data hiding scheme based on prediction error histogram shifting by exploiting signed-digit representation. Multim Tools Appl. 2020;79(33):24329\u201346.","journal-title":"Multim Tools Appl"},{"issue":"2","key":"4908_CR100","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"Sun S. A novel edge based image steganography with 2k correction and huffman encoding. Inf Process Lett. 2016;116(2):93\u20139.","journal-title":"Inf Process Lett"},{"issue":"13","key":"4908_CR101","doi-asserted-by":"publisher","first-page":"17875","DOI":"10.1007\/s11042-022-12643-3","volume":"81","author":"OY Abdulhammed","year":"2022","unstructured":"Abdulhammed OY. A novel approach of steganography by using strong edge detection and chaos theory. Multim Tools Appl. 2022;81(13):17875\u201388.","journal-title":"Multim Tools Appl"},{"key":"4908_CR102","doi-asserted-by":"crossref","unstructured":"Mahimah P, Kurinji R. Zigzag pixel indicator based secret data hiding method. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, IEEE; 2013. pp. 1\u20135.","DOI":"10.1109\/ICCIC.2013.6724286"},{"key":"4908_CR103","doi-asserted-by":"publisher","first-page":"14867","DOI":"10.1007\/s11042-015-2671-9","volume":"75","author":"K Muhammad","year":"2016","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW. A novel magic lsb substitution method (m-lsb-sm) using multi-level encryption and achromatic component of an image. Multim Tools Appl. 2016;75:14867\u201393.","journal-title":"Multim Tools Appl"},{"key":"4908_CR104","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10462-016-9459-9","volume":"46","author":"\u015e Do\u011fan","year":"2016","unstructured":"Do\u011fan \u015e. A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev. 2016;46:129\u201343.","journal-title":"Artif Intell Rev"},{"key":"4908_CR105","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1016\/j.asoc.2015.08.057","volume":"37","author":"NN El-Emam","year":"2015","unstructured":"El-Emam NN, Al-Diabat M. A novel algorithm for colour image steganography using a new intelligent technique based on three phases. Appl Soft Comput. 2015;37:830\u201346.","journal-title":"Appl Soft Comput"},{"key":"4908_CR106","doi-asserted-by":"crossref","unstructured":"Soni A, Jain J, Roshan R. Image steganography using discrete fractional fourier transform. In: 2013 International Conference on Intelligent Systems and Signal Processing (ISSP), IEEE; 2013. pp. 97\u2013100 .","DOI":"10.1109\/ISSP.2013.6526882"},{"key":"4908_CR107","doi-asserted-by":"publisher","unstructured":"Chapter two - the discrete fourier transform reprinted from advances in electronics and electron physics, supplement 10, 1978. In: H\u00fftch M, Hawkes PW (eds.) Computer Techniques for Image Processing in Electron Microscopy. Advances in Imaging and Electron Physics, Amsterdam: Elsevier; 2020. vol. 214, pp. 37\u201348. https:\/\/doi.org\/10.1016\/bs.aiep.2020.04.002","DOI":"10.1016\/bs.aiep.2020.04.002"},{"issue":"1","key":"4908_CR108","first-page":"40","volume":"196","author":"W-Y Chen","year":"2008","unstructured":"Chen W-Y. Color image steganography scheme using dft, spiht codec, and modified differential phase-shift keying techniques. Appl Math Comput. 2008;196(1):40\u201354.","journal-title":"Appl Math Comput"},{"issue":"1","key":"4908_CR109","first-page":"432","volume":"185","author":"W-Y Chen","year":"2007","unstructured":"Chen W-Y. Color image steganography scheme using set partitioning in hierarchical trees coding, digital fourier transform and adaptive phase modulation. Appl Math Comput. 2007;185(1):432\u201348.","journal-title":"Appl Math Comput"},{"key":"4908_CR110","doi-asserted-by":"crossref","unstructured":"Weng C-Y, Huang C-T, Kao H-W. Dct-based compressed image with reversibility using modified quantization. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Berlin: Springer; 2017. pp. 214\u2013221.","DOI":"10.1007\/978-3-319-63856-0_27"},{"key":"4908_CR111","first-page":"161","volume":"81","author":"Y Li","year":"2018","unstructured":"Li Y, Xiong C, Han X, Xiang R, He F, Du H. Image steganography using cosine transform with large scale multimedia application. Multimed Tools Appl. 2018;81:161.","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"4908_CR112","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1016\/j.csi.2013.12.013","volume":"36","author":"Y-K Lin","year":"2014","unstructured":"Lin Y-K. A data hiding scheme based upon dct coefficient modification. Comput Stand & Interf. 2014;36(5):855\u201362.","journal-title":"Comput Stand & Interf"},{"issue":"10","key":"4908_CR113","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1016\/j.jss.2012.05.032","volume":"85","author":"Y-K Lin","year":"2012","unstructured":"Lin Y-K. High capacity reversible data hiding scheme based upon discrete cosine transformation. J Syst Softw. 2012;85(10):2395\u2013404.","journal-title":"J Syst Softw"},{"issue":"7","key":"4908_CR114","doi-asserted-by":"publisher","first-page":"1965","DOI":"10.1016\/j.jss.2013.03.083","volume":"86","author":"K Wang","year":"2013","unstructured":"Wang K, Lu Z-M, Hu Y-J. A high capacity lossless data hiding scheme for jpeg images. J Syst Softw. 2013;86(7):1965\u201375.","journal-title":"J Syst Softw"},{"key":"4908_CR115","unstructured":"Wikipedia: Discrete wavelet transform -Wikipedia, The Free Encyclopedia. http:\/\/en.wikipedia.org\/w\/index.php?title=Discrete%20 wavelet%20transform &oldid=1171992160. [Online; accessed 01-October-2023] 2023."},{"issue":"12","key":"4908_CR116","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra L, Heijmans HJ. Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans Image Process. 2005;14(12):2082\u201390.","journal-title":"IEEE Trans Image Process"},{"issue":"12","key":"4908_CR117","doi-asserted-by":"publisher","first-page":"3322","DOI":"10.1109\/TBME.2013.2264539","volume":"60","author":"A Ibaida","year":"2013","unstructured":"Ibaida A, Khalil I. Wavelet-based ecg steganography for protecting patient confidential information in point-of-care systems. IEEE Trans Biomed Eng. 2013;60(12):3322\u201330.","journal-title":"IEEE Trans Biomed Eng"},{"issue":"22","key":"4908_CR118","doi-asserted-by":"publisher","first-page":"33465","DOI":"10.1007\/s11042-023-14573-0","volume":"82","author":"O El Ogri","year":"2023","unstructured":"El Ogri O, Karmouni H, Sayyouri M, Qjidaa H. A new image\/video encryption scheme based on fractional discrete tchebichef transform and singular value decomposition. Multim Tools Appl. 2023;82(22):33465\u201397.","journal-title":"Multim Tools Appl"},{"key":"4908_CR119","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106346","volume":"137","author":"H Karmouni","year":"2021","unstructured":"Karmouni H, Sayyouri M, Qjidaa H, et al. A novel image encryption method based on fractional discrete meixner moments. Opt Lasers Eng. 2021;137:106346.","journal-title":"Opt Lasers Eng"},{"key":"4908_CR120","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106346","volume":"137","author":"O El ogri","year":"2021","unstructured":"El ogri O, Karmouni H, Sayyouri M, Qjidaa H. A novel image encryption method based on fractional discrete meixner moments. Opt Lasers Eng. 2021;137:106346. https:\/\/doi.org\/10.1016\/j.optlaseng.2020.106346.","journal-title":"Opt Lasers Eng"},{"key":"4908_CR121","doi-asserted-by":"crossref","unstructured":"Chaker R, EL\u00a0ogri O, Boua A. Color image encryption system based fractional hyperchaotic, fibonacci matrix and quaternion algebra. Int J Inf Tech, 2024. pp. 1\u201320.","DOI":"10.1007\/s41870-024-02076-6"},{"issue":"6","key":"4908_CR122","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/83.846244","volume":"9","author":"MD Adams","year":"2000","unstructured":"Adams MD, Kossentni F. Reversible integer-to-integer wavelet transforms for image compression: performance evaluation and analysis. IEEE Trans Image Process. 2000;9(6):1010\u201324.","journal-title":"IEEE Trans Image Process"},{"key":"4908_CR123","doi-asserted-by":"crossref","unstructured":"Mandal PC, Mukherjee I. Integer wavelet transform based secured image steganography using lsb and coefficient value differencing. In: 2021 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), IEEE; 2021. pp. 332\u2013337.","DOI":"10.1109\/ICSCCC51823.2021.9478095"},{"key":"4908_CR124","doi-asserted-by":"crossref","unstructured":"Liu P, Chen C, Ge L, Luo Y. Efficient self-adaptive image steganography scheme based on iterative blending and integer wavelet transform. In: Unifying Electrical Engineering and Electronics Engineering, Berlin: Springer; 2014. pp. 1159\u20131167.","DOI":"10.1007\/978-1-4614-4981-2_126"},{"key":"4908_CR125","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.image.2019.03.013","volume":"75","author":"G Ma","year":"2019","unstructured":"Ma G, Wang J. Efficient reversible data hiding in encrypted images based on multi-stage integer wavelet transform. Signal Process Image Commun. 2019;75:55\u201363.","journal-title":"Signal Process Image Commun"},{"key":"4908_CR126","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.image.2019.07.019","volume":"78","author":"H Zhang","year":"2019","unstructured":"Zhang H, Hu L. A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Process Image Commun. 2019;78:331\u201344.","journal-title":"Signal Process Image Commun"},{"key":"4908_CR127","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106257","volume":"92","author":"PK Muhuri","year":"2020","unstructured":"Muhuri PK, Ashraf Z, Goel S. A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput. 2020;92:106257.","journal-title":"Appl Soft Comput"},{"key":"4908_CR128","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.167804","volume":"247","author":"PC Mandal","year":"2021","unstructured":"Mandal PC, Mukherjee I, Chatterji B. High capacity steganography based on iwt using eight-way cvd and n-lsb ensuring secure communication. Optik. 2021;247:167804.","journal-title":"Optik"},{"key":"4908_CR129","doi-asserted-by":"crossref","unstructured":"Singh S, Siddiqui TJ. Robust image steganography using complex wavelet transform. In: IMPACT-2013, IEEE; 2013. pp. 56\u201360.","DOI":"10.1109\/MSPCT.2013.6782087"},{"key":"4908_CR130","doi-asserted-by":"crossref","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B. A comparative analysis among dual tree complex wavelet and other wavelet transforms based on image compression. In: International Conference on Intelligent Computing, Berlin, Springer; 2017. pp. 569\u2013580.","DOI":"10.1007\/978-3-319-63312-1_50"},{"key":"4908_CR131","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107481","volume":"171","author":"IJ Kadhim","year":"2020","unstructured":"Kadhim IJ, Premaratne P, Vial PJ. Improved image steganography based on super-pixel and coefficient-plane-selection. Signal Process. 2020;171:107481.","journal-title":"Signal Process"},{"key":"4908_CR132","doi-asserted-by":"crossref","unstructured":"Sathisha N, Priya R, Babu KS, Raja K, Venugopal K, Patnaik L. Dtcwt based high capacity steganography using coefficient replacement and adaptive scaling. In: Sixth International Conference on Machine Vision (ICMV 2013), SPIE; 2013. vol. 9067, pp. 332\u2013336.","DOI":"10.1117\/12.2051889"},{"key":"4908_CR133","doi-asserted-by":"crossref","unstructured":"Kadhim IJ, Premaratne P, et al. Secure image steganography using dual-tree complex wavelet transform block matching. In: 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), IEEE; 2018. pp. 41\u201347.","DOI":"10.1109\/ICECA.2018.8474616"},{"key":"4908_CR134","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.165786","volume":"226","author":"R Atta","year":"2021","unstructured":"Atta R, Ghanbari M, IEEE LF. A high payload data hiding scheme based on dual tree complex wavelet transform. Optik. 2021;226:165786.","journal-title":"Optik"},{"key":"4908_CR135","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J. Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multim Tools Appl. 2017;76:20739\u201353.","journal-title":"Multim Tools Appl"},{"issue":"1","key":"4908_CR136","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s11042-021-11351-8","volume":"81","author":"D Mehta","year":"2022","unstructured":"Mehta D, Bhatti D. Blind image steganography algorithm development which resistant against jpeg compression attack. Multim Tools Appl. 2022;81(1):459\u201379.","journal-title":"Multim Tools Appl"},{"key":"4908_CR137","doi-asserted-by":"publisher","first-page":"18475","DOI":"10.1007\/s11042-019-7238-8","volume":"78","author":"M Fakhredanesh","year":"2019","unstructured":"Fakhredanesh M, Rahmati M, Safabakhsh R. Steganography in discrete wavelet transform based on human visual system and cover model. Multim Tools Appl. 2019;78:18475\u2013502.","journal-title":"Multim Tools Appl"},{"key":"4908_CR138","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.cogsys.2019.11.002","volume":"60","author":"IJ Kadhim","year":"2020","unstructured":"Kadhim IJ, Premaratne P, Vial PJ. High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res. 2020;60:20\u201332.","journal-title":"Cogn Syst Res"},{"issue":"6","key":"4908_CR139","first-page":"68","volume":"1","author":"S Divya","year":"2012","unstructured":"Divya S, Reddy MRM. Hiding text in audio using multiple lsb steganography and provide security using cryptography. Int J Sc Tech Res. 2012;1(6):68\u201370.","journal-title":"Int J Sc Tech Res"},{"issue":"3.4","key":"4908_CR140","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding. IBM Syst J. 1996;35(3.4):313\u201336.","journal-title":"IBM Syst J"},{"key":"4908_CR141","doi-asserted-by":"crossref","unstructured":"Skopin DE, El-Emary IM, Rasras RJ, Diab RS. Advanced algorithms in audio steganography for hiding human speech signal. In: 2010 2nd International Conference on Advanced Computer Control, IEEE; 2010. vol. 3, pp. 29\u201332.","DOI":"10.1109\/ICACC.2010.5486735"},{"key":"4908_CR142","doi-asserted-by":"crossref","unstructured":"Nutzinger M, Wurzer J. A novel phase coding technique for steganography in auditive media. In: 2011 Sixth International Conference on Availability, Reliability and Security, IEEE; 2011. pp. 91\u201398.","DOI":"10.1109\/ARES.2011.22"},{"key":"4908_CR143","doi-asserted-by":"crossref","unstructured":"Feng Y, Xu L, Lu X, Zhang G, Rao W. A robust coverless audio steganography based on differential privacy clustering. IEEE Trans Multim 2025.","DOI":"10.1109\/TMM.2025.3543107"},{"issue":"8","key":"4908_CR144","first-page":"3507","volume":"11","author":"S Sarthak","year":"2020","unstructured":"Sarthak S, Agarwal N, Inderveer K. Audio steganography: a survey of techniques and tools. J Ambient Intell Humaniz Comput. 2020;11(8):3507\u201322.","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4908_CR145","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100316","volume":"38","author":"AA AlSabhany","year":"2020","unstructured":"AlSabhany AA, Ali AH, Ridzuan F, Azni A, Mokhtar MR. Digital audio steganography: systematic review, classification, and analysis of the current state of the art. Comput Sci Rev. 2020;38:100316.","journal-title":"Comput Sci Rev"},{"issue":"2","key":"4908_CR146","first-page":"51","volume":"10","author":"R Chowdhury","year":"2016","unstructured":"Chowdhury R, Bhattacharyya D, Bandyopadhyay SK, Kim T-H. A view on lsb based audio steganography. Int J Secur Its Appl. 2016;10(2):51\u201362.","journal-title":"Int J Secur Its Appl"},{"key":"4908_CR147","doi-asserted-by":"crossref","unstructured":"Gruhl D, Lu A, Bender W. Echo hiding. In: International Workshop on Information Hiding, Berlin: Springer; 1996. pp. 295\u2013315.","DOI":"10.1007\/3-540-61996-8_48"},{"issue":"1","key":"4908_CR148","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-4722-2012-25","volume":"2012","author":"F Djebbar","year":"2012","unstructured":"Djebbar F, Ayad B, Meraim KA, Hamam H. Comparative study of digital audio steganography techniques. EURASIP J Audio Speech Music Process. 2012;2012(1):1\u201316.","journal-title":"EURASIP J Audio Speech Music Process"},{"issue":"05","key":"4908_CR149","first-page":"1652","volume":"2","author":"PK Singh","year":"2010","unstructured":"Singh PK, Aggrawal R. Enhancement of lsb based steganography for hiding image in audio. Int J Comput Sci Eng. 2010;2(05):1652\u20138.","journal-title":"Int J Comput Sci Eng"},{"key":"4908_CR150","doi-asserted-by":"crossref","unstructured":"Teotia S, Srivastava P. Enhancing audio and video steganography technique using hybrid algorithm. In: 2018 International Conference on Communication and Signal Processing (ICCSP), IEEE; 2018. pp. 1059\u20131063.","DOI":"10.1109\/ICCSP.2018.8524182"},{"issue":"2","key":"4908_CR151","first-page":"1","volume":"2","author":"P Dutta","year":"2009","unstructured":"Dutta P, Bhattacharyya D, Kim T-H. Data hiding in audio signal: a review. Int J Database Theory Appl. 2009;2(2):1\u20138.","journal-title":"Int J Database Theory Appl"},{"key":"4908_CR152","doi-asserted-by":"crossref","unstructured":"Hernandez-Garay S, Vazquez-Medina R, De\u00a0Rivera LN, Ponomaryov V. Steganographic communication channel using audio signals. In: 2008 12th International Conference on Mathematical Methods in Electromagnetic Theory, IEEE; 2008. pp. 427\u2013429.","DOI":"10.1109\/MMET.2008.4581017"},{"key":"4908_CR153","doi-asserted-by":"crossref","unstructured":"Matsuoka H. Spread spectrum audio steganography using sub-band phase shifting. In: 2006 International Conference on Intelligent Information Hiding and Multimedia, IEEE; 2006. pp. 3\u20136.","DOI":"10.1109\/IIH-MSP.2006.265106"},{"key":"4908_CR154","doi-asserted-by":"crossref","unstructured":"Gopalan K, Wenndt S, Noga A, Haddad D, Adams S. Covert speech communication via cover speech by tone insertion. In: 2003 IEEE Aerospace Conference Proceedings (Cat. No. 03TH8652), IEEE; 2003. vol. 4, pp. 4\u2013164741653.","DOI":"10.1109\/AERO.2003.1235095"},{"key":"4908_CR155","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.1007\/s11235-011-9542-0","volume":"52","author":"K Bhowal","year":"2013","unstructured":"Bhowal K, Bhattacharyya D, Jyoti Pal A, Kim T-H. A ga based audio steganography with enhanced security. Telecommun Syst. 2013;52:2197\u2013204.","journal-title":"Telecommun Syst"},{"key":"4908_CR156","doi-asserted-by":"crossref","unstructured":"Ketcham M, Vongpraphip S. Genetic algorithm audio watermarking using multiple image-based watermarks. In: 2007 International Symposium on Communications and Information Technologies, IEEE; 2007. pp. 1235\u20131240.","DOI":"10.1109\/ISCIT.2007.4392206"},{"key":"4908_CR157","doi-asserted-by":"crossref","unstructured":"Ginanjar RR, Kim DS, Moon CB. Enhanced digital audio watermarking using genetic algorithm. In: 2018 IEEE International Conference on Consumer electronics-Asia (ICCE-Asia), IEEE; 2018. pp. 206\u2013212.","DOI":"10.1109\/ICCE-ASIA.2018.8552160"},{"issue":"1","key":"4908_CR158","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1080\/02564602.2020.1757520","volume":"38","author":"Y Ren","year":"2021","unstructured":"Ren Y, Zhong S, Tu W, Yang H, Wang L. A silk adaptive steganographic scheme based on minimizing distortion in pitch domain. IETE Tech Rev. 2021;38(1):46\u201355.","journal-title":"IETE Tech Rev"},{"issue":"3","key":"4908_CR159","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s00530-021-00790-w","volume":"27","author":"X Sun","year":"2021","unstructured":"Sun X, Wang K, Li S. Audio steganography with less modification to the optimal matching cnv-qim path with the minimal hamming distance expected value to a secret. Multimedia Syst. 2021;27(3):341\u201352.","journal-title":"Multimedia Syst"},{"key":"4908_CR160","doi-asserted-by":"crossref","unstructured":"Ghasemzadeh H, Kayvanrad MH. Toward a robust and secure echo steganography method based on parameters hopping. In: 2015 Signal Processing and Intelligent Systems Conference (SPIS), IEEE; 2015. pp. 143\u2013147.","DOI":"10.1109\/SPIS.2015.7422329"},{"key":"4908_CR161","doi-asserted-by":"publisher","first-page":"129291","DOI":"10.1109\/ACCESS.2019.2940640","volume":"7","author":"AA Alsabhany","year":"2019","unstructured":"Alsabhany AA, Ridzuan F, Azni A. The adaptive multi-level phase coding method in audio steganography. IEEE Access. 2019;7:129291\u2013306.","journal-title":"IEEE Access"},{"key":"4908_CR162","doi-asserted-by":"crossref","unstructured":"Kaur R, Thakur A, Saini HS, Kumar R. Enhanced steganographic method preserving base quality of information using lsb, parity and spread spectrum technique. In: 2015 Fifth International Conference on Advanced Computing & Communication Technologies, IEEE; 2015. pp. 148\u2013152.","DOI":"10.1109\/ACCT.2015.139"},{"issue":"2","key":"4908_CR163","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TCSI.2015.2512720","volume":"63","author":"J Charthad","year":"2016","unstructured":"Charthad J, Dolatsha N, Rekhi A, Arbabian A. System-level analysis of far-field radio frequency power delivery for mm-sized sensor nodes. IEEE Trans Circuits Syst I Regul Pap. 2016;63(2):300\u201311.","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"18","key":"4908_CR164","doi-asserted-by":"publisher","first-page":"3808","DOI":"10.3390\/electronics12183808","volume":"12","author":"F Yang","year":"2023","unstructured":"Yang F, et al. Advanced image steganography using a u-net-based architecture. Electronics. 2023;12(18):3808. https:\/\/doi.org\/10.3390\/electronics12183808.","journal-title":"Electronics"},{"key":"4908_CR165","doi-asserted-by":"publisher","first-page":"9314","DOI":"10.1109\/ACCESS.2019.2891247","volume":"7","author":"X Duan","year":"2019","unstructured":"Duan X, Jia K, Li B, Guo D, Zhang E, Qin C. Reversible image steganography scheme based on a u-net structure. IEEE Access. 2019;7:9314\u201323.","journal-title":"IEEE Access"},{"key":"4908_CR166","doi-asserted-by":"publisher","first-page":"23409","DOI":"10.1109\/ACCESS.2021.3053998","volume":"9","author":"N Subramanian","year":"2021","unstructured":"Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A. Image steganography: a review of the recent advances. IEEE Access. 2021;9:23409\u201323.","journal-title":"IEEE Access"},{"issue":"1","key":"4908_CR167","doi-asserted-by":"publisher","first-page":"16895","DOI":"10.1038\/s41598-022-17362-1","volume":"12","author":"V Himthani","year":"2022","unstructured":"Himthani V, Dhaka VS, Kaur M, Rani G, Oza M, Lee H-N. Comparative performance assessment of deep learning based image steganography techniques. Sci Rep. 2022;12(1):16895.","journal-title":"Sci Rep"},{"key":"4908_CR168","unstructured":"Wei P, Zhou Q, Wang Z, Qian Z, Zhang X, Li S. Generative steganography diffusion. arXiv preprint arXiv:2305.03472 2023."},{"key":"4908_CR169","unstructured":"Kim D, Shin C, Choi J, Jung D, Yoon S. Diffusion-stego: training-free diffusion generative steganography via message projection. arXiv preprint arXiv:2305.18726 2023."},{"key":"4908_CR170","unstructured":"Rehman W. A novel approach to image steganography using generative adversarial networks. arXiv preprint arXiv:2412.00094 2024."},{"key":"4908_CR171","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2024.100353","volume":"22","author":"NJ De La Croix","year":"2024","unstructured":"De La Croix NJ, Ahmad T, Han F. Comprehensive survey on image steganalysis using deep learning. Array. 2024;22:100353.","journal-title":"Array"},{"key":"4908_CR172","doi-asserted-by":"crossref","unstructured":"Singh H, Deshmukh1 M, Awasthi LK, Berwal K. A robust watermarking approach for securing copyright. In: Proceedings of the 6th International Conference on Deep Learning, Artificial Intelligence and Robotics (ICDLAIR 2024), Berlin: Springer Nature; 2025. vol. 193, p. 314.","DOI":"10.2991\/978-94-6463-740-3_27"},{"key":"4908_CR173","doi-asserted-by":"crossref","unstructured":"Choudhary S, Singh N, Singh N, Berwal K. Dynamic automated red team tool (dartt): a comprehensive framework for system, network and data security auditing. In: 2025 IEEE International Conference on Computer, Electronics, Electrical Engineering & Their Applications (IC2E3), IEEE; 2025. pp. 1\u20136.","DOI":"10.1109\/IC2E365635.2025.11167209"},{"key":"4908_CR174","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2025.110884","volume":"130","author":"S Kashid","year":"2026","unstructured":"Kashid S, Awasthi LK, Berwal K. Somvs: a dual-convolutional neural network and self-organizing map-based approach for high-quality video summarization. Comput Electr Eng. 2026;130:110884.","journal-title":"Comput Electr Eng"},{"issue":"15","key":"4908_CR175","doi-asserted-by":"publisher","first-page":"15151","DOI":"10.1007\/s11042-024-19669-9","volume":"84","author":"S Kashid","year":"2025","unstructured":"Kashid S, Awasthi LK, Berwal K. Security to text (s2t): multi-layered based security approaches for secret text content. Multim Tools Appl. 2025;84(15):15151\u201371.","journal-title":"Multim Tools Appl"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04908-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-026-04908-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-026-04908-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T17:02:27Z","timestamp":1774890147000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-026-04908-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,30]]},"references-count":175,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["4908"],"URL":"https:\/\/doi.org\/10.1007\/s42979-026-04908-7","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,30]]},"assertion":[{"value":"8 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal subjects.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"325"}}