{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:58:34Z","timestamp":1764997114432,"version":"3.46.0"},"reference-count":39,"publisher":"Walter de Gruyter GmbH","issue":"3","license":[{"start":{"date-parts":[[2016,12,28]],"date-time":"2016-12-28T00:00:00Z","timestamp":1482883200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With the ever-increasing need for concealing messages within cover media like image, video, and audio, numerous attempts have been developed for steganography. Most of the steganographic techniques perform their embedding operation on the cover image without selecting a better location. The right selection of location for embedding the information can lead to high imperceptibility and robustness. Accordingly, in this paper, we develop a new cost function for estimating the cost of every pixel to identify the good location to embed the message data. The proposed cost estimation procedure utilizes multiple parameters like wavelet coefficient, edge transformation, and pixel intensity. The proposed cost matrix is then utilized to embed the message data into the cover media using an embedding integer. The proposed steganographic technique is experimented with two magnetic resonance brain images, and the results are analyzed with the peak-to-peak signal-to-noise ratio (PSNR) and mean square error. The robustness analysis ensured that the proposed steganographic technique outperforms the existing methods by reaching the maximum PSNR of 72.74 dB.<\/jats:p>","DOI":"10.1515\/jisys-2016-0095","type":"journal-article","created":{"date-parts":[[2016,12,28]],"date-time":"2016-12-28T05:01:55Z","timestamp":1482901315000},"page":"331-347","source":"Crossref","is-referenced-by-count":3,"title":["A Multiple Criteria-Based Cost Function Using Wavelet and Edge Transformation for Medical Image Steganography"],"prefix":"10.1515","volume":"27","author":[{"given":"S.I.","family":"Nipanikar","sequence":"first","affiliation":[{"name":"Vel Tech University , Avadi, Chennai, Tamil Nadu 600062 , India"}]},{"given":"V.","family":"Hima Deepthi","sequence":"additional","affiliation":[{"name":"Vel Tech University , Avadi, Chennai, Tamil Nadu 600062 , India"}]}],"member":"374","published-online":{"date-parts":[[2016,12,28]]},"reference":[{"key":"2025120523310295181_j_jisys-2016-0095_ref_001_w2aab3b7b5b1b6b1ab1b6b1Aa","doi-asserted-by":"crossref","unstructured":"S. Ahani and S. Ghaemmaghami, Colour image steganography method based on sparse representation, IET Image Process.9 (2015), 496\u2013505.10.1049\/iet-ipr.2014.0351","DOI":"10.1049\/iet-ipr.2014.0351"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_002_w2aab3b7b5b1b6b1ab1b6b2Aa","doi-asserted-by":"crossref","unstructured":"A. N. Akansu, W. A. Serdijn and I. W. Selesnick, Wavelet transforms in signal processing: a review of emerging applications, Phys. Commun.3 (2010), 1\u201318.10.1016\/j.phycom.2009.07.001","DOI":"10.1016\/j.phycom.2009.07.001"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_003_w2aab3b7b5b1b6b1ab1b6b3Aa","doi-asserted-by":"crossref","unstructured":"H. Al-Dmour and A. Al-Ani, Quality optimized medical image steganography based on edge detection and Hamming code, in: Proceedings of 2015 IEEE 12th International Symposium on Biomedical Imaging (ISBI), pp. 1486\u20131489, 2015.","DOI":"10.1109\/ISBI.2015.7164158"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_004_w2aab3b7b5b1b6b1ab1b6b4Aa","doi-asserted-by":"crossref","unstructured":"H. Al-Dmour and A. Al-Ani, A steganography embedding method based on edge identification and XOR coding, Expert Syst. Appl.46 (2016), 293\u2013306.10.1016\/j.eswa.2015.10.024","DOI":"10.1016\/j.eswa.2015.10.024"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_005_w2aab3b7b5b1b6b1ab1b6b5Aa","doi-asserted-by":"crossref","unstructured":"H. Al-Dmour and A. Al-Ani, Quality optimized medical image information hiding algorithm that employs edge detection and data coding, Comput. Methods Progr. Biomed.127 (2016), 24\u201343.10.1016\/j.cmpb.2016.01.011","DOI":"10.1016\/j.cmpb.2016.01.011"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_006_w2aab3b7b5b1b6b1ab1b6b6Aa","doi-asserted-by":"crossref","unstructured":"O. M. Al-Qershi and B. E. Khoo, High capacity data hiding schemes for medical images based on difference expansion, J. Syst. Softw.84 (2011), 105\u2013112.10.1016\/j.jss.2010.08.055","DOI":"10.1016\/j.jss.2010.08.055"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_007_w2aab3b7b5b1b6b1ab1b6b7Aa","doi-asserted-by":"crossref","unstructured":"D. Baby, J. Thomas, G. Augustine, E. George and N. R. Michael, A novel DWT based image securing method using steganography, in: International Conference on Information and Communication Technologies, Procedia Computer Science, pp. 612\u2013618, 2015.","DOI":"10.1016\/j.procs.2015.02.105"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_008_w2aab3b7b5b1b6b1ab1b6b8Aa","unstructured":"R. B\u00f6hme, Improved statistical steganalysis using models of heterogeneous cover signals, PhD dissertation, Faculty Comput. Sci., Tech. Univ. Dresden, Dresden, Germany, 2008."},{"key":"2025120523310295181_j_jisys-2016-0095_ref_009_w2aab3b7b5b1b6b1ab1b6b9Aa","doi-asserted-by":"crossref","unstructured":"R. B\u00f6hme, Advanced statistical steganalysis, Springer-Verlag, Berlin, 2010.","DOI":"10.1007\/978-3-642-14313-7"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_010_w2aab3b7b5b1b6b1ab1b6c10Aa","doi-asserted-by":"crossref","unstructured":"J. Canny, A computational approach to edge detection, IEEE Trans. Pattern Anal. Mach. Intell.8 (1986), 679\u2013698.","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_011_w2aab3b7b5b1b6b1ab1b6c11Aa","doi-asserted-by":"crossref","unstructured":"H. M. Chao, C. M. Hsu and S. G. Miaou, A data-hiding technique with authentication, integration, and confidentiality for electronic patient records, IEEE Trans. Inform. Technol. Biomed.6 (2002), 46\u201353.10.1109\/4233.992161","DOI":"10.1109\/4233.992161"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_012_w2aab3b7b5b1b6b1ab1b6c12Aa","doi-asserted-by":"crossref","unstructured":"S. Das and M. K. Kundu, Effective management of medical information through ROI-lossless fragile image watermarking technique, Comput. Methods Progr. Biomed.111 (2013), 662\u2013675.10.1016\/j.cmpb.2013.05.027","DOI":"10.1016\/j.cmpb.2013.05.027"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_013_w2aab3b7b5b1b6b1ab1b6c13Aa","doi-asserted-by":"crossref","unstructured":"N. N. El-Emam and M. Al-Diabat, A novel algorithm for colour image steganography using a new intelligent technique based on three phases, Appl. Soft Comput.37 (2015), 830\u2013846.10.1016\/j.asoc.2015.08.057","DOI":"10.1016\/j.asoc.2015.08.057"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_014_w2aab3b7b5b1b6b1ab1b6c14Aa","doi-asserted-by":"crossref","unstructured":"T. Filler and J. Fridrich, Gibbs construction in steganography, IEEE Trans. Inform. Forensics Security5 (2010), 705\u2013720.10.1109\/TIFS.2010.2077629","DOI":"10.1109\/TIFS.2010.2077629"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_015_w2aab3b7b5b1b6b1ab1b6c15Aa","doi-asserted-by":"crossref","unstructured":"T. Filler, J. Judas and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Trans. Inform. Forensics Security6 (2011), 920\u2013935.10.1109\/TIFS.2011.2134094","DOI":"10.1109\/TIFS.2011.2134094"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_016_w2aab3b7b5b1b6b1ab1b6c16Aa","doi-asserted-by":"crossref","unstructured":"L. Guo, J. Ni, W. Su, C. Tang and Y. Q. Shi, Using statistical image model for JPEG steganography: uniform embedding revisited, IEEE Trans. Inform. Forensics Security10 (2015), 2669\u20132680.10.1109\/TIFS.2015.2473815","DOI":"10.1109\/TIFS.2015.2473815"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_017_w2aab3b7b5b1b6b1ab1b6c17Aa","unstructured":"M. A. Hajjaji, A. Mtibaa and E. B. Bourennane, A watermarking of medical image: method based \u2018LSB\u2019, J. Emerging Trends Comput. Inform. Sci.2 (2011), 714\u2013721."},{"key":"2025120523310295181_j_jisys-2016-0095_ref_018_w2aab3b7b5b1b6b1ab1b6c18Aa","doi-asserted-by":"crossref","unstructured":"V. Holub and J. Fridrich, Universal distortion function for steganography in an arbitrary domain, EURASIP J. Inform. Security, December 2014.","DOI":"10.1186\/1687-417X-2014-1"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_019_w2aab3b7b5b1b6b1ab1b6c19Aa","doi-asserted-by":"crossref","unstructured":"J. Hu and T. Li, Reversible steganography using extended image interpolation technique, Comput. Elect. Eng.46 (2015), 447\u2013455.10.1016\/j.compeleceng.2015.04.014","DOI":"10.1016\/j.compeleceng.2015.04.014"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_020_w2aab3b7b5b1b6b1ab1b6c20Aa","doi-asserted-by":"crossref","unstructured":"R. Karak\u0131\u015f, \u0130. G\u00fcler, \u0130. \u00c7apraz and E. Bilir, A novel fuzzy logic-based image steganography method to ensure medical data security, Comput. Biol. Med.67 (2015), 172\u2013183.10.1016\/j.compbiomed.2015.10.011","DOI":"10.1016\/j.compbiomed.2015.10.011"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_021_w2aab3b7b5b1b6b1ab1b6c21Aa","unstructured":"H. K. Lee, H. J. Kim, S. G. Kwon and J. K. Lee, ROI medical image watermarking using DWT and bit-plane, in: 2005 Asia Pacific Conference on Communications, IEEE, pp. 512\u2013515, 2005."},{"key":"2025120523310295181_j_jisys-2016-0095_ref_022_w2aab3b7b5b1b6b1ab1b6c22Aa","doi-asserted-by":"crossref","unstructured":"B. Li, M. Wang, X. Li, S. Tan and J. Huang, A strategy of clustering modification directions in spatial image steganography, IEEE Trans. Inform. Forensics Security10 (2015), 1905\u20131917.10.1109\/TIFS.2015.2434600","DOI":"10.1109\/TIFS.2015.2434600"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_023_w2aab3b7b5b1b6b1ab1b6c23Aa","doi-asserted-by":"crossref","unstructured":"D. C. Lou, M. C. Hu and J. L. Liu, Multiple layer data hiding scheme for medical images, Comput. Standards Interfaces31 (2009), 329\u2013335.10.1016\/j.csi.2008.05.009","DOI":"10.1016\/j.csi.2008.05.009"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_024_w2aab3b7b5b1b6b1ab1b6c24Aa","doi-asserted-by":"crossref","unstructured":"N. A. Memon and S. A. M. Gilani, Watermarking of chest CT scan medical images for content authentication, Int. J. Comput. Math.88 (2011), 265\u2013280.10.1080\/00207161003596690","DOI":"10.1080\/00207161003596690"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_025_w2aab3b7b5b1b6b1ab1b6c25Aa","doi-asserted-by":"crossref","unstructured":"N. A. Memon, A. Chaudhry, M. Ahmad and Z. A. Keerio, Hybrid watermarking of medical images for ROI authentication and recovery, Int. J. Comput. Math.88 (2011), 2057\u20132071.10.1080\/00207160.2010.543677","DOI":"10.1080\/00207160.2010.543677"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_026_w2aab3b7b5b1b6b1ab1b6c26Aa","doi-asserted-by":"crossref","unstructured":"B. H. Menze, A. Jakab, S. Bauer, J. Kalpathy-Cramer, K. Farahani, J. Kirby, Y. Burren, N. Porz, J. Slotboom, R. Wiest, L. Lanczi, E. Gerstner, M. A. Weber, T. Arbel, B. B. Avants, N. Ayache, P. Buendia, D. L. Collins, N. Cordier, J. J. Corso, A. Criminisi, T. Das, H. Delingette, \u00c7. Demiralp, C. R. Durst, M. Dojat, S. Doyle, J. Festa, F. Forbes, E. Geremia, B. Glocker, P. Golland, X. Guo, A. Hamamci, K. M. Iftekharuddin, R. Jena, N. M. John, E. Konukoglu, D. Lashkari, J. A. Mariz, R. Meier, S. Pereira, D. Precup, S. J. Price, T. R. Raviv, S. M. Reza, M. Ryan, D. Sarikaya, L. Schwartz, H. C. Shin, J. Shotton, C. A. Silva, N. Sousa, N. K. Subbanna, G. Szekely, T. J. Taylor, O. M. Thomas, N. J. Tustison, G. Unal, F. Vasseur, M. Wintermark, D. H. Ye, L. Zhao, B. Zhao, D. Zikic, M. Prastawa, M. Reyes and K. Van Leemput, The multimodal brain tumor image segmentation benchmark (BRATS), IEEE Trans. Med. Imaging34 (2015), 1993\u20132024.10.1109\/TMI.2014.2377694","DOI":"10.1109\/TMI.2014.2377694"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_027_w2aab3b7b5b1b6b1ab1b6c27Aa","unstructured":"MIAS database, Available from http:\/\/atc.udg.edu\/\u223caoliver\/publications\/tesi\/node64.html, Accessed 5 Month, 2015."},{"key":"2025120523310295181_j_jisys-2016-0095_ref_028_w2aab3b7b5b1b6b1ab1b6c28Aa","doi-asserted-by":"crossref","unstructured":"C. Nagaraju and S. ParthaSarathy, Embedding ECG and patient information in medical image, in: Recent Advances and Innovations in Engineering (ICRAIE) 2014, IEEE, pp. 1\u20136, 2014.","DOI":"10.1109\/ICRAIE.2014.6909299"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_029_w2aab3b7b5b1b6b1ab1b6c29Aa","unstructured":"K. Navas, S. A. Thampy and M. Sasikumar, EPR hiding in medical images for telemedicine, Proc. World Acad. Sci. Eng. Technol.2 (2008), 292\u2013295."},{"key":"2025120523310295181_j_jisys-2016-0095_ref_030_w2aab3b7b5b1b6b1ab1b6c30Aa","doi-asserted-by":"crossref","unstructured":"H. Nyeem, W. Boles and C. Boyd, A review of medical image watermarking requirements for teleradiology, J. Digital Imaging26 (2013), 326\u2013343.10.1007\/s10278-012-9527-x","DOI":"10.1007\/s10278-012-9527-x"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_031_w2aab3b7b5b1b6b1ab1b6c31Aa","doi-asserted-by":"crossref","unstructured":"F. Rahimi and H. Rabbani, A dual adaptive watermarking scheme in contourlet domain for DICOM images, Biomed. Eng. Online10 (2011), 53.10.1186\/1475-925X-10-53","DOI":"10.1186\/1475-925X-10-53"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_032_w2aab3b7b5b1b6b1ab1b6c32Aa","doi-asserted-by":"crossref","unstructured":"H. Sajedi and M. Jamzad, ContSteg: contourlet-based steganography method, J. Wirel. Sens. Netw.1 (2009), 163\u2013170.10.4236\/wsn.2009.13022","DOI":"10.4236\/wsn.2009.13022"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_033_w2aab3b7b5b1b6b1ab1b6c33Aa","doi-asserted-by":"crossref","unstructured":"V. Sedighi, R. Cogranne and J. Fridrich, Content-adaptive steganography by minimizing statistical detectability, IEEE Trans. Inform. Forensics Security11 (2016), 221\u2013234.10.1109\/TIFS.2015.2486744","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_034_w2aab3b7b5b1b6b1ab1b6c34Aa","doi-asserted-by":"crossref","unstructured":"K. S. Shet, Nagaveni and A. R. Aswath. Image steganography using integer wavelet transform based on color space approach, in: Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, Springer International Publishing, 2015.","DOI":"10.1007\/978-3-319-11933-5_95"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_035_w2aab3b7b5b1b6b1ab1b6c35Aa","unstructured":"K. S. Shet, A. R. Aswath, M. C. Hanumantharaju and X. Z. Gao, Design and development of new reconfigurable architectures for LSB\/multi-bit image steganography system, Multimed. Tools Appl. (2016), 1\u201323."},{"key":"2025120523310295181_j_jisys-2016-0095_ref_036_w2aab3b7b5b1b6b1ab1b6c36Aa","doi-asserted-by":"crossref","unstructured":"S. Sidhik, S. K. Sudheer and V. P. Mahadhevan Pillai, Performance and analysis of high capacity steganography of color images involving wavelet transform, Optik \u2013 Int. J. Light Electron. Optics126 (2015), 3755\u20133760.10.1016\/j.ijleo.2015.08.208","DOI":"10.1016\/j.ijleo.2015.08.208"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_037_w2aab3b7b5b1b6b1ab1b6c37Aa","doi-asserted-by":"crossref","unstructured":"M. Tang, S. Zeng, X. Chen, J. Hu and Y. Du, An adaptive image steganography using AMBTC compression and interpolation technique, Optik \u2013 Int. J. Light Electron Optics127 (2016), 471\u2013477.10.1016\/j.ijleo.2015.09.216","DOI":"10.1016\/j.ijleo.2015.09.216"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_038_w2aab3b7b5b1b6b1ab1b6c38Aa","doi-asserted-by":"crossref","unstructured":"P. Tsai, Histogram-based reversible data hiding for vector quantisation-compressed images, IET Image Process.3 (2009), 100\u2013114.10.1049\/iet-ipr.2007.0220","DOI":"10.1049\/iet-ipr.2007.0220"},{"key":"2025120523310295181_j_jisys-2016-0095_ref_039_w2aab3b7b5b1b6b1ab1b6c39Aa","doi-asserted-by":"crossref","unstructured":"X. Zhou, H. Huang and S. L. Lou, Authenticity and integrity of digital mammography images, IEEE Trans. Medical Imaging20 (2001), 784\u2013791.10.1109\/42.938246","DOI":"10.1109\/42.938246"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jisys.2018.27.issue-3\/jisys-2016-0095\/jisys-2016-0095.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0095\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0095\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:32:43Z","timestamp":1764977563000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2016-0095\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,28]]},"references-count":39,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,3,16]]},"published-print":{"date-parts":[[2018,7,26]]}},"alternative-id":["10.1515\/jisys-2016-0095"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2016-0095","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2016,12,28]]}}}