{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T15:13:41Z","timestamp":1772032421048,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"vor","delay-in-days":22,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In steganography, the cover medium is widely treated as a mere container for the embedded information, even though it affects the stego-image quality, security, and robustness. In addition, there is no consensus on the characteristics of a suitable cover image. In this work, we introduce and practically prove the most suitable cover image (MSCI) framework to automatically select a cover image for a given secret image. This paper proposes choosing the most suitable cover from a set of images based on two steps. First, a set of cover images is filtered based on relative entropy and a histogram in order to identify the most suitable candidates. Second, the local block pixel intensity features of the candidates are analyzed to select the most suitable cover image. Furthermore, cover image local blocks were optimized, using rotation and flipping, during the embedding process to further improve stego-image representation. The proposed framework demonstrated high visual image quality when compared with existing solutions. Steganalysis tests indicated that the proposed solution for cover selection provided an increased resistance to modern steganalyzers with up to 30% lowered detection rate, which improved security.<\/jats:p>","DOI":"10.1186\/s13640-019-0486-8","type":"journal-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T15:02:39Z","timestamp":1577113359000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Efficient cover image selection based on spatial block analysis and DCT embedding"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1849-9316","authenticated-orcid":false,"given":"Sa\u2019ed","family":"Abed","sequence":"first","affiliation":[]},{"given":"Suood Abdulaziz","family":"Al-Roomi","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Al-Shayeji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"key":"486_CR1","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"S Katzenbeisser","year":"2000","unstructured":"S. Katzenbeisser, F.A. Petitcolas, Information hiding techniques for steganography and digital watermarking (Artech House, Inc., Norwood, USA, 2000)"},{"key":"486_CR2","doi-asserted-by":"crossref","unstructured":"Z. Kermani, M. Jamzad (2005) A robust steganography algorithm based on texture similarity using Gabor filter. Fifth IEEE International Symposium on Signal Processing and Information Technology, pp. 578\u2013582.","DOI":"10.1109\/ISSPIT.2005.1577161"},{"key":"486_CR3","unstructured":"H. Sajedi, M. Jamzad (2008) Cover selection steganography method based on similarity of image blocks. IEEE 8th International Conference on Computer and Information Technology Workshops, Sydney, Australia, pp. 379\u2013384."},{"key":"486_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.5815\/ijcnis.2012.10.08","volume":"10","author":"M Mahajan","year":"2012","unstructured":"M. Mahajan, N. Kaur, Adaptive steeganography: a survey of recent statistical aware steganography techniques. International Journal on Computer Network and Information Security 10, 76\u201392 (2012)","journal-title":"International Journal on Computer Network and Information Security"},{"issue":"1","key":"486_CR5","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TIP.2014.2371246","volume":"24","author":"K Wu","year":"2015","unstructured":"K. Wu, W. Chung-Ming, Steganography using reversible texture synthesis. IEEE Transactions on Image Processing 24(1), 130\u2013139 (2015)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"5","key":"486_CR6","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1109\/TIFS.2014.2312817","volume":"9","author":"L Guo","year":"2014","unstructured":"L. Guo, J. Ni, Y.Q. Shi, Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security 9(5), 814\u2013825 (2014)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"486_CR7","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1109\/TIFS.2015.2473815","volume":"10","author":"L Guo","year":"2015","unstructured":"L. Guo, J. Ni, W. Su, C. Tang, Y. Shi, Using statistical image model for JPEG steganography: Uniform embedding revisited. IEEE Transactions on Information Forensics and Security 10(12), 2669\u20132680 (2015)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"486_CR8","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"W. Luo, F. Huang, J. Huang, Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security 5(2), 201\u2013214 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"486_CR9","first-page":"1","volume":"8","author":"S Islam","year":"2014","unstructured":"S. Islam, M. Modi, P. Gupta, Edge-based image steganography. EURASIP Journal on Information Security 8, 1\u201314 (2014)","journal-title":"EURASIP Journal on Information Security"},{"issue":"7","key":"486_CR10","doi-asserted-by":"publisher","first-page":"1236","DOI":"10.1016\/j.jss.2010.01.050","volume":"83","author":"Der-Chyuan Lou","year":"2010","unstructured":"D.C. Lou, N.I. Wu, C.M. Wang, Z.H. Lin, C. S (2010) Tsai. A novel adaptive steganography based on local complexity and human vision sensitivity. Journal of Systems and Software 83(7): 1236-1248.","journal-title":"Journal of Systems and Software"},{"key":"486_CR11","doi-asserted-by":"crossref","unstructured":"V. Sedighi, J. Fridrich (2016) Effect of saturated pixels on security of steganographic schemes for digital images. IEEE International Conference Image Processing (ICIP), pp. 2747-2751.","DOI":"10.1109\/ICIP.2016.7532859"},{"key":"486_CR12","unstructured":"A. El Sayed, A. Elleithy, P. Thunga, Z. Wu (2015) Highly secure image steganography algorithm using curvelet transform and DCT encryption. 2015 Long Island Systems, Applications and technology (LISAT), pp. 15295289"},{"key":"486_CR13","first-page":"461","volume-title":"A JPEG-compression resistant adaptive steganography based on relative relationship between DCT Coefficients","author":"Y Zhang","year":"2015","unstructured":"Y. Zhang, X. Luo, C. Yang, D. Ye, F. Liu, A JPEG-compression resistant adaptive steganography based on relative relationship between DCT Coefficients (International Conference on Availability, Reliability and Security (ARES), 2015), pp. 461\u2013466"},{"key":"486_CR14","doi-asserted-by":"crossref","unstructured":"T. Denemark, J. Fridrich (2017) Steganography with two JPEGS of the same scene. The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1-5.","DOI":"10.1109\/ICASSP.2017.7952530"},{"issue":"2","key":"486_CR15","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s00530-013-0313-5","volume":"20","author":"G Liu","year":"2014","unstructured":"G. Liu, W. Liu, Y. Dai, S. Lian, Adaptive steganography based on block complexity and matrix embedding. Multimedia Systems 20(2), 227\u2013238 (2014)","journal-title":"Multimedia Systems"},{"issue":"4","key":"486_CR16","first-page":"215","volume":"4","author":"S-R Tsui","year":"2013","unstructured":"S.-R. Tsui, C.-T. Huang, W.-J. Wang, A new adaptive steganographic method based on gradient adjacent prediction and side-match vector quantization. Journal of Information Hiding and Multimedia Signal Processing 4(4), 215\u2013224 (2013)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"4","key":"486_CR17","first-page":"404","volume":"13","author":"M Jamzad","year":"2006","unstructured":"M. Jamzad, F. Yaghmaee, Achieving higher stability in watermarking according to image complexity. Sci. Iran. J. 13(4), 404\u2013412 (2006)","journal-title":"Sci. Iran. J."},{"key":"486_CR18","volume-title":"Learning OpenCV","author":"G Bradsky","year":"2008","unstructured":"G. Bradsky, A. Kaehler, Learning OpenCV (O\u2019Really Media Inc., Sebastopol, CA, 2008)"},{"key":"486_CR19","unstructured":"Y. K. Seong, Y.-H. Choi, T.-S. Choi (2004) Scene-based watermarking method for copy protection using image complexity and motion vector amplitude. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, (ICASSP '04), 3: 409-412."},{"issue":"6","key":"486_CR20","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s10207-009-0089-y","volume":"8","author":"H Sajedi","year":"2009","unstructured":"H. Sajedi, M. Jamzad, Secure steganography based on embedding capacity. International Journal of Information Security 8(6), 433\u2013445 (2009)","journal-title":"International Journal of Information Security"},{"key":"486_CR21","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-24178-9_5","volume-title":"Information Hiding","author":"Patrick Bas","year":"2011","unstructured":"P. Bas, T. Filler, T. Pevny (2011) Break our steganographic system \u2013 the ins and outs of organizing BOSS. Proceedings of the 13th international conference on Information Hiding, LNCS, Springer Berlin Heidelberg, 6958: 59\u201370."},{"key":"486_CR22","unstructured":"C. C. Chang, C. J. Lin. LIBSVM: A library for support vector machines. https:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm\/ (2001). ."},{"issue":"2","key":"486_CR23","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TIFS.2011.2175919","volume":"7","author":"J Kodovsky","year":"2012","unstructured":"J. Kodovsky, J. Fridrich, V. Holub, Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2), 432\u2013444 (2012)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"486_CR24","first-page":"258","volume":"1","author":"SB Sadkhan","year":"2009","unstructured":"S.B. Sadkhan, A.M. Al-Barky, N.N. Muhammad, An agent based image steganography using information theoretic parameters. MASAUM Journal of Computing 1(2), 258\u2013264 (2009)","journal-title":"MASAUM Journal of Computing"},{"issue":"4","key":"486_CR25","first-page":"764","volume":"25","author":"R Yang","year":"2014","unstructured":"R. Yang, Z. Zheng, J. Wei, Cover selection for image steganography based on image characteristics. Journal of Optoelectronics Laser 25(4), 764\u2013768 (2014)","journal-title":"Journal of Optoelectronics Laser"},{"key":"486_CR26","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/ETCS.2010.33","volume":"2","author":"Y Sun","year":"2010","unstructured":"Y. Sun, F. Liu, Selecting cover for image steganography by correlation coefficient. Second International Workshop on Education Technology and Computer Science 2, 159\u2013162 (2010)","journal-title":"Second International Workshop on Education Technology and Computer Science"},{"key":"486_CR27","doi-asserted-by":"crossref","unstructured":"M. Kharrazi, H. Sencar, N. Memon (2006) Cover selection for steganographic embedding. IEEE International Conference on Image Processing, pp. 117\u2013120.","DOI":"10.1109\/ICIP.2006.312386"},{"key":"486_CR28","doi-asserted-by":"crossref","unstructured":"C. Chen, Y. Shi (2008) JPEG image steganalysis utilizing both intrablock and interblock correlations. IEEE International Symposium on Circuits and Systems (ISCAS 2008), pp. 3029\u20133032.","DOI":"10.1109\/ISCAS.2008.4542096"},{"key":"486_CR29","first-page":"1","volume":"6505","author":"T Pevny","year":"2007","unstructured":"T. Pevny, J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis. In proc. of SPIE. San Jose, CA 6505, 1\u201313 (2007)","journal-title":"San Jose, CA"},{"issue":"8","key":"486_CR30","first-page":"861","volume":"27","author":"T Fawcett","year":"2006","unstructured":"T. Fawcett, An introduction to ROC analysis. Pattern Recogn. Lett 27(8), 861\u2013874 (2006)","journal-title":"Lett"},{"issue":"2","key":"486_CR31","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIFS.2014.2364918","volume":"10","author":"V Holub","year":"2015","unstructured":"V. Holub, J. Fridrich, Low Complexity Features for JPEG Steganalysis Using Undecimated DCT. IEEE Transactions on Information forensics and security 10(2), 219\u2013228 (2015)","journal-title":"IEEE Transactions on Information forensics and security"},{"key":"486_CR32","doi-asserted-by":"crossref","unstructured":"X. Song, F. Liu, C. Yang, X. Luo and Y. Zhang (2015) Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM, pp. 15-23.","DOI":"10.1145\/2756601.2756608"},{"key":"486_CR33","doi-asserted-by":"publisher","first-page":"57857","DOI":"10.1109\/ACCESS.2019.2914226","volume":"7","author":"Z Wang","year":"2019","unstructured":"Z. Wang, X. Zhang, Secure cover selection for steganography. IEEE Access 7, 57857\u201357867 (2019)","journal-title":"IEEE Access"},{"issue":"12","key":"486_CR34","doi-asserted-by":"publisher","first-page":"3389","DOI":"10.1109\/TMM.2018.2838320","volume":"20","author":"C Yan","year":"2018","unstructured":"C. Yan, H. Xie, J. Chen, Z. Zha, X. Hao, Y. Zhang, Q. Dai, A fast Uyghur text detector for complex background images. IEEE Transactions on Multimedia 20(12), 3389\u20133398 (2018)","journal-title":"IEEE Transactions on Multimedia"},{"key":"486_CR35","doi-asserted-by":"crossref","unstructured":"C. Yan, L. Liang, C. Zhang, B. Liu, Y. Zhang, Q. Dai, Cross-modality bridging and knowledge transferring for image understanding. IEEE Transactions on Multimedia, 1\u201310 (2019)","DOI":"10.1109\/TMM.2019.2903448"},{"key":"486_CR36","doi-asserted-by":"crossref","unstructured":"C. Yan, T. Yunbin, X. Wang, Y. Zhang, X. Hao, Y. Zhang, Q. Dai, STAT: Spatial-temporal attention mechanism for video captioning. IEEE Transactions on Multimedia, 1\u201313 (2019)","DOI":"10.1109\/TMM.2019.2924576"},{"key":"486_CR37","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1097\/01.ede.0000147512.81966.ba","volume":"16","author":"EF Schisterman","year":"2005","unstructured":"E.F. Schisterman, N.J. Perkins, A. Liu, H. Bondell, Optimal cut-point and its corresponding Youden index to discriminate individuals using pooled blood samples. Epidemiology 16, 73\u201387 (2005)","journal-title":"Epidemiology"}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-019-0486-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-019-0486-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-019-0486-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T00:10:38Z","timestamp":1608595838000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-019-0486-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["486"],"URL":"https:\/\/doi.org\/10.1186\/s13640-019-0486-8","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"15 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"87"}}