{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T11:17:58Z","timestamp":1742642278621},"reference-count":28,"publisher":"World Scientific Pub Co Pte Lt","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Image Grap."],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p> Securing the confidentiality of patient information using the image steganography process has gained more attention in the research community. However, embedding the patient information is a major task in the steganography process due to the complexity in identifying the pixel features. Thus, an effective Crow Search Algorithm-based deep belief network (CSA-DBN) is proposed for embedding the information in the medical image. Initially, the appropriate pixels and the features, like pixel coverage, wavelet energy, edge information, and texture features, such as local binary pattern (LBP) and local directional pattern (LDP), are extracted from each pixel. The proposed CSA-DBN utilizes the feature vector and identifies the suitable pixels used for embedding. The patient information is embedded into the image by using the embedding strength and the DWT coefficient. Finally, the embedded information is extracted using the DWT coefficient. The analysis of the proposed CSA-DBN approach is done based on the performance metrics, such as correlation coefficient, peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM) that acquired the average values as 0.9471, 24.836[Formula: see text]dB, and 0.4916 in the presence of salt and pepper noise and 0.9741, 57.832[Formula: see text]dB, and 0.9766 in the absence of noise. <\/jats:p>","DOI":"10.1142\/s0219467821500029","type":"journal-article","created":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T15:05:00Z","timestamp":1598367900000},"page":"2150002","source":"Crossref","is-referenced-by-count":1,"title":["Pixel Prediction-Based Image Steganography Using Crow Search Algorithm-Based Deep Belief Network Approach"],"prefix":"10.1142","volume":"21","author":[{"given":"K. P.","family":"Ravikumar","sequence":"first","affiliation":[{"name":"JSS Academy of Technical Education, Affiliated to Visvesvaraya Technological University, Belagavi, Karnataka, India"}]},{"given":"H. S. Manjunatha","family":"Reddy","sequence":"additional","affiliation":[{"name":"Global Academy of Technology, Affiliated to Visvesvaraya Technological University, Belagavi, Karnataka, India"}]}],"member":"219","published-online":{"date-parts":[[2021,1,23]]},"reference":[{"issue":"15","key":"S0219467821500029BIB001","doi-asserted-by":"crossref","first-page":"19633","DOI":"10.1007\/s11042-017-5326-1","volume":"77","author":"Qian Y.","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"S0219467821500029BIB002","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/978-3-642-18440-6_58","volume-title":"Int. Conf. Advances in Computing, Communication and Control","author":"Daga B.","year":"2011"},{"issue":"2","key":"S0219467821500029BIB003","first-page":"195","volume":"27","author":"Ruikar S. D.","year":"2016","journal-title":"Journal of Intelligent Systems"},{"issue":"2","key":"S0219467821500029BIB004","first-page":"28","volume":"2","author":"Vinusha S.","year":"2019","journal-title":"Multimedia Research"},{"issue":"2","key":"S0219467821500029BIB005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"Kodovsk\u00fd J.","year":"2012","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"S0219467821500029BIB006","doi-asserted-by":"crossref","DOI":"10.1142\/S0219467817500073","volume":"17","author":"Tian C.","year":"2017","journal-title":"International Journal of Image and Graphics"},{"issue":"1","key":"S0219467821500029BIB007","first-page":"1","volume":"19","author":"Amir Baig M.","year":"2019","journal-title":"International Journal of Image and Graphics"},{"key":"S0219467821500029BIB008","first-page":"1","author":"Ulker M.","year":"2018","journal-title":"Digital Forensic and Security"},{"key":"S0219467821500029BIB009","first-page":"171","author":"Raja K. B.","year":"2005","journal-title":"Proceedings of the 3rd International Conference on Intelligent Sensing and Information Processing"},{"issue":"3","key":"S0219467821500029BIB010","doi-asserted-by":"crossref","first-page":"639","DOI":"10.21629\/JSEE.2018.03.21","volume":"29","author":"Elshazly E.","year":"2018","journal-title":"Journal of Systems Engineering and Electronics"},{"issue":"9","key":"S0219467821500029BIB011","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.1109\/LSP.2018.2856630","volume":"25","author":"Hu D.","year":"2018","journal-title":"IEEE Signal Processing Letters"},{"issue":"5","key":"S0219467821500029BIB012","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/TIFS.2017.2787986","volume":"13","author":"Yu J.","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"S0219467821500029BIB013","doi-asserted-by":"crossref","first-page":"38303","DOI":"10.1109\/ACCESS.2018.2852771","volume":"6","author":"Hu D.","year":"2018","journal-title":"IEEE Access"},{"issue":"1","key":"S0219467821500029BIB015","first-page":"41","volume":"6","author":"Goel S.","year":"2013","journal-title":"Global Journal of Computer Science and Technology"},{"issue":"3","key":"S0219467821500029BIB016","doi-asserted-by":"crossref","DOI":"10.1142\/S0219467817500164","volume":"17","author":"Prabhanjan S.","year":"2017","journal-title":"International Journal of Image and Graphics"},{"issue":"3","key":"S0219467821500029BIB017","doi-asserted-by":"crossref","DOI":"10.1142\/S0219467818500171","volume":"18","author":"Zhang J.","year":"2018","journal-title":"International Journal of Image and Graphics"},{"issue":"5","key":"S0219467821500029BIB018","doi-asserted-by":"crossref","first-page":"1242","DOI":"10.1109\/TIFS.2017.2780805","volume":"13","author":"Li B.","year":"2018","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"S0219467821500029BIB019","first-page":"1246","volume":"3","author":"Deshmane P.","year":"2013","journal-title":"International Journal of Engineering Research and Applications"},{"key":"S0219467821500029BIB020","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/978-94-015-9715-9_8","volume-title":"Wavelets in Signal and Image Analysis","author":"Nikolov S.","year":"2001"},{"key":"S0219467821500029BIB021","first-page":"1094","volume-title":"Advance Computing","author":"Ramaiya M. K.","year":"2013"},{"key":"S0219467821500029BIB022","first-page":"614","volume-title":"Proc. Int. Conf. Communication Systems","author":"Raja K. B.","year":"2008"},{"key":"S0219467821500029BIB023","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.patrec.2017.08.016","volume":"105","author":"Veena S. T.","year":"2018","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"S0219467821500029BIB024","doi-asserted-by":"crossref","first-page":"151","DOI":"10.32604\/cmc.2018.02890","volume":"56","author":"Zhang Y.","year":"2018","journal-title":"Computers, Materials and Continua"},{"issue":"6","key":"S0219467821500029BIB025","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/TCSVT.2018.2852702","volume":"29","author":"Lu W.","year":"2018","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"S0219467821500029BIB026","doi-asserted-by":"crossref","first-page":"28","DOI":"10.3390\/e17010028","volume":"17","author":"Huang X.","year":"2015","journal-title":"Entropy"},{"issue":"6","key":"S0219467821500029BIB027","doi-asserted-by":"crossref","first-page":"765","DOI":"10.1109\/TSMCC.2011.2118750","volume":"41","author":"Huang D.","year":"2011","journal-title":"IEEE Transactions on Systems, Man and Cybernetics \u2014 Part C"},{"key":"S0219467821500029BIB029","first-page":"2162","volume-title":"Int. Conf. Pattern Recognition","author":"Jabid T.","year":"2010"},{"key":"S0219467821500029BIB030","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compstruc.2016.03.001","volume":"169","author":"Askarzadeh A.","year":"2016","journal-title":"Computers and Structures"}],"container-title":["International Journal of Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219467821500029","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T15:27:50Z","timestamp":1612798070000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0219467821500029"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":28,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1142\/S0219467821500029"],"URL":"https:\/\/doi.org\/10.1142\/s0219467821500029","relation":{},"ISSN":["0219-4678","1793-6756"],"issn-type":[{"value":"0219-4678","type":"print"},{"value":"1793-6756","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]}}}