{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:20:32Z","timestamp":1775258432280,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13640-018-0348-9","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T08:02:50Z","timestamp":1540540970000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Image transformation and information hiding technology based on genetic algorithm"],"prefix":"10.1186","volume":"2018","author":[{"given":"Xiaowei","family":"Gu","sequence":"first","affiliation":[]},{"given":"Yiqin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"348_CR1","unstructured":"Y.E. Wei, G.L. Wang, X.G. Gong, Internal information hiding algorithm based on discrete cosine transform in cloud computing environment[J]. Sci. Technol. Engrg. 18(7), 166\u2013171 (2018)"},{"key":"348_CR2","first-page":"241","volume-title":"Spatial outlier information hiding algorithm based on complex transformation[C]\/\/ International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","author":"Z Shou","year":"2017","unstructured":"Z. Shou, A. Liu, S. Li, et al., Spatial outlier information hiding algorithm based on complex transformation[C]\/\/ International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (Springer, Cham, 2017), pp. 241\u2013255"},{"key":"348_CR3","unstructured":"Y. Liu, Information Hiding Algorithm of Wavelet Transform Based on JPEG Image[J] (Journal of Beihua University, 2017), 18(5), 697\u2013700"},{"issue":"2","key":"348_CR4","first-page":"1156","volume":"81","author":"WA Shukur","year":"2018","unstructured":"W.A. Shukur, K.K. Jabbar, Information hiding using LSB technique based on developed PSO algorithm[J]. Int. J. Electr. Comput. Engrg. 81(2), 1156\u20131168 (2018)","journal-title":"Int. J. Electr. Comput. Engrg."},{"issue":"4","key":"348_CR5","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1137\/S0036144503429856","volume":"45","author":"D Dolev","year":"2003","unstructured":"D. Dolev, Dwork, et al., Non-malleable cryptography[J]. SIAM Rev. 45(4), 727\u2013784 (2003)","journal-title":"SIAM Rev."},{"issue":"13","key":"348_CR6","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","volume":"77","author":"D Deutsch","year":"1996","unstructured":"D. Deutsch, A. Ekert, R. Jozsa, et al., Quantum privacy amplification and the security of quantum cryptography over noisy channels[J]. Phys. Rev. Lett. 77(13), 2818\u20132821 (1996)","journal-title":"Phys. Rev. Lett."},{"issue":"20","key":"348_CR7","doi-asserted-by":"publisher","first-page":"4729","DOI":"10.1103\/PhysRevLett.84.4729","volume":"84","author":"T Jennewein","year":"2000","unstructured":"T. Jennewein, C. Simon, G. Weihs, et al., Quantum cryptography with entangled photons[J]. Phys. Rev. Lett. 84(20), 4729 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"509","key":"348_CR8","first-page":"359","volume":"10","author":"O Goldreich","year":"2004","unstructured":"O. Goldreich, Foundations of cryptography: basic applications[J]. J. ACM 10(509), 359\u2013364 (2004)","journal-title":"J. ACM"},{"issue":"7","key":"348_CR9","first-page":"2104","volume":"xiii","author":"DE Goldberg","year":"1989","unstructured":"D.E. Goldberg, Genetic algorithm in search optimization and machine learning[J]. Addison Wesley xiii(7), 2104\u20132116 (1989)","journal-title":"Addison Wesley"},{"key":"348_CR10","unstructured":"D.E. Goldberg, D.M. Goldberg, D.E. Goldberg, et al., Genetic algorithm is search optimization and machine learning[J]. xiii(7), 2104\u20132116 (1989)"},{"key":"348_CR11","doi-asserted-by":"crossref","unstructured":"K. Deb, S. Agrawal, A. Pratap, et al., A fast elitist non-dominated sorting genetic algorithm for multi-objective optimisation: NSGA-II[C]\/\/ International Conference on Parallel Problem Solving From Nature (Springer-Verlag, 2000), pp. 849\u2013858","DOI":"10.1007\/3-540-45356-3_83"},{"issue":"5","key":"348_CR12","doi-asserted-by":"publisher","first-page":"2196","DOI":"10.1016\/j.eswa.2013.09.018","volume":"41","author":"Yacine Laalaoui","year":"2014","unstructured":"Y. Laalaoui, N. Bouguila, Pre-run-time scheduling in real-time systems: Current researches and Artificial Intelligence perspectives[J]. Expert Systems with Applications. 41(5), 2196\u20132210 (2014)","journal-title":"Expert Systems with Applications"},{"key":"348_CR13","doi-asserted-by":"crossref","unstructured":"Jennane R, Almhdie-Imjabber A, Hambli R, et al. Genetic algorithm and image processing for osteoporosis diagnosis[C]\/\/ International Conference of the IEEE Engineering in Medicine & Biology. Conf. Proc. IEEE Eng. Med. Biol. Soc., 2010:5597","DOI":"10.1109\/IEMBS.2010.5626804"},{"key":"348_CR14","doi-asserted-by":"crossref","unstructured":"M. Yoshioka, S. Omatu, Noise reduction method for image processing using genetic algorithm[C]\/\/ IEEE International Conference on Systems, Man, and Cybernetics, 1997. Comput. Cybern. Simul. IEEE, 2650\u20132655, 3 (2002)","DOI":"10.1109\/ICSMC.1997.635335"},{"key":"348_CR15","doi-asserted-by":"crossref","unstructured":"C. Alippi, R. Cucchiara, Cluster partitioning in image analysis classification: a genetic algorithm approach[C]\/\/ CompEuro\u201992. \u2018Computer Systems and Software Engineering\u2019, proceedings. IEEE, 139\u2013144 (1992)","DOI":"10.1109\/CMPEUR.1992.218520"},{"issue":"5","key":"348_CR16","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1109\/TGRS.2003.810924","volume":"41","author":"U Maulik","year":"2003","unstructured":"U. Maulik, S. Bandyopadhyay, Fuzzy partitioning using a real-coded variable-length genetic algorithm for pixel classification[J]. IEEE Trans. Geosci. Remote Sens. 41(5), 1075\u20131081 (2003)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"348_CR17","doi-asserted-by":"crossref","unstructured":"M. Asjad, S. Khan, Analysis of maintenance cost for an asset using thegenetic algorithm[J]. International Journal of System Assurance Engineering & Management. 8(2), 1\u201313 (2016)","DOI":"10.1007\/s13198-016-0448-9"},{"key":"348_CR18","unstructured":"A.R.F. Pinto, A.F Crepaldi, M.S Nagano. A Genetic Algorithm applied to pick sequencing for billing[J]. J Int Manuf. 1\u201318. (2017)"},{"key":"348_CR19","first-page":"739","volume":"1","author":"M Conner","year":"1999","unstructured":"M. Conner, C. Patel, M. Little, Genetic algorithm\/artificial life evolution of security vulnerability agents[C]\/\/ Military Communications Conference Proceedings, 1999. Milcom. IEEE 1, 739\u2013743 (1999)","journal-title":"Milcom. IEEE"},{"issue":"2","key":"348_CR20","first-page":"224","volume":"31","author":"XP Wang","year":"2003","unstructured":"X.P. Wang, L.M. Cao, H.B. Shi, Design of artificial life demo system based on genetic algorithm[J]. J. Tongji Univ. 31(2), 224\u2013228 (2003)","journal-title":"J. Tongji Univ."},{"key":"348_CR21","doi-asserted-by":"crossref","unstructured":"Q. Zong, W. Guo, A speech information hiding algorithm based on the energy difference between the frequency band[C]\/\/ International Conference on Consumer Electronics, Communications and Networks. IEEE, 3078\u20133081 (2012)","DOI":"10.1109\/CECNet.2012.6201965"},{"key":"348_CR22","doi-asserted-by":"crossref","unstructured":"Y. Hu, C. Zhang, Y. Su, Information hiding based on intra prediction modes for H.264\/AVC[C]\/\/ IEEE International Conference on Multimedia and Expo. IEEE, 1231\u20131234 (2007)","DOI":"10.1109\/ICME.2007.4284879"},{"key":"348_CR23","doi-asserted-by":"crossref","unstructured":"J. Xie, C. Yang, D. Huang, High capacity information hiding algorithm for DCT domain of image[C]\/\/ International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Comput. Soc., 269\u2013272 (2008)","DOI":"10.1109\/IIH-MSP.2008.173"},{"issue":"10","key":"348_CR24","first-page":"1874","volume":"29","author":"XIE Jian-quan","year":"2008","unstructured":"X.I.E. Jian-quan, Y.A.N.G. Chun-hua, X.I.E. Qing, et al., High capacity information hiding algorithm in a binary host image[J]. J. Chin. Comput. Syst. 29(10), 1874\u20131877 (2008)","journal-title":"J. Chin. Comput. Syst."},{"key":"348_CR25","unstructured":"C. Jiang, A summary to algorithms of digital multimedia information hiding technology and its applications of digital watermarking[J]. J. Shanxi Educ. College 2(3), 25\u201328 (2003)"}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0348-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-018-0348-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-018-0348-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:57:59Z","timestamp":1775253479000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-018-0348-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["348"],"URL":"https:\/\/doi.org\/10.1186\/s13640-018-0348-9","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"22 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Approved.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Approved.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"115"}}