{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:33:16Z","timestamp":1766158396897,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T00:00:00Z","timestamp":1572307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T00:00:00Z","timestamp":1572307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n              <jats:p>In this paper, we present a novel image steganography method which is based on color palette transformation in color space. Most of the existing image steganography methods modify separate image pixels, and random noise appears in the image. By proposing a method, which changes the color palette of the image (all pixels of the same color will be changed to the same color), we achieve a higher user perception. Presented comparison of stegoimage quality metrics with other image steganography methods proved the new method is one of the best according to Structural Similarity Index (SSIM) and Peak Signal Noise Ratio (PSNR) values. The capability is average among other methods, but our method has a bigger capacity among methods with better SSIM and PSNR values. The color and pixel capability can be increased by using standard or adaptive color palette images with smoothing, but it will increase the embedding identification possibility.<\/jats:p>","DOI":"10.1186\/s13640-019-0484-x","type":"journal-article","created":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T20:28:08Z","timestamp":1572467288000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Image steganography based on color palette transformation in color space"],"prefix":"10.1186","volume":"2019","author":[{"given":"Eugenijus","family":"Margalikas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3195-4280","authenticated-orcid":false,"given":"Simona","family":"Ramanauskait\u0117","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,29]]},"reference":[{"issue":"4","key":"484_CR1","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"J. Li, C. Yu, B.B. Gupta, X. Ren, Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed. Tools Appl. 77(4), 4545\u20134561 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"6","key":"484_CR2","doi-asserted-by":"publisher","first-page":"e0199143","DOI":"10.1371\/journal.pone.0199143","volume":"13","author":"Z Zhang","year":"2018","unstructured":"Z. Zhang, H. Sun, S. Gao, S. Jin, Self-recovery reversible image watermarking algorithm. PloS One 13(6), e0199143 (2018)","journal-title":"PloS One"},{"issue":"3","key":"484_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","volume":"25","author":"C Qin","year":"2018","unstructured":"C. Qin, P. Ji, C.-C. Chang, J. Dong, X. Sun, Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. 25(3), 36\u201348 (2018)","journal-title":"IEEE Multimed."},{"unstructured":"C. Yung-Fu, S.W. Chien, H.H. Lin, in WSEAS International Conference. Proceedings Mathematics and Computers in Science and Engineering. No. 3. True color image steganography using palette and minimum spanning tree (World Scientific and Engineering Academy and Society, Wisconsin, 2009)","key":"484_CR4"},{"unstructured":"B.S. Champakamala, K. Padmini, D.K. Radhika, Least significant bit algorithm for image steganography. Int. J. Adv. Comput. Technol. 3(4), 34\u201338, (2014)","key":"484_CR5"},{"issue":"2","key":"484_CR6","first-page":"213","volume":"1","author":"SO Mundhada","year":"2012","unstructured":"S.O. Mundhada, V.K. Shandilya, Spatial and transformation domain techniques for image enhancement. Int. J. Eng. Sci. Innovative Technol. 1(2), 213\u2013216 (2012)","journal-title":"Int. J. Eng. Sci. Innovative Technol."},{"unstructured":"C. Bhabatosh, Digital Image Processing and Analysis (PHI Learning Pvt. Ltd., New Delhi, 2011)","key":"484_CR7"},{"issue":"2","key":"484_CR8","first-page":"39","volume":"1","author":"HK Sawant","year":"2010","unstructured":"H.K. Sawant, M. Deore, A comprehensive review of image enhancement techniques. Int. J. Comput. Technol. Electron. Eng. 1(2), 39\u201344 (2010)","journal-title":"Int. J. Comput. Technol. Electron. Eng."},{"issue":"9","key":"484_CR9","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"D.C. Wu, W.H. Tsai, A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9), 1613\u20131626 (2003)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"484_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.sigpro.2012.07.025","volume":"93","author":"X Li","year":"2013","unstructured":"X. Li, J. Li, B. Li, B. Yang, High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1), 198\u2013205 (2013)","journal-title":"Signal Process."},{"issue":"2019","key":"484_CR11","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1186\/s13640-019-0458-z","volume":"1","author":"HH Liu","year":"2019","unstructured":"H.H. Liu, C.M. Lee, High-capacity reversible image steganography based on pixel value ordering. EURASIP J. Image Video Process. 1(2019), 54 (2019)","journal-title":"EURASIP J. Image Video Process."},{"doi-asserted-by":"crossref","unstructured":"S. Thenmozhi, M. Chandrasekaran, in Computational Intelligence & Computing Research (ICCIC). Novel approach for image stenography based on integer wavelet transform (2012 IEEE International Conference on. IEEE, Coimbatore, 2012)","key":"484_CR12","DOI":"10.1109\/ICCIC.2012.6510300"},{"doi-asserted-by":"crossref","unstructured":"V. Senthooran, L. Ranathunga, in Networks & Soft Computing (ICNSC). DCT coefficient dependent quantization table modification steganographic algorithm (2014 First International Conference on. IEEE, Guntur, 2014)","key":"484_CR13","DOI":"10.1109\/CNSC.2014.6906644"},{"issue":"7","key":"484_CR14","first-page":"90","volume":"2","author":"JA Mazumder","year":"2014","unstructured":"J.A. Mazumder, K. Hemachandran, Color image steganography using discrete wavelet transformation and optimized message distribution method. Int. J. Comput. Sci. Eng. 2(7), 90\u2013100 (2014)","journal-title":"Int. J. Comput. Sci. Eng."},{"doi-asserted-by":"crossref","unstructured":"K. Patel, L. Ragha, in Industrial Instrumentation and Control (ICIC). Binary image steganography in wavelet domain (2015 International Conference on. IEEE, Pune, 2015)","key":"484_CR15","DOI":"10.1109\/IIC.2015.7151012"},{"unstructured":"A. Dalvi, R.S. Kamathe, Color image steganography by using dual wavelet transform (DWT, SWT). Int. J. Sci. Eng. Res. 3(7), 2347\u20133878 (2015)","key":"484_CR16"},{"issue":"7","key":"484_CR17","first-page":"83","volume":"10","author":"H Huang","year":"2016","unstructured":"H. Huang, Z. Zhou, An image steganography algorithm based on the quantitative features of higher order local model. Int. J. Secur. Appl. 10(7), 83\u201392 (2016)","journal-title":"Int. J. Secur. Appl."},{"key":"484_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-16435-4_13","volume-title":"Proceedings of Information hiding, Calgary, Canada","author":"T Pevn\u00fd","year":"2010","unstructured":"T. Pevn\u00fd, T. Filler, P. Bas, in Proceedings of Information hiding, Calgary, Canada. Using high-dimensional image models to perform highly undetectable steganography (2010), pp. 161\u2013177"},{"issue":"2","key":"484_CR19","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"S. Sun, A novel edge based image steganography with 2k correction and Huffman encoding. Inf. Process. Lett. 116(2), 93\u201399 (2016)","journal-title":"Inf. Process. Lett."},{"issue":"14","key":"484_CR20","doi-asserted-by":"publisher","first-page":"8319","DOI":"10.1007\/s11042-015-2752-9","volume":"75","author":"TD Nguyen","year":"2016","unstructured":"T.D. Nguyen, S. Arch-Int, N. Arch-Int, An adaptive multi bit-plane image steganography using block data-hiding. Multimed. Tools Appl. 75(14), 8319\u20138345 (2016)","journal-title":"Multimed. Tools Appl."},{"issue":"10","key":"484_CR21","doi-asserted-by":"publisher","first-page":"2675","DOI":"10.1109\/TMM.2019.2903448","volume":"21","author":"Chenggang Yan","year":"2019","unstructured":"C. Yan, L. Li, C. Zhang, B. Liu, Y. Zhang, Q. Dai, Cross-modality bridging and knowledge transferring for image understanding. IEEE Trans. Multimed. 21(10), 2675\u20132685 (2019)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"12","key":"484_CR22","doi-asserted-by":"publisher","first-page":"3389","DOI":"10.1109\/TMM.2018.2838320","volume":"20","author":"C Yan","year":"2018","unstructured":"C. Yan et al., A fast Uyghur text detector for complex background images. IEEE Trans. Multimed. 20(12), 3389\u20133398 (2018)","journal-title":"IEEE Trans. Multimed."},{"key":"484_CR23","volume-title":"International Workshop on Information Security","author":"T Seppanen","year":"2000","unstructured":"T. Seppanen, K. Makela, A. Keskinarkaus, in International Workshop on Information Security. Hiding information in color images using small color palettes (Springer, Berlin Heidelberg, 2000)"},{"issue":"6","key":"484_CR24","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1049\/ip-vis:20045047","volume":"152","author":"G Brisbane","year":"2005","unstructured":"G. Brisbane, R. Safavi-Naini, P. Ogunbona, High-capacity steganography using a shared colour palette. IEEE Proc. Vis. Image Signal Process. 152(6), 787\u2013792 (2005)","journal-title":"IEEE Proc. Vis. Image Signal Process."},{"unstructured":"M. Niimi, H. Noda, E. Kawaguchi, R.O. Eason, in Pattern Recognition, 2002. Proceedings 16th International Conference on. Luminance quasi-preserving color quantization for digital steganography to palette-based images, vol 1 (IEEE, Quebec City, 2002)","key":"484_CR25"},{"doi-asserted-by":"crossref","unstructured":"E. Kawaguchi, R.O. Eason, in Photonics East (ISAM, VVDC, IEMB). Principles and applications of BPCS steganography (International Society for Optics and Photonics, Boston, 1999)","key":"484_CR26","DOI":"10.1117\/12.337436"},{"doi-asserted-by":"crossref","unstructured":"K.B. Raja, S. Siddaraju, K.R. Venugopal, L.M. Patnaik, in Signal Processing, Communications and Networking, 2007. Secure steganography using colour palette decomposition (ICSCN'07. International Conference on. IEEE, Chennai, 2007)","key":"484_CR27","DOI":"10.1109\/ICSCN.2007.350699"},{"doi-asserted-by":"crossref","unstructured":"A. Hore, D. Ziou, in Pattern recognition (icpr), 2010 20th international conference on. Image quality metrics: PSNR vs. SSIM (IEEE, Istanbul, 2010)","key":"484_CR28","DOI":"10.1109\/ICPR.2010.579"},{"key":"484_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937655","volume-title":"A Database of Human Segmented Natural Images and its Application to Evaluating Segmentation Algorithms and Measuring Ecological Statistics","author":"D Martin","year":"2001","unstructured":"D. Martin, C. Fowlkes, D. Tal, J. Malik, A Database of Human Segmented Natural Images and its Application to Evaluating Segmentation Algorithms and Measuring Ecological Statistics (2001)"},{"unstructured":"\u201cTrue Color Kodak Images.\u201d [Online]. Available: \n                    http:\/\/r0k.us\/graphics\/kodak\/\n                    \n                  . [Accessed 3 Aug 2019]","key":"484_CR30"},{"key":"484_CR31","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.image.2014.10.009","volume":"30","author":"N Ponomarenko","year":"2015","unstructured":"N. Ponomarenko et al., Image database TID2013: Peculiarities, results and perspectives. Signal Process. Image Commun. 30, 57\u201377 (2015)","journal-title":"Signal Process. Image Commun."},{"issue":"2","key":"484_CR32","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIP.2002.807363","volume":"12","author":"I Avcibas","year":"2003","unstructured":"I. Avcibas, N. Memon, B. Sankur, Steganalysis using image quality metrics. IEEE Trans. Image Process. 12(2), 221\u2013229 (2003)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"484_CR33","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1109\/TIFS.2012.2190402","volume":"7","author":"J Fridrich","year":"2012","unstructured":"J. Fridrich, J. Kodovsky, Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur 7(3), 868\u2013882 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur"},{"issue":"11","key":"484_CR34","doi-asserted-by":"publisher","first-page":"2595","DOI":"10.1016\/j.sigpro.2011.05.015","volume":"91","author":"H Zhao","year":"2011","unstructured":"H. Zhao, H. Wang, M.K. Khan, Steganalysis for palette-based images using generalized difference image and color correlogram. Signal Process. 91(11), 2595\u20132605 (2011)","journal-title":"Signal Process."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-019-0484-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-019-0484-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-019-0484-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:05:30Z","timestamp":1603843530000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-019-0484-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,29]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["484"],"URL":"https:\/\/doi.org\/10.1186\/s13640-019-0484-x","relation":{},"ISSN":["1687-5281"],"issn-type":[{"type":"electronic","value":"1687-5281"}],"subject":[],"published":{"date-parts":[[2019,10,29]]},"assertion":[{"value":"16 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"82"}}